US 12,067,112 B2
Systems and methods for proactive and reactive data security
Fahad Shaon, McKinney, TX (US); and Sazzadur Rahaman, Blacksburg, VA (US)
Assigned to Data Security Technologies LLC, Dallas, TX (US)
Filed by Data Security Technologies LLC, Dallas, TX (US)
Filed on Apr. 3, 2023, as Appl. No. 18/130,340.
Application 18/130,340 is a continuation of application No. 16/698,328, filed on Nov. 27, 2019, granted, now 11,620,378.
Prior Publication US 2023/0237148 A1, Jul. 27, 2023
Int. Cl. G06F 21/54 (2013.01)
CPC G06F 21/54 (2013.01) [G06F 2221/033 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by a processor of a computing device, a compressed archive of executable code comprising a first item of executable code;
calculating, by the processor, a hash of the compressed archive of executable code;
comparing, by the processor, the calculated hash of the compressed archive of executable code to a database of hashes;
determining, by the processor, that the calculated hash of the compressed archive of executable code does not match any hash in the database of hashes;
responsive to the determination that the calculated hash of the compressed archive of executable code does not match any hash in the database of hashes, decompressing, by the processor, the compressed archive of executable code and extracting the first item of executable code;
calculating, by the processor, a hash of the first item of executable code;
comparing, by the processor, the calculated hash of the first item of executable code to a database of hashes;
determining, by the processor, whether the calculated hash of the first item of executable code matches any hash in the database of hashes; and
responsive to determining that the calculated hash of the first item of executable code does not match any hash in the database of hashes, applying, by the processor, a security policy to the first item of executable code, triggering of the policy indicating that the first item of executable code should be blocked from execution;
wherein applying the security policy to the first item of executable code comprises comparing, by the processor, output targets of the first item of executable code to a predetermined set of secure targets.