1-8. (canceled)
9. A filter element of a motor vehicle fuel filter, comprising:
a filter body having a raw unfiltered side and a clean filtered side;
a filter material arranged into a plurality of folds within said filter body; and
a heating element arranged between two of said folds;
wherein said heating element is arranged to heat fuel in said filter body;
wherein said filter element is configured for exchangeble use in a filter housing.
10. The filter element according to claim 9, wherein the heating element is arranged on the raw side of the filter body.
11. The filter element according to claim 10, wherein the heating element comprises a differential pressure sensor configured to detect and responsive to differential pressure between the raw side and the clean side of the filter body.
12. The filter element according to claim 11, wherein the pressure sensor is connected to control an electric fuel pump in the low-pressure circuit of the fuel supply andor control heating power supplied to the heating element.
13. The filter element according to claim 12, wherein the heating element is fixedly connected to the filter housing and configured to enable exchangereplacement together with the filter element.
14. A fuel filter for motor vehicles comprising:
a filter housing including a lid part;
an exchangeable filter element according to claim 9 replaceably received into said housing, said filter element comprising:
a terminal disk having a through opening and including a circumferential seal secured to said terminal disk and configured to seal between the terminal disk and the lid part of the filter housing;
said terminal disk together with said lid part and said circumferential seal defining a supply chamber within said filter housing;
a supply line in fluid communication with said supply chamber and configured to supply fuel to said supply chamber; and
wherein said through opening in said terminal disk adjoins said heating element.
15. The fuel filter according to claim 14 wherein the filter element, wherein
the heating element is arranged on the raw side of the filter body;
wherein the heating element comprises a differential pressure sensor configured to detect and responsive to differential pressure between the raw side and the clean side of the filter body;
wherein the pressure sensor is connected to control an electric fuel pump in the low-pressure circuit of the fuel supply andor control heating power supplied to the heating element; and
wherein the heating element is fixedly connected to the filter housing and configured to enable exchangereplacement together with the filter element.
16. The fuel filter according to claim 14, wherein the through opening (16) is connected to a hydrodynamic conducting body (17) configured to guide fuel flowing into said through opening directly to the heating element.
17. The fuel filter according to claim 16, further comprising
electrical connecting contacts secured on said heating element and accessible through a contact opening provided in said lid part; and
a seal sealing between said lid part and said heating element configured to isolate said contacts from fuel flow.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.
1. A method for protecting sensitive information from disclosure through virtual machine files, comprising:
halting at least one virtual machine on a host machine of at least one processor and deleting the at least one virtual machine;
processing at least one virtual disk using the at least one processor to access data objects in memory that are associated with the at least one virtual machine;
examining the data objects using the at least one processor in accordance with a data loss prevention policy in the memory to identify, using the at least one processor, sensitive information within at least one data object of the data objects;
determining a degree of sensitivity of the sensitive information; and
preventing disclosure of the sensitive information by securing, using the at least one processor, the sensitive information within the at least one virtual disk in the memory when the degree of sensitivity exceeds a threshold degree of sensitivity;
wherein securing the sensitive information further comprises rendering the at least one virtual disk inaccessible for unauthorized use.
2. The method of claim 1, wherein processing the at least one virtual disk further comprises generating mapping information in the memory associated with the data objects and the at least one virtual disk.
3. The method of claim 2, wherein examining the data objects further comprises performing an address scan of the data objects within the at least one virtual disk using the mapping information and the at least one processor.
4. The method of claim 1, wherein the sensitive information is inaccessible after the securing step.
5. The method of claim 1, wherein securing the sensitive information further comprises performing at least one quarantining, encrypting or deleting, using the at least one processor, the at least one virtual disk comprising the at least one data object.
6. The method of claim 1, wherein processing the at least one virtual disk further comprises:
generating at least one snapshot of the at least one virtual disk that is associated with the at least one virtual machine; and
determining mappings, in the memory using the at least one processor, between the data objects and locations within the at least one virtual disk and the at least one snapshot.
7. An apparatus for protecting sensitive information from disclosure through virtual machine files, the apparatus comprising:
at least one computer processor;
at least one memory storing instructions that when executed by the at least one computer processor cause the apparatus to:
halt at least one virtual machine on a host machine of the at least one computer processor and delete the at least one virtual machine;
access at least one virtual disk that is associated with the at least one virtual machine to determine mappings between data objects and the at least one virtual disk using the at least one computer processor;
examine, using the at least one computer processor, the data objects within the at least one virtual disk using the mappings;
identify sensitive information within at least one data object based on a data loss prevention policy in the memory using the at least one computer processor;
determine a degree of sensitivity of the sensitive information; and
prevent disclosure of the sensitive information by rendering the at least one virtual disk that comprises the at least one data object of the at least one virtual disk inaccessible for unauthorized use using the at least one computer processor when the degree of sensitivity exceeds a threshold degree of sensitivity.
8. The apparatus of claim 7, wherein the computer processor further cause the apparatus to perform at least one of deleting, encrypting or quarantining the at least one virtual disk.
9. The apparatus of claim 7, wherein the computer processor further cause the apparatus to perform an address scan of the at least one virtual disk to detect the sensitive information.
10. A non-transitory computer-readable-storage medium comprising one or more processor-executable instructions that, when executed by at least one processor, causes the at least one processor to:
halt at least one virtual machine on a host machine of the at least one processor and delete the at least one virtual machine;
access mapping information associated with data objects within at least one virtual disk in memory that are associated with the at least one virtual machine using the at least one processor;
scan the data objects using a data loss prevention policy for identifying sensitive information;
determine a degree of sensitivity of the sensitive information; and
prevent disclosure of the sensitive information by rendering the at least one virtual disk comprising the sensitive information associated with the at least one virtual machine inaccessible for unauthorized use when the degree of sensitivity exceeds a threshold degree of sensitivity.
11. The non-transitory computer-readable-storage medium of claim 10 further comprises one or more processor-executable instructions that, when executed by the at least one processor, causes the at least one processor to:
perform at least one of encrypting, quarantining, or deleting the at least one virtual disk comprising sensitive information of the data objects.
12. The non-transitory computer-readable-storage medium of claim 10 further comprises one or more processor-executable instructions that, when executed by the at least one processor, causes the at least one processor to:
map the data objects to location within the at least one virtual disk when at least one virtual machine associated with the at least one virtual disk is not operational.
13. The non-transitory computer-readable-storage medium of claim 10 further comprises one or more processor-executable instructions that, when executed by the at least one processor, causes the at least one processor to:
create at least one snapshot of the at least one virtual disk associated with the at least one virtual machine; and
generate mapping information associated with the data objects, the at least one snapshot, and the at least one virtual disk.
14. The non-transitory computer-readable-storage medium of claim 10 further comprises one or more processor-executable instructions that, when executed by the at least one processor, causes the at least one processor to:
perform an address scan on the at least one virtual disk and the at least one snapshot using the mapping information; and
identify the sensitive information within at least one data object of the data objects based on the data loss prevention policy.