Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2004-10-05
2010-10-19
Korzuch, William R (Department: 2431)
Information security
Prevention of unauthorized use of data including prevention...
C726S030000, C705S026640, C705S051000, C709S225000
Reexamination Certificate
active
07818809
ABSTRACT:
Methods, apparatuses, and computer-readable media for protecting confidential data on a network. An embodiment of the inventive method comprises the steps of: monitoring110data directed to a website; identifying120a data string having at least one confidential characteristic; categorizing the data string with a categorization level; examining140the website for at least one characteristic consistent with confidential data; creating155a website characteristic profile; comparing170the website characteristic profile with the data string's categorization level for compatibility; and determining180whether the data string can be communicated to the website.
REFERENCES:
patent: 6199113 (2001-03-01), Alegre et al.
patent: 6442607 (2002-08-01), Korn et al.
patent: 6829613 (2004-12-01), Liddy
patent: 6981028 (2005-12-01), Rawat et al.
patent: 7376613 (2008-05-01), Cofino et al.
patent: 7457873 (2008-11-01), Mariani et al.
patent: 7523498 (2009-04-01), Fellenstein et al.
patent: 7693750 (2010-04-01), Christensen
patent: 2002/0023059 (2002-02-01), Bari et al.
patent: 2002/0038365 (2002-03-01), Yeh
patent: 2002/0038430 (2002-03-01), Edwards et al.
patent: 2002/0069198 (2002-06-01), Stebbings et al.
patent: 2002/0194079 (2002-12-01), kimble
patent: 2003/0037138 (2003-02-01), Brown et al.
patent: 2003/0110168 (2003-06-01), Kester et al.
patent: 2003/0218627 (2003-11-01), Gusler et al.
patent: 2004/0128552 (2004-07-01), Toomey
patent: 2005/0228782 (2005-10-01), Bronstein et al.
patent: 2005/0257261 (2005-11-01), Shraim et al.
patent: 2006/0005247 (2006-01-01), Zhang et al.
patent: 2006/0041508 (2006-02-01), Pham et al.
patent: 2006/0080735 (2006-04-01), Brinson et al.
patent: 2007/0078758 (2007-04-01), Susskind et al.
patent: 2007/0245032 (2007-10-01), KishorVarshney et al.
patent: 2008/0120722 (2008-05-01), Sima et al.
patent: 2008/0307529 (2008-12-01), Choi et al.
patent: 2009/0125977 (2009-05-01), Chander et al.
patent: 2009/0171982 (2009-07-01), Hagan et al.
patent: 2010/0030792 (2010-02-01), Swinton et al.
patent: 2010/0058064 (2010-03-01), Kirovski et al.
patent: 2010/0058446 (2010-03-01), Thwaites
patent: 2010/0138437 (2010-06-01), Nadig et al.
patent: 2010/0174813 (2010-07-01), Hildreth et al.
patent: 586065 (2004-05-01), None
Dyck, Timothy, Review: Teros-100 APS 2.1.1, [Online] May 28, 2003, [Retrieved from the Internet on Oct. 6, 2004] Retrieved from the Internet: <URL:http://www.eweek.com/article2/0,1759,1110435,00.asp>, Woburn, MA, U.S.A.
McCorkendale Bruce
Sobel William E.
Willey Richard
Fenwick & West LLP
Korzuch William R
Su Sarah
Symantec Corporation
LandOfFree
Confidential data protection through usage scoping does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Confidential data protection through usage scoping, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Confidential data protection through usage scoping will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4202923