×

Method to establish virtual security perimeters

  • US 10,346,609 B2
  • Filed: 06/17/2013
  • Issued: 07/09/2019
  • Est. Priority Date: 05/13/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method to identify on a computer system outside of a security perimeter for classified information a breach of said security perimeter of said classified information in electronic format, said method comprising:

  • (a) executing a classification software engine on at least one computer system authorized for said classified information, where said classification software engine comprising;

    (1) establishing at least one unique code on said at least one computer system for said classified information authorized for said at least one computer system, where said at least one unique code uniquely identifies said classified information authorized for said at least one computer system, and(2) embedding said at least one unique code into at least one electronic storage media of said at least one computer system, thereby establishing a security perimeter for said classified information authorized for said at least one computer system,(b) executing a classification software engine on at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, where said classification software engine comprising;

    (1) establishing said at least one unique code as a non-authorized said at least one unique code for said at least one computer system not authorized for said classified information and outside said security perimeter for said classified information,(2) monitoring a computer event of said at least one computer system not authorized for said classified information and outside said security perimeter,(3) detecting said non-authorized said at least one unique code within at least one electronic storage media involved with said computer event, where a detected said non-authorized said at least one unique code identifies a breach of said security perimeter for classified information on said at least one computer system not authorized for said classified information and outside said security perimeter, and(4) warning a predetermined entity of said breach of said security perimeter with information about said breach.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×