Staggered secure data receipt
First Claim
Patent Images
1. A method comprising:
- identifying data content associated with a data file;
splitting the data content into a plurality of data content sections, further determining a degree of sensitivity associated with each of the data content sections based on a message content of each such section;
identifying a plurality of potential recipient devices; and
transmitting the plurality of data content sections to the plurality of potential recipient devices, wherein the message content portion with the highest degree of sensitivity is transmitted to the potential recipient device with the least vulnerability, the vulnerability being determined based on a comparison of communication mediums used by each of the plurality of potential recipient devices.
1 Assignment
0 Petitions
Accused Products
Abstract
Message and data sharing may require additional levels of security beyond mere access authorization procedures. One example method of operation may include identifying data content associated with a data file, splitting the data content into data content sections, identifying potential recipient devices, and transmitting the data content sections to the potential recipient devices.
43 Citations
20 Claims
-
1. A method comprising:
-
identifying data content associated with a data file; splitting the data content into a plurality of data content sections, further determining a degree of sensitivity associated with each of the data content sections based on a message content of each such section; identifying a plurality of potential recipient devices; and transmitting the plurality of data content sections to the plurality of potential recipient devices, wherein the message content portion with the highest degree of sensitivity is transmitted to the potential recipient device with the least vulnerability, the vulnerability being determined based on a comparison of communication mediums used by each of the plurality of potential recipient devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a processor configured to; identify data content associated with a data file; split the data content into a plurality of data content sections further determining a degree of sensitivity associated with each of the data content sections based on a message content of each such section; identify a plurality of potential recipient devices; and a transmitter configured to transmit the plurality of data content sections to the plurality of potential recipient devices, wherein the message content portion with the highest degree of sensitivity is transmitted to the potential recipient device with the least vulnerability, the vulnerability being determined based on a comparison of communication mediums used by each of the plurality of potential recipient devices. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform:
-
identifying data content associated with a data file; splitting the data content into a plurality of data content sections further determining a degree of sensitivity associated with each of the data content sections based on a message content of each such section; identifying a plurality of potential recipient devices; and transmitting the plurality of data content sections to the plurality of potential recipient devices, wherein the message content portion with the highest degree of sensitivity is transmitted to the potential recipient device with the least vulnerability, the vulnerability being determined based on a comparison of communication mediums used by each of the plurality of potential recipient devices. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification