Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems
First Claim
Patent Images
1. A method for tracking the routing of an electronic document, comprising:
- embedding a unique identifier within an electronic document; and
monitoring e-mail messages transmitted from senders to recipients, for detection of e-mail messages having the electronic document embedded therewithin or attached thereto, based on the unique identifier.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for tracking the routing of an electronic document, including embedding a unique identifier within an electronic document and monitoring e-mail messages transmitted from senders to recipients, for detection of e-mail messages having the electronic document embedded therewithin or attached thereto, based on the unique identifier. A system and computer readable storage medium are also described and claimed.
45 Citations
90 Claims
-
1. A method for tracking the routing of an electronic document, comprising:
-
embedding a unique identifier within an electronic document; and
monitoring e-mail messages transmitted from senders to recipients, for detection of e-mail messages having the electronic document embedded therewithin or attached thereto, based on the unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for tracking the routing of an electronic document, comprising:
-
an auto-marker for embedding a unique identifier within an electronic document; and
a traffic monitor for monitoring e-mail messages transmitted from senders to recipients, and for detecting e-mail messages having the electronic document embedded therewithin or attached thereto, based on the unique identifier. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer-readable storage medium storing program code for causing a computer to perform the steps of:
-
embedding a unique identifier within an electronic document; and
monitoring e-mail messages transmitted from senders to recipients, for detection of the electronic document embedded therewithin or attached thereto, based on the unique identifier.
-
-
38. A method for tracking the routing of an electronic document, comprising:
-
embedding a unique identifier within an electronic document; and
monitoring transmitted network packets, for detection of network packets containing the electronic document, based on the unique identifier. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A system for tracking the routing of an electronic document, comprising:
-
an auto-marker for embedding a unique identifier within an electronic document; and
a traffic monitor for monitoring transmitted network packets, and for detection of network packets containing the electronic document, based on the unique identifier. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
58. A computer-readable storage medium storing program code for causing a computer to perform the steps of:
-
embedding a unique identifier within an electronic document; and
monitoring transmitted network packets, for detection of network packets containing the electronic document, based on the unique identifier.
-
-
59. A method for controlling distribution of an electronic document within computer networks, comprising:
-
intercepting e-mail messages being transmitted from senders to recipients;
scanning the intercepted e-mail messages for detection of a specified electronic document embedded therein or attached thereto;
examining a policy to determine whether or not transmission of the document to a recipient is permitted, if said scanning detects an e-mail message having the electronic document embedded therein or attached thereto; and
causing transmission of the document to the recipient to be blocked, if said examining determines that transmission is not permitted. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66)
-
-
67. A system for controlling distribution of an electronic document within computer networks, comprising:
-
a traffic monitor for intercepting e-mail messages being transmitted from senders to recipients;
a scanner for scanning the intercepted e-mail messages, and for detecting a specified electronic document embedded therein or attached thereto;
a policy manager for examining a policy to determine whether or not transmission of the document to a recipient of an e-mail message is permitted; and
a policy enforcer for causing transmission of the document to the recipient to be blocked. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74)
-
-
75. A computer-readable storage medium storing program code for causing a computer to perform the steps of:
-
intercepting e-mail messages being transmitted from senders to recipients;
scanning the intercepted e-mail messages for detection of a specified electronic document embedded therein or attached thereto;
examining a policy to determine whether or not transmission of the document to a recipient is permitted, if said scanning detects an e-mail message having the electronic document embedded therein or attached thereto; and
causing transmission of the document to the recipient to be blocked, if said examining determines that transmission is not permitted.
-
-
76. A method for controlling distribution of an electronic document within computer networks, comprising:
-
intercepting network packets transmitted over a computer network;
scanning the intercepted network packets for detection of network packets containing a specified electronic document;
examining a policy to determine whether or not transmission of the specified electronic document is permitted, if said scanning detects a network packet containing the specified electronic document; and
causing transmission of the document to be blocked, if said examining determines that transmission is not permitted. - View Dependent Claims (77, 78, 79, 80, 81, 82)
-
-
83. A system for controlling distribution of an electronic document within computer networks, comprising:
-
a traffic monitor for intercepting network packets transmitted over a computer network;
a scanner for scanning the intercepted network packets and for detecting network packets containing a specified electronic document;
a policy manager for examining a policy to determine whether or not transmission of the specified electronic document is permitted; and
a policy enforcer for causing transmission of the document to be blocked. - View Dependent Claims (84, 85, 86, 87, 88, 89)
-
-
90. A computer-readable storage medium storing program code for causing a computer to perform the steps of:
-
intercepting network packets transmitted over a computer network;
scanning the intercepted network packets for detection of network packets containing a specified electronic document;
examining a policy to determine whether or not transmission of the specified electronic document is permitted, if said scanning detects a network packet containing the specified electronic document; and
causing transmission of the document to be blocked, if said examining determines that transmission is not permitted.
-
Specification