METHODS AND SYSTEMS TO IMPLEMENT FINGERPRINT LOOKUPS ACROSS REMOTE AGENTS
First Claim
1. A computer implemented method for protecting an organization'"'"'s secure information from unauthorized disclosure, the computer implemented method comprising:
- implementing a first protect agent at a first egress point, wherein the first protect agent receives input information that a user desires to transmit outside of a given organization, and wherein the first egress point represents means by which the input information is transmitted outside of the given organization;
transmitting the input information from the first protect agent to a remote fingerprint server utilizing a network, wherein the remote fingerprint server includes a database of registered fingerprints; and
generating a comparison analysis by comparing a set of client fingerprints associated with the input information transmitted by the first protect agent against the database of registered fingerprints included in the remote fingerprint server.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods and systems to protect an organization'"'"'s secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user'"'"'s computer, etc.) to monitor information disclosed by a user. The present system also provides the use of fingerprint servers to remotely maintain a database of fingerprints associated with the organization'"'"'s secure data. In one embodiment, the protect agents transmit fingerprints associated with the user'"'"'s information to the fingerprint server utilizing a local network or the public internet. The protect agents then receive a comparison analysis from the fingerprint servers and execute appropriate security action based on the analysis. In one embodiment, a combination of the local network and public internet is utilized to achieve remote agent lookups.
-
Citations
67 Claims
-
1. A computer implemented method for protecting an organization'"'"'s secure information from unauthorized disclosure, the computer implemented method comprising:
-
implementing a first protect agent at a first egress point, wherein the first protect agent receives input information that a user desires to transmit outside of a given organization, and wherein the first egress point represents means by which the input information is transmitted outside of the given organization; transmitting the input information from the first protect agent to a remote fingerprint server utilizing a network, wherein the remote fingerprint server includes a database of registered fingerprints; and generating a comparison analysis by comparing a set of client fingerprints associated with the input information transmitted by the first protect agent against the database of registered fingerprints included in the remote fingerprint server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer implemented method for protecting an organization'"'"'s secure information from unauthorized disclosure, the computer implemented method comprising:
-
storing a plurality of original fingerprints in a remote fingerprint server connected to a network, wherein the plurality of original fingerprints represents secure information of a given organization; using a protect agent associated with an egress point to receive a first data that a user desires to transmit outside of a given organization, wherein the egress point represents the means by which the user desires to transmit the first data outside of the given organization; generating a first set of client fingerprints for the first data; transmitting the first set of client fingerprints to the remote fingerprint server utilizing the network; and performing a lookup analysis in the remote fingerprint server, wherein the lookup analysis determines whether any of the first set of client fingerprints is identical to any of the plurality of original fingerprints stored in the remote fingerprint server. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A computer implemented system for protecting an organization'"'"'s secure information from unauthorized disclosure, the computer implemented system comprising:
-
means for implementing a first protect agent at a first egress point, wherein the first protect agent receives input information that a user desires to transmit outside of a given organization, and wherein the first egress point represents means by which the information is transmitted outside of the given organization; means for transmitting the input information from the first protect agent to a remote fingerprint server utilizing a network, wherein the remote fingerprint server includes a database of registered fingerprints; and means for generating a comparison analysis by comparing a set of client fingerprints associated with the input information transmitted by the first protect agent against the database of registered fingerprints included in the remote fingerprint server. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A computer implemented system for protecting an organization'"'"'s secure information from unauthorized disclosure, the computer implemented system comprising:
-
a remote fingerprint server to store a plurality of original fingerprints, wherein the plurality of original fingerprints represents secure information of a given organization; means for implementing a protect agent that is associated with an egress point, wherein the protect agent receives a first data that a user desires to transmit outside of a given organization, and wherein the egress point represents means by which the user desires to transmit the first data outside of the given organization; means for generating a first set of client fingerprints for the first data; means for transmitting the first set of client fingerprints to the remote fingerprint server utilizing the network; and means for performing a lookup analysis in the remote fingerprint server, wherein the lookup analysis determines whether any of the first set of client fingerprints is identical to any of the plurality of original fingerprints stored in the remote fingerprint server.
-
Specification