SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a capture system.
53 Citations
34 Claims
-
1-14. -14. (canceled)
-
15. A method, comprising:
-
capturing, by an electronic computing device, an object traversing a network environment; generating a plurality of signatures of the object; comparing each one of the plurality of signatures with previously stored signatures; and identifying that at least a portion of the plurality of signatures match a portion of the previously stored signatures; prohibiting delivery of the object; identifying registered documents associated with the portion of the previously stored signatures; and sending an alert to respective owners of the registered documents about the object. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory machine-readable storage medium including program code which, when executed by a processor, causes the processor to perform a method, the method comprising:
-
capturing, by an electronic computing device, an object traversing a network environment; generating a plurality of signatures of the object; comparing each one of the plurality of signatures with previously stored signatures; and identifying that at least a portion of the plurality of signatures match a portion of the previously stored signatures; prohibiting delivery of the object; identifying registered documents associated with the portion of the previously stored signatures; and sending an alert to respective owners of the registered documents about the object. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. An apparatus, comprising:
-
a memory for storing data; and a processor operable to execute instructions associated with the data, wherein the apparatus is configured for; capturing, by an electronic computing device, an object traversing a network environment; generating a plurality of signatures of the object; comparing each one of the plurality of signatures with previously stored signatures; and identifying that at least a portion of the plurality of signatures match a portion of the previously stored signatures; prohibiting delivery of the object; identifying registered documents associated with the portion of the previously stored signatures; and sending an alert to respective owners of the registered documents about the object. - View Dependent Claims (30, 31, 32, 33, 34)
-
Specification