SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAMS FOR SECURELY USING PUBLIC SERVICES FOR PRIVATE OR ENTERPRISE PURPOSES
First Claim
1. A system to process content for an enterprise, comprising:
- at least one data processor;
at least one computer readable medium that stores software program instructions that are executable by the at least one data processor; and
at least one interface to a data communications network, where execution of the software program instructions results in performance of operations that comprisereviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data; and
in response to identifying secure data, modifying the content to be sent to the public service via said at least one interface such that a presence of secure data will be visually imperceptible when the content is rendered at the public service.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.
-
Citations
9 Claims
-
1. A system to process content for an enterprise, comprising:
-
at least one data processor; at least one computer readable medium that stores software program instructions that are executable by the at least one data processor; and at least one interface to a data communications network, where execution of the software program instructions results in performance of operations that comprise reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data; and in response to identifying secure data, modifying the content to be sent to the public service via said at least one interface such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification