TRACKING AND TRACING INFORMATION THEFT FROM INFORMATION SYSTEMS
First Claim
Patent Images
1. A method, comprising:
- receiving, from an accessing system, an access request for stored information;
generating unique classification and tracking metadata based on the access request;
embedding the classification and tracking metadata as steganographic code into return information according to the request; and
replying to the access request with the return information containing the embedded steganographic code.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a processing device receives, from an accessing system, an access request for stored information. In response, the device generates unique classification and tracking metadata based on the access request, and embeds the classification and tracking metadata as steganographic code into the source information before returning the information according to the request. The device then replies to the access request with the return information containing the embedded steganographic code.
18 Citations
24 Claims
-
1. A method, comprising:
-
receiving, from an accessing system, an access request for stored information; generating unique classification and tracking metadata based on the access request; embedding the classification and tracking metadata as steganographic code into return information according to the request; and replying to the access request with the return information containing the embedded steganographic code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus, comprising:
-
one or more network interfaces to communicate with computer network; a processor coupled to the network interfaces and configured to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; receive, from an accessing system, an access request for stored information; generate unique classification and tracking metadata based on the access request; embed the classification and tracking metadata as steganographic code into return information according to the request; and reply to the access request with the return information containing the embedded steganographic code. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
-
receive, from an accessing system, an access request for stored information; generate unique classification and tracking metadata based on the access request; embed the classification and tracking metadata as steganographic code into return information according to the request; and reply to the access request with the return information containing the embedded steganographic code.
-
Specification