Method and apparatus for detecting unauthorized distribution of data
First Claim
1. In a communication environment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for preventing unauthorized distribution of data information within the wireless communication system, the method comprising steps of:
- a) receiving, by a security gateway, the data information from a particular data base of the public data system;
b) searching, by the security gateway, the data information for a security tag;
c) when the security tag is found, determining, by the security gateway, whether the security tag is assigned to the particular data base; and
d) when the security tag is not assigned to the particular data base, identifying, by the security gateway, the particular data base as a potential unauthorized distributor of the data information.
2 Assignments
0 Petitions
Accused Products
Abstract
Unauthorized distribution of data within a wireless communication system (101-102) can be detected by coupling a security gateway (103) between the wireless communication system (101-102) and a public data base system (104). When the public data base system (104) sends data to a requesting member of the wireless communication system (101-102), the data is intercepted by the security gateway (103). As the security gateway (103) is receiving the data, it is searching the data for a security tag. When a security tag is found, the security gateway (103) determines whether the security tag is assigned to the particular data base transmitting the data (105-106). If the security tag is not assigned to the particular data base, the security gateway identifies the particular data base as a potential unauthorized distributor of data (117).
-
Citations
11 Claims
-
1. In a communication environment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for preventing unauthorized distribution of data information within the wireless communication system, the method comprising steps of:
-
a) receiving, by a security gateway, the data information from a particular data base of the public data system; b) searching, by the security gateway, the data information for a security tag; c) when the security tag is found, determining, by the security gateway, whether the security tag is assigned to the particular data base; and d) when the security tag is not assigned to the particular data base, identifying, by the security gateway, the particular data base as a potential unauthorized distributor of the data information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A security gateway for preventing unauthorized distribution of data within a wireless communication system, the security gateway comprising:
-
a transceiver operably coupled to the wireless communication system and a public data base system; a processor operably coupled to the transceiver, wherein the processor provides a security tag for data information received from the public data system and identifies unauthorized distributors of the data information received; and memory operably coupled to the processor, wherein the memory stores the security tag. - View Dependent Claims (9, 10, 11)
-
Specification