×

Data protection systems and methods

  • US 8,510,849 B2
  • Filed: 06/14/2010
  • Issued: 08/13/2013
  • Est. Priority Date: 08/31/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for protecting electronic content from unauthorized use, the method comprising:

  • monitoring at least one system interface through which electronic data is transferred to a peripheral device, the monitoring comprising;

    obtaining a first identifier associated with at least a portion of the electronic data, wherein the first identifier is a distillation of some part of the electronic data;

    comparing the first identifier with a second identifier;

    determining that the first identifier is related to the second identifier in a predefined manner and that the peripheral device is not permitted to receive the electronic data based on one or more rules associated with the electronic data; and

    taking at least one action to protect the electronic content from unauthorized use based on the determination.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×