Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems
First Claim
Patent Images
1. A method, comprising:
- detecting an electronic message transmitted over a network based at least in part on identifying an electronic document embedded within or attached to the electronic message;
extracting a control mark from the electronic document;
generating an audit record by;
tracking a routing path of the electronic message; and
logging a sender, a recipient, a date, or a time associated with the electronic message based at least in part on detecting the electronic message;
generating a tracking report corresponding to the electronic document, a specified user, or a specified time period; and
blocking transmission of the electronic message based at least in part on determining tampering of the control mark,wherein the control mark remains embedded and unchanged in the electronic document after alteration of the electronic document.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for tracking the routing of an electronic document, including embedding a unique identifier within an electronic document and monitoring e-mail messages transmitted from senders to recipients, for detection of e-mail messages having the electronic document embedded therewithin or attached thereto, based on the unique identifier. A system and computer readable storage medium are also described and claimed.
10 Citations
28 Claims
-
1. A method, comprising:
-
detecting an electronic message transmitted over a network based at least in part on identifying an electronic document embedded within or attached to the electronic message; extracting a control mark from the electronic document; generating an audit record by; tracking a routing path of the electronic message; and logging a sender, a recipient, a date, or a time associated with the electronic message based at least in part on detecting the electronic message; generating a tracking report corresponding to the electronic document, a specified user, or a specified time period; and blocking transmission of the electronic message based at least in part on determining tampering of the control mark, wherein the control mark remains embedded and unchanged in the electronic document after alteration of the electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a memory device configured to store instructions; and a processing device configured to execute the instructions stored in the memory device to; monitor e-mail messages transmitted from senders to recipients; detect an e-mail message having an electronic document embedded therewithin or attached thereto, based on a unique identifier; extract the unique identifier from the electronic document; generate an audit record by tracking a routing path of the e-mail message and logging a sender, a recipient, a date, or a time associated with the e-mail message based at least in part on detecting the e-mail message generate a tracking report corresponding to the electronic document, a specified user, or a specified time period; and block transmission of the e-mail message based at least in part on determining tampering of the unique identifier, wherein the unique identifier remains static in the electronic document regardless of alteration of the electronic document. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification