System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof
First Claim
Patent Images
1. A computer-implemented method, comprising:
- identifying, by a processor, a request from a remote computer to transfer data over a network connection;
determining, by the processor, a location from which the data is sought to be transferred;
comparing, by the processor, the location of the data to a list of predefined locations for which data transfers are allowed;
identifying, by the processor, a destination address to which the data is sought to be transferred;
comparing, by the processor, the destination address to the list of predefined locations for which data transfers are allowed;
calculating, by the processor, a hash of the data; and
preventing, by the processor, the transfer of the data if both the location from which the data is sought to be transferred and the destination address to which the data is sought to be transferred are not in the list of predefined locations for which data transfers are allowed, wherein the preventing the transfer of the data prevents data leakage of confidential information.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for conditionally preventing the transfer of data. In use, a request to transfer data is identified. In addition, a location of the data is determined. Further, the transfer of the data is conditionally prevented based on the location.
-
Citations
41 Claims
-
1. A computer-implemented method, comprising:
-
identifying, by a processor, a request from a remote computer to transfer data over a network connection; determining, by the processor, a location from which the data is sought to be transferred; comparing, by the processor, the location of the data to a list of predefined locations for which data transfers are allowed; identifying, by the processor, a destination address to which the data is sought to be transferred; comparing, by the processor, the destination address to the list of predefined locations for which data transfers are allowed; calculating, by the processor, a hash of the data; and preventing, by the processor, the transfer of the data if both the location from which the data is sought to be transferred and the destination address to which the data is sought to be transferred are not in the list of predefined locations for which data transfers are allowed, wherein the preventing the transfer of the data prevents data leakage of confidential information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product embodied on a non-transitory tangible computer readable medium for performing operations, comprising:
-
identifying a request from a remote computer to transfer data; determining a location from which the data is sought to be transferred; comparing the location of the data to a list of predefined locations for which data transfers are allowed; identifying a destination address to which the data is sought to be transferred; comparing the destination address to the list of predefined locations for which data transfers are allowed; calculating a hash of the data; and preventing the transfer of the data if both the location from which the data is sought to be transferred and the destination address to which the data is sought to be transferred are not in the list of predefined locations for which data transfers are allowed, wherein the preventing the transfer of the data prevents data leakage of confidential information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system, comprising:
-
a memory; and a processor coupled to the memory, the processor for performing operations associated with the system, including; identifying a request from a remote computer to transfer data over a network connection; determining a location from which the data is sought to be transferred; comparing the location of the data to a list of predefined locations for which data transfers are allowed; identifying a destination address to which the data is sought to be transferred; comparing the destination address to the list of predefined locations for which data transfers are allowed; calculating a hash of the data; and preventing the transfer of the data if both the location from which the data is sought to be transferred and the destination address to which the data is sought to be transferred are not in the list of predefined locations for which data transfers are allowed, wherein the preventing the transfer of the data prevents data leakage of confidential information. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification