Tracking and tracing information theft from information systems
First Claim
Patent Images
1. A method, comprising:
- receiving, from an accessing system in a computer network, an access request for stored information;
generating, by a device in the computer network, unique classification and tracking metadata based on the access request, wherein the unique classification and tracking metadata includes traceable and verifiable information that uniquely identifies one or more features of the access request, the one or more features including at least an accessing user, an access time and an information system by which a user accessed the stored information;
embedding, by the device, the classification and tracking metadata as steganographic code into return information according to the request; and
replying to the access request, by the device, with the return information containing the embedded steganographic code.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a processing device receives, from an accessing system, an access request for stored information. In response, the device generates unique classification and tracking metadata based on the access request, and embeds the classification and tracking metadata as steganographic code into the source information before returning the information according to the request. The device then replies to the access request with the return information containing the embedded steganographic code.
18 Citations
24 Claims
-
1. A method, comprising:
-
receiving, from an accessing system in a computer network, an access request for stored information; generating, by a device in the computer network, unique classification and tracking metadata based on the access request, wherein the unique classification and tracking metadata includes traceable and verifiable information that uniquely identifies one or more features of the access request, the one or more features including at least an accessing user, an access time and an information system by which a user accessed the stored information; embedding, by the device, the classification and tracking metadata as steganographic code into return information according to the request; and replying to the access request, by the device, with the return information containing the embedded steganographic code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus, comprising:
-
one or more network interfaces to communicate with computer network; a processor coupled to the network interfaces and configured to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; receive, from an accessing system, an access request for stored information; generate unique classification and tracking metadata based on the access request, wherein the unique classification and tracking metadata includes traceable and verifiable information that uniquely identifies one or more features of the access request, the one or more features including at least an accessing user, an access time and an information system by which a user accessed the stored information; embed the unique classification and tracking metadata as steganographic code into return information according to the request; and reply to the access request with the return information containing the embedded steganographic code. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A non-transitory computer-readable medium having software encoded thereon, the software when executed by a processor operable to:
-
receive, from an accessing system, an access request for stored information; generate unique classification and tracking metadata based on the access request, wherein the unique classification and tracking metadata includes traceable and verifiable information that uniquely identifies one or more features of the access request, the one or more features including at least an accessing user, an access time and an information system by which a user accessed the stored information; embed the unique classification and tracking metadata as steganographic code into return information according to the request; and reply to the access request with the return information containing the embedded steganographic code.
-
Specification