Document de-registration
First Claim
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
- monitor security of a plurality of registered digital documents in a system, the monitoring including determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system;
detect a particular signature of a particular document in the plurality of registered digital documents from the data propagating in the network;
determine, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system, wherein the threshold detection rate comprises a threshold percentage of digital documents detected in the network traffic over a time period;
remove the particular signature from a signature database based on determining that detection of the particular signature exceeds the threshold detection rate, wherein the signature database includes the signatures of the plurality of registered digital documents; and
perform a security action to protect access to the registered digital documents, wherein the security action is not performed on the particular document based on removal of the particular signature from the signature database.
9 Assignments
0 Petitions
Accused Products
Abstract
Security of a plurality of registered digital documents in a system are monitored and the monitoring includes determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system. A particular signature of a particular document in the plurality of registered digital documents is detected from the data propagating in the network. It is determined, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system. The particular signature is removed from a signature database including the signatures of the plurality of registered digital documents.
-
Citations
21 Claims
-
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
monitor security of a plurality of registered digital documents in a system, the monitoring including determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system; detect a particular signature of a particular document in the plurality of registered digital documents from the data propagating in the network; determine, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system, wherein the threshold detection rate comprises a threshold percentage of digital documents detected in the network traffic over a time period; remove the particular signature from a signature database based on determining that detection of the particular signature exceeds the threshold detection rate, wherein the signature database includes the signatures of the plurality of registered digital documents; and perform a security action to protect access to the registered digital documents, wherein the security action is not performed on the particular document based on removal of the particular signature from the signature database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
monitoring, using at least one data processing apparatus, security of a plurality of registered digital documents in a system, the monitoring including determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system; detecting, using at least one data processing apparatus, a particular signature of a particular document in the plurality of registered digital documents from the data propagating in the network; determining, using at least one data processing apparatus, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system, wherein the threshold detection rate comprises a threshold percentage of digital documents detected in the network traffic over a time period; removing, using at least one data processing apparatus, the particular signature from a signature database based on determining that detection of the particular signature exceeds the threshold detection rate, wherein the signature database includes the signatures of the plurality of registered digital documents; and performing, using at least one data processing apparatus, a security action to protect access to the registered digital documents, wherein the security action is not performed on the particular document based on removal of the particular signature from the signature database. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system comprising:
-
at least one processor device; at least one memory element; and a registration module comprising code executable by the at least one processor device to; monitor security of a plurality of registered digital documents in a system, the monitoring including determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system; detect a particular signature of a particular document in the plurality of registered digital documents from the data propagating in the network; determine, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system, wherein the threshold detection rate comprises a threshold percentage of digital documents detected in the network traffic over a time period; remove the particular signature from a signature database based on determining that detection of the particular signature exceeds the threshold detection rate, wherein the signature database includes the signatures of the plurality of registered digital documents; and perform a security action to protect access to the registered digital documents, wherein the security action is not performed on the particular document based on removal of the particular signature from the signature database. - View Dependent Claims (19, 20, 21)
-
Specification