Message distribution control
First Claim
1. A method of controlling distribution of content in a message sent by a message sender, comprising:
- receiving over a network from a mail client a first message created by a first message sender, the first message including;
a text string manually marked by the first message sender as confidential content, upon which a distribution limit should be placed, anda distribution limit manually set by the first message sender identifying one or more authorized recipients;
receiving over the network from a mail client a second message subsequent to the first message, wherein the second message is distinct from the first message and created by a second message sender who is distinct from the first message sender, and the second message includes a recipient identified by the second message sender; and
executing instructions stored in memory, wherein execution of the instructions by a processor;
adds the text string manually marked by the first message sender and the distribution limit manually set by the first message sender to a database stored in memory,examines the second message for the stored text string manually marked by the first message sender, wherein examining the second message includes extracting a suspicious text string from the second message and comparing the suspicious text string to the stored text string manually marked by the first message sender,examines the second message for the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender when the suspicious text string matches the stored text string manually marked by the first message sender, wherein examining the second message includes extracting the recipient identified by the second message sender and comparing the recipient to the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender, andtransmits the second message over the network to the recipient identified by the second message sender when the recipient identified by the second message sender matches the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender.
25 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content.
56 Citations
24 Claims
-
1. A method of controlling distribution of content in a message sent by a message sender, comprising:
-
receiving over a network from a mail client a first message created by a first message sender, the first message including; a text string manually marked by the first message sender as confidential content, upon which a distribution limit should be placed, and a distribution limit manually set by the first message sender identifying one or more authorized recipients; receiving over the network from a mail client a second message subsequent to the first message, wherein the second message is distinct from the first message and created by a second message sender who is distinct from the first message sender, and the second message includes a recipient identified by the second message sender; and executing instructions stored in memory, wherein execution of the instructions by a processor; adds the text string manually marked by the first message sender and the distribution limit manually set by the first message sender to a database stored in memory, examines the second message for the stored text string manually marked by the first message sender, wherein examining the second message includes extracting a suspicious text string from the second message and comparing the suspicious text string to the stored text string manually marked by the first message sender, examines the second message for the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender when the suspicious text string matches the stored text string manually marked by the first message sender, wherein examining the second message includes extracting the recipient identified by the second message sender and comparing the recipient to the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender, and transmits the second message over the network to the recipient identified by the second message sender when the recipient identified by the second message sender matches the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system that controls distribution of content in a message sent by a message sender, the system comprising:
-
a processor; a network interface communicatively coupled to a communications network; and memory storing a database and executable instructions, whereby execution of the instructions by the processor; receives at the network interface from a mail client a first message created by a first message sender, the first message including; a text string manually marked by the first message sender as confidential content upon which a distribution limit should be placed, and a distribution limit manually set by the first message sender identifying one or more authorized recipients; receives at the network interface from a mail client a second message subsequent to the first message, wherein the second message is distinct from the first message and created by a second message sender who is distinct from the first message sender, and the second message includes a recipient identified by the second message sender; adds the text string manually marked by the first message sender and the distribution limit manually set by the first message sender to the database; examines the second message for the stored text string manually marked by the first message sender, wherein examining the second message includes extracting a suspicious text string from the second message and comparing the suspicious text string to the stored text string manually marked by the first message sender; examines the second message for the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender when the suspicious text string matches the stored text string manually marked by the first message sender, wherein examining the second message includes extracting the recipient identified by the second message sender and comparing the recipient to the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender; and transmits the second message over the network to the recipient identified by the second message sender when the recipient identified by the second message sender matches the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for controlling distribution of content in a message sent by a message sender, the method comprising:
-
receiving over a network from a mail client a first message created by a first message sender, the first message including; a text string manually marked by the first message sender as confidential content upon which a distribution limit should be placed, and a distribution limit manually set by the first message sender identifying one or more authorized recipients; receiving over the network from a mail client a second message subsequent to the first message, wherein the second message is distinct from the first message and created by a second message sender who is distinct than the first message sender, and the second message includes a recipient identified by the second message sender; adding the text string manually marked by the first message sender and the distribution limit manually set by the first message sender to a database stored in memory; examining the second message for the stored text string manually marked by the first message sender, wherein examining the second message includes extracting a suspicious text string from the second message and comparing the suspicious text string to the stored text string manually marked by the first message sender; examining the second message for the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender when the suspicious text string matches the stored text string manually marked by the first message sender, wherein examining the second message includes extracting the recipient identified by the second message sender and comparing the recipient to the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender; and transmitting the second message over the network to the recipient identified by the second message sender when the recipient identified by the second message sender matches the one or more authorized recipients identified in the stored distribution limit manually set by the first message sender. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification