A method, system and non-transitory computer-readable medium product are provided for watermarking detection and management. In the context of a method, a method is provided that includes identifying at least one resource accessible to a user device and determining whether a watermark template is ap
A method, system and non-transitory computer-readable medium product are provided for watermarking detection and management. In the context of a method, a method is provided that includes identifying at least one resource accessible to a user device and determining whether a watermark template is applied to the at least one resource accessible to the user device. The method further includes identifying at least one compliance rule and determining whether the at least one compliance rule is satisfied in response to a determination that the watermark template is applied to the at least one resource accessible to the user device. The method yet further includes performing at least one remedial action in response to a determination that the at least one compliance rule is not satisfied.
대표청구항▼
1. A computer-implemented method, comprising: causing, by a computing device that manages a user device enrolled with a remote service operated through the computing device through a network, a scan of memory of the user device or a remote storage device to identify at least one resource that has be
1. A computer-implemented method, comprising: causing, by a computing device that manages a user device enrolled with a remote service operated through the computing device through a network, a scan of memory of the user device or a remote storage device to identify at least one resource that has been made accessible to the user device;determining, by the computing device, that a watermark template has been applied to the at least one resource, the watermark template comprising a plurality of data elements, at least a portion of the plurality of data elements added when the at least one resource was generated or modified, a first one of the plurality of data elements comprising a function performed on the user device that generated or modified the at least one resource and a second one of the plurality of data elements comprising a sensitivity level associated with the at least one resource;in response to a determination that the watermark template has been applied to the at least one resource accessible to the user device: identifying, by the computing device, at least one compliance rule according to the watermark template applied to the at least one resource, wherein the at least one compliance rule requires that the function performed on the user device comply with the sensitivity level associated with the at least one resource;determining, by the computing device, that the user device does not comply with the at least one compliance rule in response to the function identified from the first one of the plurality of data elements not complying with the sensitivity level; andin response to the user device not complying with the at least one compliance rule, performing, by the computing device, at least one remedial action in association with the at least one resource specified by the at least one compliance rule, the at least one remedial action comprising at least one of: a denial of access to the at least one resource by the user device,a removal of the at least one resource from the memory of the user device, ora removal of the at least one resource from memory of the remote storage device. 2. The computer-implemented method of claim 1, wherein the remote storage device comprises a server communicatively coupled to the user device. 3. The computer-implemented method of claim 2, wherein the server communicatively coupled to the user device comprises a proxy server or a file server. 4. The computer-implemented method of claim 1, wherein the at least one compliance rule requires that the user device be associated with a certain enterprise. 5. The computer-implemented method of claim 4, wherein the user device is associated with the certain enterprise if user account data associated with the user device indicates that a user of the user device is employed by the certain enterprise. 6. The computer-implemented method of claim 4, wherein the user device is associated with the certain enterprise if user account data indicates that the user device is owned by the certain enterprise or managed by the certain enterprise through an enterprise mobility management service. 7. The computer-implemented method of claim 4, further comprising determining, by the computing device, that the at least one watermark template was applied by a foreign device associated with a foreign enterprise, the foreign enterprise being different than the certain enterprise. 8. The computer-implemented method of claim 1, wherein the at least one compliance rule requires that the watermark template specify an association between the at least one resource and an enterprise. 9. The computer-implemented method of claim 1, wherein the at least one compliance rule requires that the watermark template specify a sensitivity level associated with the at least one resource. 10. The computer-implemented method of claim 1, wherein determining, by the computing device, that the watermark template has been applied to the at least one resource comprises: identifying, by the computing device, a file associated with the at least one resource containing metadata describing the at least one resource; andanalyzing, by the computing device, the file to determine that the watermark template has been applied to the at least one resource using the metadata, wherein the metadata comprises the plurality of data elements. 11. The computer-implemented method of claim 1, wherein the scan of the memory of the user device or the remote storage is caused in response to an onboarding process where the user device is enrolled with an enterprise mobility management service. 12. A system, comprising: at least one computing device comprising at least one hardware processor; andprogram instructions executable in the at least one computing device that, when executed, cause the at least one computing device to: scan memory of a user device or a remote storage device to identify at least one resource that has been made accessible to the user device;determine that a watermark template has been applied to the at least one resource, the watermark template comprising a plurality of data elements, at least a portion of the plurality of data elements added when the at least one resource was generated or modified, a first one of the plurality of data elements comprising a function performed on the user device that generated or modified the at least one resource and a second one of the plurality of data elements comprising a sensitivity level associated with the at least one resource;in response to a determination that the watermark template has been applied to the at least one resource accessible to the user device: identify at least one compliance rule according to the watermark template applied to the at least one resource, wherein the at least one compliance rule requires that the function performed on the user device comply with the sensitivity level associated with the at least one resource;determine that the user device does not comply with the at least one compliance rule in response to the function identified from the first one of the plurality of data elements not complying with the sensitivity level; andin response to the user device not complying with the at least one compliance rule, perform at least one remedial action in association with the at least one resource specified by the at least one compliance rule, the at least one remedial action comprising at least one of: a denial of access to the at least one resource by the user device,a removal of the at least one resource from the memory of the user device, ora removal of the at least one resource from memory of the remote storage device. 13. The system of claim 12, wherein the removal of the at least one resource from the memory of the user device or the remote storage device comprises deleting the at least one resource. 14. The system of claim 12, wherein the at least one remedial action further comprises quarantining the at least one resource. 15. The system of claim 12, wherein the removal of the at least one resource from the memory of the user device or the remote storage device comprises deleting only a portion of resource data residing in the memory of the user device or the remote storage device. 16. The system of claim 12, wherein the at least one remedial action comprises transmitting at least one notification regarding the at least one resource. 17. The system of claim 12, wherein determining that the watermark template has been applied to the at least one resource comprises: identifying a file associated with the at least one resource containing metadata describing the at least one resource; andanalyzing the file to determine that the watermark template has been applied to the at least one resource using the metadata, wherein the metadata comprises the plurality of data elements. 18. A non-transitory computer-readable medium having program code executable by at least one computing device stored thereon that, when executed, causes the at least one computing device to: scan memory of a user device or a remote storage device to identify at least one resource that has been made accessible to the user device;determine that a watermark template has been applied to the at least one resource, the watermark template comprising a plurality of data elements, at least a portion of the plurality of data elements added when the at least one resource was generated or modified, a first one of the plurality of data elements comprising a function performed on the user device that generated or modified the at least one resource and a second one of the plurality of data elements comprising a sensitivity level associated with the at least one resource;in response to a determination that the watermark template has been applied to the at least one resource accessible to the user device: identify at least one compliance rule according to the watermark template applied to the at least one resource, wherein the at least one compliance rule requires that the function performed on the user device comply with the sensitivity level associated with the at least one resource;determine that the user device does not comply with the at least one compliance rule in response to the function identified from the first one of the plurality of data elements not complying with the sensitivity level; andin response to the user device not complying with the at least one compliance rule, perform at least one remedial action in association with the at least one resource specified by the at least one compliance rule, the at least one remedial action comprising at least one of: a denial of access to the at least one resource by the user device,a removal of the at least one resource from the memory of the user device, ora removal of the at least one resource from memory of the remote storage device. 19. The non-transitory computer-readable medium of claim 18, wherein the program code, when executed, further causes the at least one computing device to determine that the at least one watermark template was applied by a foreign device associated with a foreign enterprise. 20. The non-transitory computer-readable medium of claim 18, wherein determining that the watermark template has been applied to the at least one resource comprises: identifying a file associated with the at least one resource containing metadata describing the at least one resource; andanalyzing the file to determine that the watermark template has been applied to the at least one resource using the metadata, wherein the metadata comprises the plurality of data elements.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (123)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Fields, Duane Kimbell; Gregg, Thomas Preston; Hassinger, Sebastian Daniel; Hurley, II, William Walter; Kolb, Mark Andrew; Vu, Stacy Braden, Method and system for distributing image-based content on the internet.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.