A method, system and non-transitory computer-readable medium product are provided for shared resource watermarking and management. In the context of a method, a method is provided that includes identifying requests to share resources from a device and identifying a watermark template. The method fur
A method, system and non-transitory computer-readable medium product are provided for shared resource watermarking and management. In the context of a method, a method is provided that includes identifying requests to share resources from a device and identifying a watermark template. The method further includes associating the watermark template with the resources, and authorizing the request to share the resources from the device.
대표청구항▼
1. A method comprising: identifying, using a user device, a request to transmit at least one resource;responsive to the request to transmit the at least one resource, identifying, using the user device, whether at least one compliance rule specifies that the at least one resource is required to be a
1. A method comprising: identifying, using a user device, a request to transmit at least one resource;responsive to the request to transmit the at least one resource, identifying, using the user device, whether at least one compliance rule specifies that the at least one resource is required to be associated with at least one watermark template in order for the user device to be authorized to transmit the at least one resource;responsive to identifying that the at least one compliance rule specifies that the at least one resource is required to be associated with the at least one watermark template in order for the user device to be authorized to transmit the at least one resource, identifying, using the user device, whether the at least one watermark template is associated with the at least one resource; andresponsive to identifying that the at least one watermark template is not associated with the at least one resource: associating, using the user device, the at least one watermark template with the at least one resource; andadding, using the user device, data describing the at least one resource to the at least one watermark template. 2. The method of claim 1, wherein the data describing the at least one resource is defined by an administrator of the at least one resource. 3. The method of claim 1, wherein the data describing the at least one resource comprises at least one sensitivity level associated with the at least one resource. 4. The method of claim 3, wherein the at least one sensitivity level associated with the at least one resource comprises an indication that the at least one resource is managed by a particular enterprise. 5. The method of claim 3, wherein the at least one sensitivity level associated with the at least one resource comprises an indication that the at least one resource is managed by a resource server communicatively coupled to the user device. 6. The method of claim 3, wherein the at least one sensitivity level associated with the at least one resource comprises an indication that the at least one resource is confidential information of a particular enterprise. 7. The method of claim 3, wherein the at least one sensitivity level associated with the at least one resource comprises an indication that the at least one resource is proprietary property of a particular enterprise. 8. The method of claim 3, wherein the at least one sensitivity level associated with the at least one resource comprises an indication that the at least one resource is protected by legal privilege. 9. The method of claim 1, wherein the data describing the at least one resource comprises at least one security requirement associated with the at least one resource. 10. The method of claim 1, further comprising: identifying, using the user device, dynamic descriptive data describing the at least one resource; andadding, using the user device, the dynamic descriptive data describing the at least one resource to the at least one watermark template. 11. The method of claim 10, wherein the dynamic descriptive data describing the at least one resource comprises first dynamic descriptive data describing the at least one resource in a first instance, the method further comprising: identifying, using the user device, second dynamic descriptive data describing the at least one resource in a second instance; andadding, using the user device, the second dynamic descriptive data describing the at least one resource in the second instance to the at least one watermark template. 12. The method of claim 10, wherein the dynamic descriptive data describing the at least one resource comprises at least one indication of whether at least one other user device that previously took action upon the at least one resource was compliant with the at least one compliance rule. 13. The method of claim 1, further comprising: causing, using the user device, at least one event log to be created. 14. The method of claim 13, further comprising: causing, using the user device, the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 15. The method of claim 13, the at least one event log describing an association of the at least one watermark template to the at least one resource. 16. The method of claim 13, the at least one event log describing an authorization of the request to transmit the at least one resource. 17. An apparatus comprising: at least one processor; andat least one memory accessible to the at least one processor, the at least one memory storing a plurality of compliance rules used to enforce a plurality of security requirements, the at least one memory further storing a plurality of program code instructions that, when executed by the at least one processor, direct the at least one processor to at least:identify a request by the at least one processor to transmit at least one resource;responsive to the request to transmit the at least one resource, identify whether at least one of the compliance rules specifies that the at least one resource is required to be associated with at least one watermark template in order for the at least one processor to be authorized to transmit the at least one resource;responsive to identifying that the at least one of the compliance rules specifies that the at least one resource is required to be associated with the at least one watermark template, identify whether the at least one watermark template is associated with the at least one resource;responsive to identifying that the at least one watermark template is not associated with the at least one resource: associate the at least one watermark template with the at least one resource; andadd static descriptive data describing the at least one resource to the at least one watermark template. 18. The apparatus of claim 17, wherein the at least one of the compliance rules further specifies that the at least one processor is required to be communicatively coupled to a predefined access point in order for the at least one processor to be authorized to transmit the at least one resource. 19. The apparatus of claim 17, wherein the at least one of the compliance rules further specifies that the at least one processor is required to be located within a predefined geographical location in order for the at least one processor to be authorized to transmit the at least one resource. 20. A computer program product comprising a non-transitory computer-readable storage medium having a plurality of program code portions embodied therein, the program code portions being configured to upon execution, direct at least one computing device to at least: identify a request to transmit at least one resource;responsive to the request to transmit the at least one resource, identify whether at least one compliance rule specifies that the at least one resource is required to be associated with at least one watermark template in order for the at least one computing device to be authorized to transmit the at least one resource;responsive to identifying that the at least one compliance rule specifies that the at least one resource is required to be associated with the at least one watermark template in order for the at least one computing device to be authorized to transmit the at least one resource, identify whether the at least one watermark template is associated with the at least one resource; andresponsive to identifying that the at least one watermark template is not associated with the at least one resource: associate the at least one watermark template with the at least one resource; andadd static descriptive data describing the at least one resource to the at least one watermark template.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (118)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.