US 11,989,323 B1
Information security implementations with extended capabilities
Mehdi Salour, Campbell, CA (US)
Assigned to 8x8, Inc., Campbell, CA (US)
Filed by 8x8, Inc., Campbell, CA (US)
Filed on Dec. 2, 2022, as Appl. No. 18/074,022.
Application 18/074,022 is a continuation of application No. 17/175,398, filed on Feb. 12, 2021, granted, now 11,520,927, issued on Dec. 6, 2022.
Application 17/175,398 is a continuation of application No. 16/665,827, filed on Oct. 28, 2019, granted, now 10,922,434, issued on Feb. 16, 2021.
Application 16/665,827 is a continuation of application No. 14/566,172, filed on Dec. 10, 2014, granted, now 10,462,165, issued on Oct. 29, 2019.
Application 14/566,172 is a continuation of application No. 13/046,025, filed on Mar. 11, 2011, granted, now 8,918,867, issued on Dec. 23, 2014.
Claims priority of provisional application 61/313,426, filed on Mar. 12, 2010.
Int. Cl. G06F 21/00 (2013.01); G06F 11/30 (2006.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/6245 (2013.01) [G06F 11/3041 (2013.01); G06F 11/3072 (2013.01); G06F 21/60 (2013.01); H04L 63/1425 (2013.01); G06F 11/3006 (2013.01)] 24 Claims
OG exemplary drawing
 
1. A method comprising:
via processing circuitry communicatively coupled to or integrated with at least one server communicatively coupled to a plurality of client computers:
monitoring data communications of one of the plurality of client computers for access of sensitive data by reviewing the data communications related to a notification associated with said one of the plurality of client computers;
performing a security action, based on criteria used to indicate a sensitivity level, selected from among three or more sensitivity levels used by the processing circuitry, of the sensitive data and in response to information received from one or more of the plurality of client computers indicating an occurrence of first and second trigger events that are related to the received information or to an access of the sensitive data and that involve a clipboard-based copying operation associated with said one of the plurality of client computers; and
applying a learning algorithm that defines parameters for detecting the sensitive data and that adjusts a list of one or more approved locations, which are correlated with certain types of data associated with the three or more sensitivity levels, to protect the sensitive data from being sent to a location not in the list.