US 12,452,256 B2
Breach detection of secured confidential content system and methods
Jay P. Tokosch, Arnold, MD (US)
Assigned to NoteAffect, L.L.C., Arnold (MD)
Filed by NoteAffect, L.L.C., Arnold, MD (US)
Filed on Oct. 25, 2021, as Appl. No. 17/510,054.
Prior Publication US 2022/0131878 A1, Apr. 28, 2022
Int. Cl. H04L 29/06 (2006.01); G06F 16/14 (2019.01); G06F 21/60 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/1408 (2013.01) [G06F 16/148 (2019.01); G06F 21/604 (2013.01); G06F 2221/2113 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
associating content from a presenter with a rule indicating the content should not be shared;
determining that a client device has an application client running, the application client configured to access and present the content from the presenter;
allowing access to the content when the application client is running;
causing the application client to present the content when the application client is running;
causing a port of the client device used for screensharing to be monitored based on the application client receiving the rule indicating the content should not be shared;
detecting, using the application client, that screensharing of the content is occurring at the client device based on a bandwidth of outbound network traffic at the port exceeding a network traffic upload value associated with the rule during a monitoring interval;
receiving, from the application client, a notification of a breach indicating that the client device has breached a rule for a security level of the content, the breach being determined based on the detecting that the screensharing of the content is occurring; and
reporting the notification to a device associated with the presenter.