摘要 |
A method of cloaking data including the steps of recognizing a combination of unclassified information becoming classified as a result of the combination of the information; and cloaking of a portion of the information responsive to a classified authorization of at least one of receiving equipment and users. The recognizing step and the cloaking step being carried out by a data handling machine.
|