Node-based policy-enforcement across mixed media, mixed-communications modalities and extensible to cloud computing such as SOA
First Claim
Patent Images
1. A method, comprising:
- receiving, by a hardware microprocessor, in a first communication session, existing media content from a communication device of a first subscriber, wherein the first subscriber has privileged access to the existing media content;
analyzing, by the hardware microprocessor, the existing media content in the first communication session to identify a behavior of a second subscriber relevant to a policy or rule, wherein the second subscriber has privileged access to the existing media content, wherein the existing media content of the first communication session is accessed by a communication device of the second subscriber, wherein the behavior is the communication device of the second subscriber receiving input attempting to make the existing media content in the first communication session accessible to one or more communication devices of one or more selected other parties in another communication session, and wherein at least one of the one or more selected other parties does not have privileged access to the existing media content;
notifying, by the hardware microprocessor, a policy enforcement server of the identified behavior; and
receiving, by the hardware microprocessor, and from the policy enforcement server, a policy measure to be implemented; and
implementing, by the hardware processor, the received policy measure, wherein the implemented received policy measure is to deny the input attempting to make the existing media content in the first communication session accessible to the communication device of the at least one of the one or more selected other parties who does not have privileged access to the existing media content.
18 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a hardware microprocessor, in a first communication session, existing media content from a communication device of a first subscriber, wherein the first subscriber has privileged access to the existing media content; analyzing, by the hardware microprocessor, the existing media content in the first communication session to identify a behavior of a second subscriber relevant to a policy or rule, wherein the second subscriber has privileged access to the existing media content, wherein the existing media content of the first communication session is accessed by a communication device of the second subscriber, wherein the behavior is the communication device of the second subscriber receiving input attempting to make the existing media content in the first communication session accessible to one or more communication devices of one or more selected other parties in another communication session, and wherein at least one of the one or more selected other parties does not have privileged access to the existing media content; notifying, by the hardware microprocessor, a policy enforcement server of the identified behavior; and receiving, by the hardware microprocessor, and from the policy enforcement server, a policy measure to be implemented; and implementing, by the hardware processor, the received policy measure, wherein the implemented received policy measure is to deny the input attempting to make the existing media content in the first communication session accessible to the communication device of the at least one of the one or more selected other parties who does not have privileged access to the existing media content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a hardware microprocessor; and a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that cause the microprocessor to execute; a first policy agent, implemented in a driver and corresponding to a first node and a communication device of a second subscriber that; receives, in a first communication session, existing media content from a communication device of a first subscriber, wherein the first subscriber has privileged access to the existing media content, analyzes the first communication session and the existing media content in the first communication session to identify a behavior of the second subscriber relevant to a policy or rule, wherein the second subscriber has privileged access to the existing media content, wherein the existing media content in the first communication session is accessed by the second subscriber communication device, wherein the behavior is the communication device of the second subscriber receiving input attempting to make the existing media content in the first communication session accessible to one or more communication devices of one or more selected other parties in another communication session, and wherein at least one of the one or more selected other parties does not have privileged access to the existing media content; notifies a policy enforcement server of the identified behavior; and implements a policy measure received from the policy enforcement server in response to the notification, wherein the implemented received policy measure is to deny the input attempting to make the existing media content in the first communication session accessible to the communication device of the at least one of the one or more selected other parties who does not have privileged access to the existing media content. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A communication node with a hardware microprocessor, comprising:
a policy agent, executed by the hardware microprocessor, in a class driver, that searches, analyzes, or tags a received first communication session and existing media content in the first communication session to identify an actual or potential policy or rule violation, wherein the first communication is with a communication device of a first subscriber, wherein the first subscriber has privileged access to the existing media content, reports the actual or potential policy or rule violation to a policy enforcement server, wherein the existing media content in the first communication session is accessed by a communication device of a second subscriber, wherein the violation is the second subscriber communication device receiving input attempting to make the existing media content in the first communication session accessible to one or more communication devices of one or more selected other parties in another communication session, and wherein at least one of the one or more selected other parties does not have privileged access to the existing media content, and implements a received policy measure is to deny the input attempting to make the existing media content in the first communication session accessible to the communication device of the at least one of the one or more selected other parties who does not have privileged access to the existing media content. - View Dependent Claims (20)
Specification