Method to establish virtual security perimeters
First Claim
1. A computer-implemented method to identify on a computer system outside of a security perimeter for classified information a breach of said security perimeter of said classified information in electronic format, said method comprising:
- (a) executing a classification software engine on at least one computer system authorized for said classified information, where said classification software engine comprising;
(1) establishing at least one unique code on said at least one computer system for said classified information authorized for said at least one computer system, where said at least one unique code uniquely identifies said classified information authorized for said at least one computer system, and(2) embedding said at least one unique code into at least one electronic storage media of said at least one computer system, thereby establishing a security perimeter for said classified information authorized for said at least one computer system,(b) executing a classification software engine on at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, where said classification software engine comprising;
(1) establishing said at least one unique code as a non-authorized said at least one unique code for said at least one computer system not authorized for said classified information and outside said security perimeter for said classified information,(2) monitoring a computer event of said at least one computer system not authorized for said classified information and outside said security perimeter,(3) detecting said non-authorized said at least one unique code within at least one electronic storage media involved with said computer event, where a detected said non-authorized said at least one unique code identifies a breach of said security perimeter for classified information on said at least one computer system not authorized for said classified information and outside said security perimeter, and(4) warning a predetermined entity of said breach of said security perimeter with information about said breach.
0 Assignments
0 Petitions
Accused Products
Abstract
A method to establish virtual security perimeters for classified electronic documents on a computer system. The security perimeters are based upon a full classification determination of all informational content of an electronic document file. The full classification determination is uniquely coded to identify a classification value, the classification regime used to classify the information as well as ownership of the electronic information of the electronic document, and is embedded in the electronic document. The classification determination code is matrixed with identification codes for elements of a file management system and used to control computer events initiated on a computer involving the electronic document. Computer events on computers are monitored for the coded full classification determination. The code scheme is also used to identify a breach of a security perimeter on a computer of an unauthorized classified electronic document and warning of the breach.
-
Citations
37 Claims
-
1. A computer-implemented method to identify on a computer system outside of a security perimeter for classified information a breach of said security perimeter of said classified information in electronic format, said method comprising:
-
(a) executing a classification software engine on at least one computer system authorized for said classified information, where said classification software engine comprising; (1) establishing at least one unique code on said at least one computer system for said classified information authorized for said at least one computer system, where said at least one unique code uniquely identifies said classified information authorized for said at least one computer system, and (2) embedding said at least one unique code into at least one electronic storage media of said at least one computer system, thereby establishing a security perimeter for said classified information authorized for said at least one computer system, (b) executing a classification software engine on at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, where said classification software engine comprising; (1) establishing said at least one unique code as a non-authorized said at least one unique code for said at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, (2) monitoring a computer event of said at least one computer system not authorized for said classified information and outside said security perimeter, (3) detecting said non-authorized said at least one unique code within at least one electronic storage media involved with said computer event, where a detected said non-authorized said at least one unique code identifies a breach of said security perimeter for classified information on said at least one computer system not authorized for said classified information and outside said security perimeter, and (4) warning a predetermined entity of said breach of said security perimeter with information about said breach. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 36)
-
-
16. A computer program product stored on non-transitory storage media to identify on a computer system outside of a security perimeter for classified information a breach of said security perimeter for said classified information in electronic format, said computer program product comprising at least one non-transitory storage media for electronic information, where said at least one non-transitory storage media for electronic information comprising at least one software classification engine, where said at least one software classification engine contains computer usable instructions comprising:
-
(a) establish at least one unique code on at least one computer system authorized for classified information, where said at least one unique code uniquely identifies said classified information authorized for said at least one computer system, (b) embed said at least one unique code into at least one non-transitory storage media for electronic information within said at least one computer system authorized for said classified information, thereby establishing a security perimeter for said classified information authorized for said at least one computer system, (c) establish said at least one unique code as a non-authorized said at least one unique code on at least one computer system not authorized for said classified information and outside of said security perimeter, (d) monitor a computer event of said at least one computer system outside said security perimeter, (e) detect said non-authorized said at least one unique code within a non-transitory storage media for electronic information involved with said computer event for said at least one computer system not authorized for said classified information, thereby identifying a breach of said security perimeter for said classified information, (f) warn a predetermined entity of said a breach of said security perimeter for said classified information with information about said breach.
-
-
19. A system to identify on a computer system outside of a security perimeter for classified information a breach of said security perimeter of said classified information in electronic format, said system comprising:
-
(a) at least one computer system where said at least one computer system comprising at least one non-transitory storage media for electronic information, where said at least one non-transitory storage media for electronic information comprising at least one software classification engine, where said at least one software classification engine contains computer usable instructions comprising; (1) establish at least one unique code on said at least one computer system authorized for said classified information, where said at least one unique code uniquely identifies said classified information authorized for said at least one computer system, (2) embed said at least one unique code into at least one non-transitory storage media for electronic information of said at least one computer system, thereby establishing a security perimeter for said classified information authorized for said at least one computer system, (b) at least one computer system not authorized for said classified information and outside said security perimeter, where said at least one computer system comprising at least one non-transitory storage media for electronic information, where said at least one non-transitory storage media for electronic information comprising at least one software classification engine, where said at least one software classification engine contains computer usable instructions comprising; (1) establish said at least one unique code as a non-authorized said at least one unique code for said at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, (2) monitor a computer event of said at least one computer system not authorized for said classified information, (3) detect said non-authorized said at least one unique code within at least one-non-transitory storage media for electronic information involved with said computer event, where when detected said non-authorized said at least one unique code is identifies a breach of said security perimeter for said classified information on said at least one computer system not authorized for said classified information and outside said security perimeter for said classified information, and (4) warn a predetermined entity of said breach of said security perimeter for said classified information with information about said breach. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 37)
-
Specification