Preventing conflicts of interests between two or more groups using applications
First Claim
Patent Images
1. A method of managing information comprising:
- providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization,wherein the first group of the organization includes a first user and a first application program managed by the information management system;
receiving a request from a first computer when the first user uses the first application program to connect to a second user to transfer a first component of information comprising;
determining a first component of information corresponds to an identifier designating the first component of information as confidential includes at least one of accessing contents of the first component of information and detecting a keyword in the contents;
or accessing a metadata information associated with the first component of information and detecting a keyword in the metadata information;
extracting at least one attribute associated with the first component of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first component of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first component of information;
receiving at least one translated rule at a second computer, wherein the translated rule is based on at least one rule in a first machine readable rule format that is incompatible with the second computer to a second machine readable rule format that is compatible with the second computer;
based on the at least one attribute and the at least one translated rule, evaluating at the second computer using rules stored at the policy server whether to allow access to the first component of information includes;
determining using information from the request to determine whether the first user'"'"'s use of the first application program to connect to the second user is during a specific time period of the organization,if determining to allow the request, with a policy enforcer program, transferring to the first computer a response to allow the first user to use the first application program to connect to the second user, andif determining to not allow the request, with the policy enforcer program, transferring to the first computer a response to deny the first user to use the first application program to connect to the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.
74 Citations
20 Claims
-
1. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization, wherein the first group of the organization includes a first user and a first application program managed by the information management system; receiving a request from a first computer when the first user uses the first application program to connect to a second user to transfer a first component of information comprising; determining a first component of information corresponds to an identifier designating the first component of information as confidential includes at least one of accessing contents of the first component of information and detecting a keyword in the contents;
or accessing a metadata information associated with the first component of information and detecting a keyword in the metadata information;extracting at least one attribute associated with the first component of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first component of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first component of information; receiving at least one translated rule at a second computer, wherein the translated rule is based on at least one rule in a first machine readable rule format that is incompatible with the second computer to a second machine readable rule format that is compatible with the second computer; based on the at least one attribute and the at least one translated rule, evaluating at the second computer using rules stored at the policy server whether to allow access to the first component of information includes; determining using information from the request to determine whether the first user'"'"'s use of the first application program to connect to the second user is during a specific time period of the organization, if determining to allow the request, with a policy enforcer program, transferring to the first computer a response to allow the first user to use the first application program to connect to the second user, and if determining to not allow the request, with the policy enforcer program, transferring to the first computer a response to deny the first user to use the first application program to connect to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization, wherein the first group of the organization includes a first user and a first application program managed by the information management system; receiving a request from a first computer to a second computer when the first user uses the first application program to connect to a second user to transfer a first component of information comprising; determining a first component of information corresponds to an identifier designating the first component of information as confidential includes accessing a metadata information associated with the first component of information; extracting at least one attribute associated with the first component of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first component of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first component of information; receiving at least one translated rule from the policy server at a second computer, wherein the translated rule is based on at least one rule in a first machine readable rule format that is incompatible with the second computer to a second machine readable rule format that is compatible with the second computer; and based on the at least one attribute, evaluating using the at least one translated rule from the policy server whether to allow access to the first component of information specified by the request includes determining whether the first user'"'"'s use of the first application program to connect to the second user is during a specific time period of the organization and evaluating a first rule to determine whether to allow access to the first component of information comprises selecting the first rule to evaluate and the first rule comprises the first conditional statement and a first abstraction component, the first abstraction component stored separately from the first rule at a third computer different than the first computer, and the first abstraction component comprises a second conditional statement. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization, wherein the first group of the organization includes a first user and a first application program managed by the information management system; before the request is received from the first computer, causing to be determined that the request originates from a computer application program identified in a grouping of applications installed on the first computer, wherein the grouping of applications identifies a list of computer application programs installed on the first computer that is managed by the information management system and the list of computer application programs comprises at least one of an instant messaging application, peer-to-peer application, voice-over-internet-protocol (VOIP) call application, e-mail application, file transfer protocol (FTP) application, web server application, or file server application; receiving a request from a first computer at a firewall before the request is completed when the first user uses the first application program to connect to a second user to transfer a first component of information comprising; intercepting by the firewall the request, before the connection to the second user has completed; determining a first component of information corresponds to an identifier designating the first component of information as confidential includes at least one of accessing contents of the first component of information and detecting a keyword in the contents;
or accessing a metadata information associated with the first component of information and detecting a keyword in the metadata information;extracting at least one attribute associated with the first component of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first component of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first component of information; receiving at least one translated rule at the firewall, wherein the translated rule is based on at least one rule in a first machine readable rule format that is incompatible with the firewall to control information usage to a second machine readable rule format that is compatible with the firewall to control information usage; based on the at least one attribute, evaluating using the at least one translated rule whether to allow access to the first component of information includes; evaluating a first rule comprising a first conditional statement and a first abstraction component, the first abstraction component stored separately from the first rule at a second computer different than the first computer; determining using information from the request to determine whether the first user'"'"'s use of the first application program to connect to the second user is during a specific time period of the organization, if determining to allow the request, releasing by the firewall the request to allow the first user to connect with the second user, and if determining to not allow the request, transferring to the first computer a response to deny the first user to use the first application program to connect to the second user.
-
Specification