×

Preventing conflicts of interests between two or more groups using applications

  • US 10,380,363 B2
  • Filed: 03/28/2016
  • Issued: 08/13/2019
  • Est. Priority Date: 12/29/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing information comprising:

  • providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization,wherein the first group of the organization includes a first user and a first application program managed by the information management system;

    receiving a request from a first computer when the first user uses the first application program to connect to a second user to transfer a first component of information comprising;

    determining a first component of information corresponds to an identifier designating the first component of information as confidential includes at least one of accessing contents of the first component of information and detecting a keyword in the contents;

    or accessing a metadata information associated with the first component of information and detecting a keyword in the metadata information;

    extracting at least one attribute associated with the first component of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first component of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first component of information;

    receiving at least one translated rule at a second computer, wherein the translated rule is based on at least one rule in a first machine readable rule format that is incompatible with the second computer to a second machine readable rule format that is compatible with the second computer;

    based on the at least one attribute and the at least one translated rule, evaluating at the second computer using rules stored at the policy server whether to allow access to the first component of information includes;

    determining using information from the request to determine whether the first user'"'"'s use of the first application program to connect to the second user is during a specific time period of the organization,if determining to allow the request, with a policy enforcer program, transferring to the first computer a response to allow the first user to use the first application program to connect to the second user, andif determining to not allow the request, with the policy enforcer program, transferring to the first computer a response to deny the first user to use the first application program to connect to the second user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×