Apparatus and method for controlling unauthorized dissemination of electronic mail
First Claim
1. A method for classification and enforcement of security requirements in an information dissemination system, said information dissemination system not being designed for said security requirements and enforcement, the method comprising the steps of:
- accepting a user specification of said security requirements for dissemination of respective information, said specifying is done using a user interface;
Associating with said dissemination system an enforcement module, said module being operable to receive said security requirements and apply them to control dissemination via said dissemination system, and enforcing said dissemination via said module.
26 Assignments
0 Petitions
Accused Products
Abstract
A method for classification and enforcement of security requirements in an information dissemination system, said information dissemination system not being designed for said security requirements and enforcement. The method comprising the steps of: accepting a user specification of said security requirements for dissemination of respective information, said specifying is done using a user interface; Associating with said dissemination system an enforcement module, said module being operable to receive said security requirements and apply them to control dissemination via said dissemination system, and then enforcing said dissemination via said module.
-
Citations
24 Claims
-
1. A method for classification and enforcement of security requirements in an information dissemination system, said information dissemination system not being designed for said security requirements and enforcement, the method comprising the steps of:
-
accepting a user specification of said security requirements for dissemination of respective information, said specifying is done using a user interface;
Associating with said dissemination system an enforcement module, said module being operable to receive said security requirements and apply them to control dissemination via said dissemination system, and enforcing said dissemination via said module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for classification and enforcement of security requirements operating in conjunction with an information dissemination system, said information dissemination system not being designed for managing security, said system for classification and enforcement of security requirements comprising:
-
a user interface for specifying said security requirements for dissemination of a said information; and
an enforcement module associable with said information dissemination system, operable to receive said security requirements from said interface and to perform said enforcement via said association.. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification