System and Methodology Providing Information Lockbox
First Claim
Patent Images
1. In a computer system, a method for protecting sensitive information, the method comprising:
- receiving input of sensitive information from a user;
computing a data shadow of the sensitive information for storage in a repository;
based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and
blocking any detected attempt to transmit the sensitive information that is not authorized by the user.
4 Assignments
0 Petitions
Accused Products
Abstract
A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and blocking any detected attempt to transmit the sensitive information that is not authorized by the user.
212 Citations
55 Claims
-
1. In a computer system, a method for protecting sensitive information, the method comprising:
-
receiving input of sensitive information from a user;
computing a data shadow of the sensitive information for storage in a repository;
based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and
blocking any detected attempt to transmit the sensitive information that is not authorized by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. In a computer system, a method for securing sensitive items from inappropriate access, the method comprising:
-
receiving input from a user indicating that a particular sensitive item is to be protected from inappropriate access;
storing metadata characterizing the particular sensitive item;
based on the stored metadata, detecting whether the particular sensitive item is present in any transmission of outgoing data; and
trapping any transmission of outgoing data that is detected to contain the particular sensitive item. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system providing security for sensitive information, the system comprising:
-
a data processing system receiving input of sensitive information;
a secure lockbox module for storing a secure descriptor characterizing the sensitive information; and
a security module for detecting, based on said secure descriptor, any attempted transmission of outgoing data that contains the sensitive information. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55)
-
Specification