Method and system for protecting confidential information
First Claim
Patent Images
1. A method for computer workstation based information protection, the method comprising:
- a) monitoring user'"'"'s actions on said computer workstation, b) analysis of said actions in respect to a pre-defined policy to determine whether said actions prejudice information to which said policy applies, and c) executing said policy in accordance with the results of said analysis to prevent or modify or restrict or monitor or log said actions.
20 Assignments
0 Petitions
Accused Products
Abstract
A method for computer workstation based information protection is presented, the method comprises: a) monitoring user'"'"'s actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.
-
Citations
146 Claims
-
1. A method for computer workstation based information protection, the method comprising:
-
a) monitoring user'"'"'s actions on said computer workstation, b) analysis of said actions in respect to a pre-defined policy to determine whether said actions prejudice information to which said policy applies, and c) executing said policy in accordance with the results of said analysis to prevent or modify or restrict or monitor or log said actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 67, 68, 69, 70, 71, 72)
-
-
66. A method according to claim 66, wherein said cryptographic hash is with respect to a random address in said clients software.
-
73. A method for information protection, said information comprising information items, said information being for usage on a computer workstation, comprising:
-
a) defining an information protection policy with respect to certain information item b) determining the measures required to protect said information according to said policy c) allowing said usage on a computer workstation of information comprising said items for which an information protection policy is defined only while said required measures are being applied. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80)
-
-
81. A method for information protection, said information comprising information items, said information being for presentation on a computer screen, comprising:
-
a) defining an information protection policy with respect to certain information item b) determining the measures required to resist screen capture according to said policy c) allowing presentation of information comprising items for which an information protection policy is defined on said computer screen only while said required measures are being applied. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106)
-
-
107. A method for computer workstation based information protection, the method comprising:
-
a) detecting an event occurring at said workstation, b) directing handling of said event, and c) employing information protection based on an assessment of an importance of said event to protection of information indicated as requiring protection technique. - View Dependent Claims (108, 109)
-
-
110. A system for computer workstation based information protection, the system comprising:
-
i) a monitor for monitoring user'"'"'s actions on said computer workstation;
ii) an analyzer for analyzing said actions in respect to a pre-defined policy to determine whether said actions prejudice information to which said policy applies, and iii) a policy execution module for executing said policy in accordance with the results of said analysis to prevent or modify or restrict or monitor or log said actions. - View Dependent Claims (111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129)
-
-
130. A system for information protection, said information comprising information items, said information being for usage on a computer workstation, comprising:
-
a) a policy reference monitor for defining an information protection policy with respect to certain information item and determining the measures required to protect said information according to said policy b) a policy execution module for allowing said usage on a computer workstation of information comprising said items for which an information protection policy is defined only while said required measures are being applied.
-
-
131. A system for information protection, said information comprising information items, said information being for presented presentation on a computer screen, comprising:
-
a) a policy reference monitor for defining an information protection policy with respect to an certain information item and determining the measures required to resist screen capture according to said policy b) a policy execution module for allowing presentation of information comprising items for which an information protection policy is defined on said computer screen only while said required measures are being applied. - View Dependent Claims (132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146)
-
Specification