Information management system
First Claim
1. A computer program product, for controlling a plurality of computers in a private network to manage information, the network having a data repository arranged to receive data from the plurality of computers and policy data containing rules defining relevant commercial data which is to be extracted from at least one of outbound data transmitted to a public network or inbound data received from the public network and stored in the data repository, comprising:
- a recording medium readable by the computer, having program code recorded thereon which when executed on each of said plurality of computers, configures said computers to;
analyse, in conjunction with an application running on each of said computers that is operable to transmit the outbound data and receive the inbound data, at least one of said outbound data and said inbound data, with reference to said policy data, to identify in at least one of said outbound data and said inbound data, relevant commercial data that is to be stored in said data repository in accordance with said rules in said policy data; and
cause said relevant commercial data to be stored in said data repository.
3 Assignments
0 Petitions
Accused Products
Abstract
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyser, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyser may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.
-
Citations
37 Claims
-
1. A computer program product, for controlling a plurality of computers in a private network to manage information, the network having a data repository arranged to receive data from the plurality of computers and policy data containing rules defining relevant commercial data which is to be extracted from at least one of outbound data transmitted to a public network or inbound data received from the public network and stored in the data repository, comprising:
-
a recording medium readable by the computer, having program code recorded thereon which when executed on each of said plurality of computers, configures said computers to;
analyse, in conjunction with an application running on each of said computers that is operable to transmit the outbound data and receive the inbound data, at least one of said outbound data and said inbound data, with reference to said policy data, to identify in at least one of said outbound data and said inbound data, relevant commercial data that is to be stored in said data repository in accordance with said rules in said policy data; and
cause said relevant commercial data to be stored in said data repository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product, for controlling a plurality of computers in a private network to record passwords and usernames, the network having a data repository arranged to receive data from the plurality of computers, said computer program product comprising:
-
a recording medium readable by the computer, having program code recorded thereon which when executed on each of said plurality of computers, configures said computers to;
analyse, in conjunction with an application running on the computer that is operable to transmit outbound data to the Internet and receive inbound data from the Internet, and/or an application running on the computer for receiving user input data, at least one of said user input data, said outbound data and said inbound data, to identify in at least one of said user input data, said outbound data and said inbound data, relevant commercial data that is to be stored in said data repository; and
control said computer to store said relevant commercial data in said data repository. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification