Systems and methods to secure restricted information
First Claim
Patent Images
1. An apparatus to secure information, comprising:
- a processor; and
a storage device in communication with said processor and storing instructions adapted to be executed by said processor to;
verifying a user request based on (i) user information, (ii) a unique address associated with a workstation, and (iii) a request authentication procedure, if the user request is verified, arrange for an application to be executed at a secure application server within a secure network and for information to be exchanged between the secure application server and the workstation through a firewall associated with the secure network, wherein the workstation is outside the secure network, determine whether the user is allowed to access a file stored at a secure file server within the secure network based at least in part on access information associated with the file, and if the user is allowed to access the file, arrange for information associated with the file to be provided to the application executing at the secure application server.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided to secure restricted information, such as restricted financial information. According to some embodiments, a user'"'"'s request to execute an application on a secure application server is verified based on a user name, a user password, a unique identifier associated with a workstation, and a request authentication procedure. Moreover, according to some embodiments a file having restricted information cannot be attached to an email message. In still other embodiments, one display unit displays non-restricted information while another display unit displays restricted information.
-
Citations
28 Claims
-
1. An apparatus to secure information, comprising:
-
a processor; and
a storage device in communication with said processor and storing instructions adapted to be executed by said processor to;
verifying a user request based on (i) user information, (ii) a unique address associated with a workstation, and (iii) a request authentication procedure, if the user request is verified, arrange for an application to be executed at a secure application server within a secure network and for information to be exchanged between the secure application server and the workstation through a firewall associated with the secure network, wherein the workstation is outside the secure network, determine whether the user is allowed to access a file stored at a secure file server within the secure network based at least in part on access information associated with the file, and if the user is allowed to access the file, arrange for information associated with the file to be provided to the application executing at the secure application server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method to secure information, comprising:
-
determining that a user is attempting to attach information to an email message;
automatically determining if the information includes restricted information; and
if the information includes restricted information, arranging to insert into the email message a link to the restricted information without attaching the restricted information to the email message. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A medium storing instructions adapted to be executed by a processor to perform a method to secure information, said method comprising:
-
determining that a user is attempting to attach information to an email message, automatically determining if the information includes restricted information, and if the information includes restricted information, arranging to insert into the email message a link to the restricted information without attaching the restricted information to the email message.
-
-
17. A method to secure information, comprising:
-
verifying a user request based on (i) user information, (ii) a unique identifier associated with a workstation, and (iii) a request authentication procedure;
if the user request is verified, arranging for an application to be executed at a secure application server within a secure network and for information to be exchanged between the secure application server and the workstation through a firewall associated with the secure network, wherein the workstation is outside the secure network;
determining whether the user is allowed to access a file stored at a secure file server within the secure network based at least in part on access information associated with the file; and
if the user is allowed to access the file, arranging for information associated with the file to be provided to the application executing at the secure application server. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method to secure information, comprising:
-
arranging for non-restricted information to be displayed on a first display unit associated with a workstation; and
arranging for restricted information to be displayed on a second display unit associated with the workstation. - View Dependent Claims (24, 25, 26)
-
-
27. An apparatus, comprising:
-
a workstation;
a first display unit associated with the workstation; and
a second display unit associated with the workstation, wherein the first display unit is to display non-restricted information and the second display unit is to display restricted information.
-
-
28. A method to secure information, comprising:
-
receiving a request to send restricted financial information from a secure file server within a secure network to a printer outside the secure network; and
if the printer is authorized to output the restricted financial information, transmitting the restricted financial information to the printer.
-
Specification