Confidential content search engine system and method
First Claim
1. A method, in a data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
- retrieving one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
performing a security search of a client computing device to identify at least one item of information meeting the one or more security criteria;
retrieving search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
analyzing the search results to determine if the at least one item of information meets security policy compliance requirements; and
generating a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state.
1 Assignment
0 Petitions
Accused Products
Abstract
A confidential content search engine system and method are provided. With the system and method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
-
Citations
20 Claims
-
1. A method, in a data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
-
retrieving one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
performing a security search of a client computing device to identify at least one item of information meeting the one or more security criteria;
retrieving search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
analyzing the search results to determine if the at least one item of information meets security policy compliance requirements; and
generating a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 20)
-
-
11. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
retrieve one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
perform a security search of a client computing device to identify at least one item of information meeting the one or more security criteria;
retrieve search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
analyze the search results to determine if the at least one item of information meets security policy compliance requirements; and
generate a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system for searching a client computing device to identify items of information containing confidential information, comprising:
-
a processor;
a memory coupled to the processor; and
a storage device coupled to the processor, wherein the memory comprises computer executable instructions which, when executed by the processor, causes the processor to;
retrieve, from the storage device, one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
perform a security search of a client computing device to identify at least one item of information meeting the one or more security criteria;
retrieve search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
analyze the search results to determine if the at least one item of information meets security policy compliance requirements; and
generate a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state. - View Dependent Claims (19)
-
Specification