SECURE DOMAIN INFORMATION PROTECTION APPARATUS AND METHODS
First Claim
1. A machine-implemented method comprising:
- determining whether service access information associated with access, by an external user that is outside a secure domain, to a service provided in the secure domain includes sensitive information; and
performing a protection action to protect the sensitive information, where the service access information includes sensitive information.
4 Assignments
0 Petitions
Accused Products
Abstract
Secure domain information protection apparatus and methods are disclosed. Service access information associated with access, by an external user that is outside a secure domain, to a service that is provided in the secure domain is processed to determine whether it includes sensitive information. If so, a protection action is performed on the service access information, on an entire service message or to one or more portions thereof, for example, to protect the sensitive information. A specification language and execution environment are also proposed to provide for high speed processing. Sensitive information detection criteria, protection actions, and possibly targets on which the protection actions are to be performed, may be identified in a data structure stored on a machine-readable medium.
28 Citations
26 Claims
-
1. A machine-implemented method comprising:
-
determining whether service access information associated with access, by an external user that is outside a secure domain, to a service provided in the secure domain includes sensitive information; and performing a protection action to protect the sensitive information, where the service access information includes sensitive information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a service access information processor operable to determine whether service access information associated with access, by an external user that is outside a secure domain, to a service provided in the secure domain includes sensitive information; and a protection module operatively coupled to the service access information processor and operable to perform a protection action to protect the sensitive information, where the service access information includes sensitive information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A machine-readable medium storing a data structure, the data structure comprising:
-
a detection criterion identifying sensitive information; and a protection action field identifying a protection action to be performed to protect the sensitive information identified in the detection criterion where the identified sensitive information is detected in service access information associated with access, by an external user that is outside a secure domain, to a service provided in the secure domain. - View Dependent Claims (26)
-
Specification