Electronic Data Integrity Checking and Validation
First Claim
Patent Images
1. A method comprising:
- determining a security identifier based on a received message;
selecting a data integrity policy from a plurality of data integrity policies based on the security identifier;
determining whether the received message is validated in accordance with the selected data integrity policy;
passing the received message to quarantine if the received message is not validated in the operation of determining whether the received message is validated.
1 Assignment
0 Petitions
Accused Products
Abstract
An integrated electronic data communications system enforces a data integrity policy to validate the electronic data (e.g., determine whether the electronic data is a corporate asset or an unwanted threat). Upon validation, data is archived in real time in a searchable repository, encrypted/decrypted automatically, and forwarded to a mobile device, if appropriate. Example electronic data that may be communicated through such a system may include without limitation email, VOIP data, FTP data, Web traffic, data communicated through a corporation'"'"'s Virtual Private Network (VPN), etc.
59 Citations
38 Claims
-
1. A method comprising:
-
determining a security identifier based on a received message; selecting a data integrity policy from a plurality of data integrity policies based on the security identifier; determining whether the received message is validated in accordance with the selected data integrity policy; passing the received message to quarantine if the received message is not validated in the operation of determining whether the received message is validated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A tangible computer-readable medium having computer-executable instructions for performing a computer process, the computer process comprising:
-
selecting a data integrity policy from a plurality of data integrity policies based on a security identifier associated with a received message; determining whether the received message is validated in accordance with the selected data integrity policy; passing the received message to quarantine if the received message is not validated in the determining operation. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A tangible computer-readable medium having computer-executable instructions for performing a computer process, the computer process comprising:
-
identifying a data integrity policy based on a security identifier associated with the received message; validating the received message based on the identified data integrity policy; recording the validated received message in a searchable archive; transmitting the validated and recorded received message via a communications network. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method comprising:
-
identifying a data integrity policy associated with a received message; validating the received message based on the identified data integrity policy; recording the validated received message in a searchable archive; transmitting the validated and recorded received message via a communications network. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
Specification