Information Management System
First Claim
1. An information management system comprising:
- one or more workstations connected to a computer network, each workstation having a memory;
an application stored in said memory of each workstation for transmitting outbound data to said computer network and receiving inbound data from said computer network;
policy data containing rules specifying an appropriate encryption strength for outbound data, the encryption strength depending on the content of the data; and
an analyzer, said analyzer monitoring, in conjunction with said policy data, said outbound data and determining, in accordance with said rules in said policy data, an appropriate encryption strength for the outbound data;
wherein said analyzer controls transmission of said outbound data from said application in dependence upon said determination of an appropriate encryption strength.
3 Assignments
0 Petitions
Accused Products
Abstract
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyzer may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.
-
Citations
66 Claims
-
1. An information management system comprising:
-
one or more workstations connected to a computer network, each workstation having a memory; an application stored in said memory of each workstation for transmitting outbound data to said computer network and receiving inbound data from said computer network; policy data containing rules specifying an appropriate encryption strength for outbound data, the encryption strength depending on the content of the data; and an analyzer, said analyzer monitoring, in conjunction with said policy data, said outbound data and determining, in accordance with said rules in said policy data, an appropriate encryption strength for the outbound data;
wherein said analyzer controls transmission of said outbound data from said application in dependence upon said determination of an appropriate encryption strength. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 36, 37, 38)
-
-
23. A method of managing information comprising the steps of:
-
providing one or more workstations connected to a computer network, each workstation having a memory; providing an application stored in said memory of each workstation for transmitting outbound data to said computer network and receiving inbound data from said computer network; providing policy data containing rules specifying an appropriate encryption strength for outbound data, the encryption strength depending on the content of the data; and analyzing said outbound data to determine, in accordance with said rules in said policy data, an appropriate encryption strength for the outbound data; controlling transmission of said outbound data from said application in dependence upon the determination of an appropriate encryption strength in said analyzing step. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 39, 40, 41, 42, 43, 44)
-
-
45. An information management system comprising:
-
one or more workstations connected to a computer network, each workstation having a memory; application means, stored in said memory of each workstation, for transmitting outbound data to said computer network and receiving inbound data from said computer network; policy storage means, for storing policy data containing rules specifying an appropriate encryption strength for outbound data, the encryption strength depending on the content of the data; and analyzing means for monitoring, in conjunction with said policy data, said outbound data to determine, in accordance with said rules in said policy data, an appropriate encryption strength for the outbound data; wherein said analyzing means controls transmission of said outbound data from said application means in dependence upon said determination of an appropriate encryption strength. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
Specification