Detection and Management of Controlled Files
First Claim
Patent Images
1. A method comprising:
- receiving a security policy from a remote server, said security policy defining at least one protected element and a disposition action for a file containing said protected element;
scanning a file system for said at least one protected element;
finding a first file containing said protected element; and
performing said disposition action on said first file.
2 Assignments
0 Petitions
Accused Products
Abstract
A remote device may receive a policy definition, search a file system for files that are to be protected, and disposition identified files to protect the files. After completing the protection, a report is generated and transmitted to a centralized location. The policy definition may include keywords, directory paths, metadata, or other information that may be used to identify files for protection. After identification, the files may be dispositioned by removal, tagging, encrypting, applying rights management, or other actions.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a security policy from a remote server, said security policy defining at least one protected element and a disposition action for a file containing said protected element; scanning a file system for said at least one protected element; finding a first file containing said protected element; and performing said disposition action on said first file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
defining a security policy, said security policy defining at least one protected element and a disposition for a file containing said at least one protected element; transferring said security policy to a remote device, said remote device being adapted to; scan a file system for said at least one protected element to find a first file; and apply said security policy to said first file; receive a report from said remote device, said report being based on said scanning and said applying. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A system comprising:
-
a policy generator adapted to generate a security policy defining at least one protected element and a disposition for a file containing said protected element; a file scanner operable on a remote device and adapted to; scan a file system for said at least one protected element to find a first file; and apply said security policy to said first file. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification