Method and system for scanning a computer system for sensitive content
First Claim
1. A computer-implemented method for managing a scan of a computer for sensitive data, the computer-implemented method comprising the steps of:
- providing a first computer comprising a computer-readable medium and a scan manager module;
receiving at the first computer a request to scan a second computer and identify files stored on the second computer based on at least one category of sensitive information;
receiving at the first computer recipient information comprising information identifying intended recipients of a scan report containing results of the scan; and
using the scan manager module to respond to the request to scan by;
generating a user profile based on the at least one category of sensitive information and the recipient information;
making the user profile available to a category server for use in creating a scan profile defining scan criteria;
deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile; and
when the scan is complete, making a scan report generated by the category server available to the intended recipients based on the recipient information.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for scanning a computer system for sensitive data. A scan manager manages a scan of files of a second computer. The scan manager receives a request to scan and identify files stored on the second computer based on at least one category of sensitive data. The scan manager receives scan report recipient information and generates a user profile based on the at least one category and the recipient information. The scan manager makes the user profile available to a category server for use in creating a scan profile defining the scan criteria and deploys a scan agent to a computer to conduct the scan based on the scan profile. When the scan is complete and upon creation of the scan report, the scan manager makes the scan report available to the intended recipients.
-
Citations
31 Claims
-
1. A computer-implemented method for managing a scan of a computer for sensitive data, the computer-implemented method comprising the steps of:
-
providing a first computer comprising a computer-readable medium and a scan manager module; receiving at the first computer a request to scan a second computer and identify files stored on the second computer based on at least one category of sensitive information; receiving at the first computer recipient information comprising information identifying intended recipients of a scan report containing results of the scan; and using the scan manager module to respond to the request to scan by; generating a user profile based on the at least one category of sensitive information and the recipient information; making the user profile available to a category server for use in creating a scan profile defining scan criteria; deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile; and when the scan is complete, making a scan report generated by the category server available to the intended recipients based on the recipient information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product, comprising a computer-readable medium having computer-readable program code embodied therein, said computer-readable program code comprising instructions adapted to be executed to implement a method for managing a scan of a computer system for sensitive data, comprising the steps of:
-
providing a first computer comprising a computer-readable medium and a scan manager module; receiving at the first computer a request to scan a second computer and identify files stored on the second computer based on at least one category of sensitive information; receiving at the first computer recipient information comprising information identifying intended recipients of a scan report containing results of the scan; using the scan manager module to respond to the request to scan by; generating a user profile based on the at least one category of sensitive information and the recipient information; making the user profile available to a category server for use in creating a scan profile defining scan criteria; deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile; and when the scan is complete, making a scan report generated by the category server available to the intended recipients. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A system for managing a scan of a computer system for sensitive data, said system comprising:
-
a first computer comprising a scan manager; and a computer-readable medium storing data and instructions; wherein the scan manager is configured to access the computer-readable medium for data and instructions and, when executing the instructions, to perform the computer-implemented steps on the first computer for managing the scan of files of a second computer, and wherein said first computer is adapted to; receive a request to scan the second computer and identify files stored on the second computer based on at least one category of sensitive information; and receive at the first computer recipient information comprising information identifying intended recipients of a scan report containing results of the scan; and wherein said scan manager is adapted to; generate a user profile based on the at least one category of sensitive information and the recipient information; send the user profile to a category server for use in creating a scan profile defining scan criteria; deploy a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile; and when the scan is complete, make a scan report generated by the category server available to the intended recipients. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification