METHOD AND APPARATUS TO REPORT POLICY VIOLATIONS IN MESSAGES
First Claim
Patent Images
1. A method comprising:
- searching text in a message for fragments that match use-restricted content from one or more columns and any one or more rows within a tabular structure of the use-restricted content;
identifying a violation by detecting fragments in the message that match use-restricted content from the one or more columns and any one or more rows within the tabular structure; and
specifying, as part of reporting the violation, the fragments that match the information from the one or more columns and any one or more rows within the tabular structure.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for reporting policy violations in messages is described. A violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.
111 Citations
20 Claims
-
1. A method comprising:
-
searching text in a message for fragments that match use-restricted content from one or more columns and any one or more rows within a tabular structure of the use-restricted content; identifying a violation by detecting fragments in the message that match use-restricted content from the one or more columns and any one or more rows within the tabular structure; and specifying, as part of reporting the violation, the fragments that match the information from the one or more columns and any one or more rows within the tabular structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a memory; and a processor, coupled to the memory, to; search text in a message for fragments that match use-restricted content from one or more columns and any one or more rows within a tabular structure of the use-restricted content; identify a violation by detecting fragments in the message that match use-restricted content from the one or more columns and any one or more rows within the tabular structure; and specify, as part of reporting the violation, the fragments that match the information from the one or more columns and any one or more rows within the tabular structure. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium that provides instructions, which when executed on a processor cause the processor to perform a method comprising:
-
searching text in a message for fragments that match use-restricted content from one or more columns and any one or more rows within a tabular structure of the use-restricted content; identifying a violation by detecting fragments in the message that match use-restricted content from the one or more columns and any one or more rows within the tabular structure; and specifying, as part of reporting the violation, the fragments that match the information from the one or more columns and any one or more rows within the tabular structure. - View Dependent Claims (18, 19, 20)
-
Specification