SECURE, POLICY-BASED COMMUNICATIONS SECURITY AND FILE SHARING ACROSS MIXED MEDIA, MIXED-COMMUNICATIONS MODALITIES AND EXTENSIBLE TO CLOUD COMPUTING SUCH AS SOA
First Claim
Patent Images
1. A method, comprising:
- providing an enterprise network having a plurality of subscribers, a plurality of nodes, each node comprising a policy agent to monitor and/or track behavior of the respective node and/or a subscriber associated with the respective node, and a policy enforcement server to enforce polices and/or rules of an enterprise corresponding to the enterprise network;
determining, by a first policy agent corresponding to a first node and first subscriber, a behavioral instance potentially relevant to a policy and/or rule;
notifying, by the first policy agent, the policy enforcement server of the determined behavioral instance; and
applying, by the policy enforcement server, a policy and/or rule to the determined behavioral instance, whereby a policy measure is implemented.
18 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided to monitor and prevent potential enterprise policy and/or rule violations by subscribers.
-
Citations
20 Claims
-
1. A method, comprising:
-
providing an enterprise network having a plurality of subscribers, a plurality of nodes, each node comprising a policy agent to monitor and/or track behavior of the respective node and/or a subscriber associated with the respective node, and a policy enforcement server to enforce polices and/or rules of an enterprise corresponding to the enterprise network; determining, by a first policy agent corresponding to a first node and first subscriber, a behavioral instance potentially relevant to a policy and/or rule; notifying, by the first policy agent, the policy enforcement server of the determined behavioral instance; and applying, by the policy enforcement server, a policy and/or rule to the determined behavioral instance, whereby a policy measure is implemented. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
an enterprise network having a plurality of subscribers, a plurality of nodes, and a policy enforcement server to enforce polices and/or rules of an enterprise corresponding to the enterprise network; wherein; each node comprises a respective policy agent to monitor and/or track behavior of the respective node and/or a subscriber associated with the respective node, a first policy agent of the plurality of policy agents corresponds to a first node and first subscriber and identifies a behavioral instance potentially relevant to a policy and/or rule; the first policy agent notifies the policy enforcement server of the determined behavioral instance; and the policy enforcement server applies a policy and/or rule to the determined behavioral instance, whereby a policy measure is implemented. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium, comprising:
a machine readable policy tag related to an actual or potential violation of a rule and/or policy by a subscriber of an enterprise network, comprising at least one of the following fields; a subscriber and/or role persona field defining a persona and/or role of the subscriber at the time of the actual or potential violation; a nonsubscriber and/or role persona field defining a persona and/or role of a nonsubscriber involved in and at the time of the actual or potential violation; a degree of trust field defining a degree of trust of the enterprise network and/or the subscriber with a person and/or computational entity having or to have access to a selected communication and/or content associated with the actual or potential violation, the person and/or computational entity being involved in the actual or potential rule violation; an existing policy and/or rule compliance measure field describing a measure currently in place to comply with the actually or potentially violated rule and/or policy; a venue field defining a degree of public exposure and/or security of an intended recipient of the selected communication and/or content, the intended recipient being involved in the actual or potential violation; a context field describing a context of the subscriber and/or other entity having access to the selected communication and/or content; a content description field describing the selected communication and/or content, the content description describing the content in terms of the rule and/or policy actually or potentially violated; a policy and/or rule field identifying the policy and/or rule actually or potentially violated; and a recommendation and/or decision field indicating a recommended action to be taken in response to the actual or potential violation. - View Dependent Claims (19, 20)
Specification