Protecting Information Using Policies and Encryption
First Claim
Patent Images
1. A method comprising:
- providing a document management system managing a plurality of documents wherein the document management system comprises clients and servers;
at a first client, executing a first policy enforcer program;
at the first client, trapping by the first policy enforcer program a request by an e-mail application to send an e-mail with a document attachment, managed by the document management system, to a second client;
at the first policy enforcer program, evaluating at least one policy associated with document attachment;
as a result of the evaluating, determining that the send request is allowed, but before allowing to e-mail application to send the document attachment, encrypting the document attachment; and
allowing to e-mail application to send the encrypted document attachment to the second client.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.
-
Citations
5 Claims
-
1. A method comprising:
-
providing a document management system managing a plurality of documents wherein the document management system comprises clients and servers; at a first client, executing a first policy enforcer program; at the first client, trapping by the first policy enforcer program a request by an e-mail application to send an e-mail with a document attachment, managed by the document management system, to a second client; at the first policy enforcer program, evaluating at least one policy associated with document attachment; as a result of the evaluating, determining that the send request is allowed, but before allowing to e-mail application to send the document attachment, encrypting the document attachment; and allowing to e-mail application to send the encrypted document attachment to the second client. - View Dependent Claims (2, 3, 4, 5)
-
Specification