SECURITY INFORMATION SHARING BETWEEN APPLICATIONS
First Claim
1. A method for sharing data and a risk assessment of the data comprises:
- receiving data in a first application and obtaining a risk level of the data;
performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application;
passing the message from the first application to the second application;
receiving, at the second application, the message;
determining by said second application whether the risk level exceeds a predetermined threshold;
when the risk level exceed the predetermined threshold, implement a protocol to perform actions in the second application, said actions comprising at least using the data in accordance with the protocol; and
when the risk level does not exceed the predetermined threshold, running the second application using the data,wherein a programmed processor performs one or more of performing an action in the first application, determining the risk level, performing actions in the second application, and running the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data, performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application, passing the message from the first application to the second application, receiving, at the second application, the message, determining by said second application whether the risk level exceeds a predetermined threshold, when the risk level exceed the predetermined threshold, implementing a protocol to perform actions in the second application using the data in accordance with the protocol, and when the risk level does not exceed the predetermined threshold, running the second application using the data.
-
Citations
18 Claims
-
1. A method for sharing data and a risk assessment of the data comprises:
-
receiving data in a first application and obtaining a risk level of the data; performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application; passing the message from the first application to the second application; receiving, at the second application, the message; determining by said second application whether the risk level exceeds a predetermined threshold; when the risk level exceed the predetermined threshold, implement a protocol to perform actions in the second application, said actions comprising at least using the data in accordance with the protocol; and when the risk level does not exceed the predetermined threshold, running the second application using the data, wherein a programmed processor performs one or more of performing an action in the first application, determining the risk level, performing actions in the second application, and running the second application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for sharing data and a risk assessment of the data, the system comprising:
-
a memory device; and a hardware processor coupled to the memory device, the processor configured to; receive data in a first application and obtain a risk level of the data; perform an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application; pass the message from the first application to the second application; receive, at the second application, the message; determine, using the second application, whether the risk level exceeds a predetermined threshold; when the risk level exceeds the predetermined threshold, implement a protocol to perform actions in accordance with the protocol; and when the risk assessment does not exceed the predetermined threshold, run the second application using the data - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product for using a multi-user operating system, the computer program product comprising a non-transitory storage medium readable by a processing circuit and storing instructions run by the processing circuit for performing method steps for sharing data and a risk assessment of the data comprises:
-
receiving data in a first application and obtaining a risk level of the data; performing an action necessitating passing a message comprising at least the data and the risk level to a second application; passing the message from the first application to the second application; receiving the message at the second application; determining, using the second application, whether the risk level exceeds a predetermined threshold; when the risk assessment exceeds the predetermined threshold, implementing a protocol to perform actions in the second application, said actions comprising at least using the data in accordance with the protocol; and when the risk assessment does not exceed the predetermined threshold, running the second application using the data. - View Dependent Claims (15, 16, 17, 18)
-
Specification