Identifying and processing confidential information on network endpoints
First Claim
Patent Images
1. A computer-readable memory device including instructions executable by at least one processor, the computer-readable memory device comprising:
- one or more instructions to determine an availability of a plurality of search engines in a device;
one or more instructions to select a search engine determined to be available from the plurality of search engines;
one or more instructions to input a search term based on a set of policy rules into the selected search engine and cause the selected search engine to perform a search of the device based on the search term and to output search results;
one or more instructions to analyze the search results output from the selected search engine against the set of policy rules; and
one or more instructions to identify the search results that include confidential information based on the analysis of the search results against the set of policy rules.
1 Assignment
0 Petitions
Accused Products
Abstract
An automated method for identifying confidential information may include inputting a search term based on a set of policy rules into a search engine, and causing the search engine to perform a search based on the search term. The method may also include analyzing search results obtained from the search engine against the policy rules to identify the search results containing confidential information.
297 Citations
14 Claims
-
1. A computer-readable memory device including instructions executable by at least one processor, the computer-readable memory device comprising:
- one or more instructions to determine an availability of a plurality of search engines in a device;
one or more instructions to select a search engine determined to be available from the plurality of search engines;
one or more instructions to input a search term based on a set of policy rules into the selected search engine and cause the selected search engine to perform a search of the device based on the search term and to output search results;
one or more instructions to analyze the search results output from the selected search engine against the set of policy rules; and
one or more instructions to identify the search results that include confidential information based on the analysis of the search results against the set of policy rules. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- one or more instructions to determine an availability of a plurality of search engines in a device;
-
8. An automated method for identifying confidential information, performed by a computing device, the method comprising:
- inputting, by a processor of the computing device, a search term based on a set of policy rules into a search engine;
causing, by the processor, the search engine to perform a search based on the search term;
analyzing, by the processor, search results obtained from the search engine against the set of policy rules to identify one of the search results that includes confidential information;
determining, by the processor, whether the one of the search results is included in a list of documents that violate the set of policy rules; and
updating, by the processor and when it is determined that the one of the search results is not included in the list of documents that violate the set of policy rules, the list to include the one of the search results. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- inputting, by a processor of the computing device, a search term based on a set of policy rules into a search engine;
Specification