Information aggregation, processing and distribution system
First Claim
1. A method for use in enabling collaboration among multiple network users and protecting sensitive information of one or more of the users, comprising the steps of:
- establishing a collaborative environment for collaboration among said multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to said network users, wherein said sensitive information includes multiple items of sensitive information associated with multiple network users, and wherein said multiple items of sensitive information are associated with multiple rule sets regarding dissemination thereof, said collaborative environment further including a computer-based tool for automatic enforcement of said policy, wherein said computer-based tool includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; and
using said computer-based tool to manage said collaboration by monitoring activities relating to said collaboration subject matter using said network structure, identifying an activity concerning a portion of said sensitive information and controlling said identified activity based on said policy.
1 Assignment
0 Petitions
Accused Products
Abstract
A utility is provided for managing exchanges of information within a context involving multiple users, for example, multi-user network collaboration. The invention enables automatic enforcement of a policy regarding sensitive information. The policy may be negotiated among the users and expressed as multiple rule sets that govern access to a use of sensitive information. The utility also logs activities involving sensitive information to ensure compliance with the policy. These logs can be audited by a third party or automatically processed for audit compliance by the utility. In this manner, an environment of trust is created which encourages fruitful collaboration.
-
Citations
12 Claims
-
1. A method for use in enabling collaboration among multiple network users and protecting sensitive information of one or more of the users, comprising the steps of:
-
establishing a collaborative environment for collaboration among said multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to said network users, wherein said sensitive information includes multiple items of sensitive information associated with multiple network users, and wherein said multiple items of sensitive information are associated with multiple rule sets regarding dissemination thereof, said collaborative environment further including a computer-based tool for automatic enforcement of said policy, wherein said computer-based tool includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; and using said computer-based tool to manage said collaboration by monitoring activities relating to said collaboration subject matter using said network structure, identifying an activity concerning a portion of said sensitive information and controlling said identified activity based on said policy. - View Dependent Claims (2, 3, 4)
-
-
5. A method for use in enabling collaboration among multiple network users and protecting sensitive information of one or more of the users, comprising the steps of:
-
establishing a collaborative environment for collaboration among said multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to said network users, said collaborative environment further including a computer-based tool for automatic enforcement of said policy, wherein said computer-based tool includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; and using said computer-based tool to manage said collaboration by monitoring activities relating to said collaboration subject matter using said network structure, identifying an activity concerning a portion of said sensitive information and controlling said identified activity based on said policy, wherein said computer-based tool is further operative for compiling a log of activities involving said sensitive information so that a party can review said log to verify compliance with said policy. - View Dependent Claims (6)
-
-
7. A method for use in enabling collaboration among multiple network users and protecting sensitive information of one or more of the users, comprising the steps of:
-
establishing a collaborative environment for collaboration among said multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to said network users, said collaborative environment further including a computer-based tool for automatic enforcement of said policy, wherein said computer-based tool includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; and using said computer-based tool to manage said collaboration by monitoring activities relating to said collaboration subject matter using said network structure, identifying an activity concerning a portion of said sensitive information, controlling said identified activity based on said policy, associating a classification with said portion of said sensitive information, and using said classification to enforce said policy. - View Dependent Claims (8, 9, 10)
-
-
11. A method for use in enabling collaboration among multiple network users and protecting sensitive information of one or more of the users, comprising the steps of:
-
establishing a collaborative environment for collaboration among said multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to said network users, said collaborative environment further including a computer-based tool for automatic enforcement of said policy, wherein said computer-based tool includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; and using said computer-based tool to manage said collaboration by monitoring activities relating to said collaboration subject matter using said network structure, identifying an activity concerning a portion of said sensitive information and controlling said identified activity based on said policy, wherein said collaborative environment involves multiple groups of network users where each group is associated with a policy governing activities involving sensitive information within said group, and wherein said computer-based tool is further operative for automatically executing rules controlling activities involving sensitive information as between a first one of said groups and a second one of said groups.
-
-
12. A method for use in sharing information between at least one source system and multiple recipient systems, comprising the steps of:
-
providing a collaboration system interposed between said source system and said recipient systems for facilitating sharing of information between said source system and said recipient systems, said collaboration system configured for communication with each of said source system and said recipient system using a defined network interface, wherein said collaboration system includes a database storing content-based rules related to specific information sources and intended recipients and a processor operable to apply the content-based rules to the information to construct a recipient-specific output in compliance with the content-based rules; accessing first input information from said source system by said collaboration system; accessing a first instruction set related to a first recipient system by said collaboration system; accessing a second instruction set related to a second recipient system by said collaboration system; first operating said collaboration system to provide a first output to said first recipient system based on said first input information and said first instruction set; and second operating said collaboration system to provide a second output to said second recipient system based on said first input information and said second instruction set, where said second output has a content different than said first output.
-
Specification