Method and apparatus to report policy violations in messages
First Claim
Patent Images
1. A computer-implemented method comprising:
- identifying, by a computer system, a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization;
searching, by the computer system, the text in the message for fragments that match the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content;
determining, by the computer system, a violation of the policy based on the matching message fragments; and
reporting, by the computer system, the violation of the policy, the reporting comprising specifying the one or more columns and the message fragments that match the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content, the specified message fragments indicating an intent of the user to send the use-restricted content outside of the organization.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for reporting policy violations in messages is described. In one embodiment, a violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.
151 Citations
49 Claims
-
1. A computer-implemented method comprising:
-
identifying, by a computer system, a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching, by the computer system, the text in the message for fragments that match the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content; determining, by the computer system, a violation of the policy based on the matching message fragments; and reporting, by the computer system, the violation of the policy, the reporting comprising specifying the one or more columns and the message fragments that match the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content, the specified message fragments indicating an intent of the user to send the use-restricted content outside of the organization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 49)
-
-
11. A computer-implemented method comprising:
-
identifying, by a computer system, a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching, by the computer system, the text in the message for a plurality of fragments in the message that violates the policy by matching the plurality of fragments to the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content; presenting, by the computer system, the plurality of message fragments that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content, the presented message fragments indicating an intent of the user to send the use-restricted content outside of the organization; and presenting the one or more columns that contain the matching use-restricted content. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method comprising:
-
Identifying, by a computer system, a set of rules for preventing loss of use-restricted content outside of an organization, the set of rules identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the set of rules triggering a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching, by the computer system, the text in the message for a plurality of tokens in the message that match the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content, wherein the match violates the set of rules; displaying, by the computer system, the plurality of message tokens that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content to a user, the displayed message tokens indicating an intent of the sender to send the use-restricted content outside of the organization; displaying the one or more columns that contain the matching use-restricted content; and upon receiving a user selection of one of the plurality of message tokens, identifying, by the computer system, one or more rules that are violated by the selected message token, and displaying, by the computer system, the selected message token and the one or more rules violated by the selected message token. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A computer-implemented system comprising:
-
a memory to store a set of instructions and one or more policies for preventing loss of use-restricted content outside of an organization, the one or more policies identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content and triggering a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; and at least one processor coupled to the memory, the at least one processor executing the set of instructions which cause the processor to search the text in the message for fragments in the message that match to the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content, to determine a violation of the one or more policies based on the matching message fragments, to specify the one or more columns and the message fragments that match the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content, the specified message fragments indicating an intent of the user to send the use-restricted content outside of an organization. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A computer-implemented system comprising:
-
a memory to store a set of instructions and one or more policies for preventing loss of use-restricted content outside of an organization, the one or more policies identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content and triggering a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; and at least one processor coupled to the memory, the at least one processor executing the set of instructions which cause the processor to search the text in the message for a plurality of fragments in the message that violates one or more of the policies by matching the plurality of fragments to the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content, and to present the one or more columns and the plurality of message fragments that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content to a user, the presented message fragments indicating an intent of the sender to send the use-restricted content outside of the organization. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A computer-implemented system comprising:
-
a memory to store a set of instructions and a set of rules for preventing loss of use-restricted content outside of an organization, the one or more rules identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content and triggering a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; at least one processor coupled to the memory, the at least one processor executing the set of instructions which cause the processor to search the text in the message for a plurality of tokens in the message to the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content, wherein the match violates the set of rules; and a user interface to display the one or more columns and the plurality of message tokens that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content to a user, to receive a user selection of one of the plurality of message tokens, to identify one or more rules that are violated by the selected message tokens, and to display the selected message token and the one or more rules violated by the selected message token, wherein the displayed message tokens indicate an intent of the sender to send the use-restricted content outside of the organization. - View Dependent Claims (42, 43, 44, 45)
-
-
46. A computer readable medium that provides instructions, which cause a processor to perform a method comprising:
-
identifying a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching the text in the message for fragments in the message to the use-restricted content from the one or more columns and any one or more rows within the tabular structure of the use-restricted content; determining a violation of the policy based on the matching message fragments; and reporting the violation of the policy, the reporting comprising specifying the one or more columns and the message fragments that match the use-restricted content from the one or more columns and any of the one or more rows within tabular structure of the use-restricted content, the specified message fragments indicating an intent of the user to send the use-restricted content outside of the organization.
-
-
47. A computer readable medium that provides instructions, which cause a processor to perform a method comprising:
-
identifying, by a computer system, a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching the text in the message for a plurality of fragments in the message that violates the policy by matching the plurality of fragments to the use-restricted content from the one or more columns and any one or more rows within the tabular structure of the use-restricted content; and presenting the plurality of message fragments that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content, the presented message fragments indicating an intent of the user to send the use-restricted content outside of the organization; and presenting the one or more columns that contain the matching use-restricted content.
-
-
48. A computer readable medium that provides instructions, which cause a processor to perform a method comprising:
-
identifying a policy for preventing loss of use-restricted content outside of an organization, the policy identifying source data that includes the use-restricted content and one or more columns within a tabular structure of the use-restricted content, the policy to trigger a violation when at least a portion of the use-restricted content is present in text of a message sent by a user to a recipient outside of the organization; searching the text in the message for a plurality of tokens in the message to the use-restricted content from one or more columns and any one or more rows within the tabular structure of the use-restricted content, wherein the match violates the set of rules; displaying the plurality of message tokens that match at least a portion of the use-restricted content from the one or more columns and any of the one or more rows within the tabular structure of the use-restricted content to a user, the displayed message tokens indicating an intent of the sender to send the use-restricted content outside of the organization; displaying the one or more columns that contain the matching use-restricted content to a user; and upon receiving a user selection of one of the plurality of message tokens, identifying one or more rules that are violated by the selected message token, and displaying the selected message token and the one or more rules violated by the selected message token.
-
Specification