Confidential content search engine method
First Claim
1. A method, in a data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
- retrieving one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
performing a security search on one or more client computing devices to identify at least one item of information stored on a given client computing device within the one or more client computing devices meeting the one or more security criteria;
retrieving search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
analyzing the search results by applying security policy compliance requirements to the at least one item of information to determine if the at least one item of information meets the security policy compliance requirements; and
generating a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state, wherein generating the report based on results of the analysis of the search results comprises providing a notification to the given client computing device indicating a violation of the security policy compliance requirements and a solution for placing the at least one item of information in compliance with the security policy compliance requirements.
1 Assignment
0 Petitions
Accused Products
Abstract
A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
34 Citations
20 Claims
-
1. A method, in a data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
-
retrieving one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information; performing a security search on one or more client computing devices to identify at least one item of information stored on a given client computing device within the one or more client computing devices meeting the one or more security criteria; retrieving search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; analyzing the search results by applying security policy compliance requirements to the at least one item of information to determine if the at least one item of information meets the security policy compliance requirements; and generating a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state, wherein generating the report based on results of the analysis of the search results comprises providing a notification to the given client computing device indicating a violation of the security policy compliance requirements and a solution for placing the at least one item of information in compliance with the security policy compliance requirements. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon, wherein the computer readable program, when executed on a data processing system, causes the data processing system to:
-
retrieve one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information; perform a security search on one or more client computing devices to identify at least one item of information stored on a given client computing device within the one or more client computing devices meeting the one or more security criteria; retrieve search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; analyze the search results by applying security policy compliance requirements to the at least one item of information to determine whether the at least one item of information meets the security policy compliance requirements; and generate a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state, wherein the computer readable program causes the data processing system to generate the report based on results of the analysis of the search results by providing a notification to the given client computing device indicating a violation of the security policy compliance requirements and a solution for placing the at least one item of information in compliance with the security policy compliance requirements. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for searching a client computing device to identify items of information containing confidential information, comprising:
-
a processor; a memory coupled to the processor; and a storage device coupled to the processor, wherein the memory comprises computer executable instructions which, when executed by the processor, causes the processor to; retrieve, from the storage device, one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information; perform a security search on one or more client computing devices to identify at least one item of information stored on a given client computing device within the one or more client computing devices meeting the one or more security criteria; retrieve search results of the security search, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; analyze the search results by applying security policy compliance requirements to the at least one item of information to determine if the at least one item of information meets the security policy compliance requirements; and generate a report based on results of the analysis of the search results, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state, wherein the instructions cause the processor to generate the report based on results of the analysis of the search results by providing a notification to the given client computing device indicating a violation of the security policy compliance requirements and a solution for placing the at least one item of information in compliance with the security policy compliance requirements. - View Dependent Claims (17, 18, 19, 20)
-
Specification