Automatic application of information protection policies
First Claim
1. In a computing environment, a method for the secure application of a usage policy to content based on content classification rules describing correlations associating a system state with a usage policy, wherein the application of the usage policy results in a content protected to the usage policy, the method comprising:
- monitoring a pre-defined policy application point to detect the transfer of content;
accessing the content being transferred through the pre-defined policy application point;
determining, based on the content, the content classification rules and the system state, that the content should be protected, wherein the content classification rules are maintained in a repository at a known location so that any appropriate enforcement mechanism can access the policy rule;
identifying, based on the content, the content classification rules and the system state, a usage policy to apply to the content, wherein the usage policy is maintained at the repository so that any appropriate enforcement mechanism can access the policy rule; and
applying the usage policy to the content, wherein the application of the usage policy results in a functional usage policy for the content.
2 Assignments
0 Petitions
Accused Products
Abstract
The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.
160 Citations
20 Claims
-
1. In a computing environment, a method for the secure application of a usage policy to content based on content classification rules describing correlations associating a system state with a usage policy, wherein the application of the usage policy results in a content protected to the usage policy, the method comprising:
-
monitoring a pre-defined policy application point to detect the transfer of content; accessing the content being transferred through the pre-defined policy application point; determining, based on the content, the content classification rules and the system state, that the content should be protected, wherein the content classification rules are maintained in a repository at a known location so that any appropriate enforcement mechanism can access the policy rule; identifying, based on the content, the content classification rules and the system state, a usage policy to apply to the content, wherein the usage policy is maintained at the repository so that any appropriate enforcement mechanism can access the policy rule; and applying the usage policy to the content, wherein the application of the usage policy results in a functional usage policy for the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage media storing computer executable instructions that when executed implement a method for the secure application of a usage policy to content based on content classification rules describing correlations associating a system state with a usage policy, wherein the application of the usage policy results in a functional usage policy for the content, the method comprising:
-
monitoring a pre-defined policy application point to detect the transfer of content; accessing the content being transferred through the pre-defined policy application point; determining, based on the content, the content classification rules and the system state, that the content should be protected, wherein the content classification rules are maintained in a repository at a known location so that any appropriate enforcement mechanism can access the policy rule; identifying, based on the content, the content classification rules and the system state, a usage policy that is to be applied to the content, wherein the usage policy is maintained at the repository so that any appropriate enforcement mechanism can access the policy rule; and applying the usage policy wherein the application of the usage policy template results in a functional usage policy for the content. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. In a computing environment, a system for applying a usage policy to content based on content classification rules describing correlations associating a system state with a usage policy, wherein the application of the usage policy results in a functional usage policy for the content, the system comprising:
-
a processor executing computer-executable instructions; and a computer-readable storage media storing the computer-executable instructions, wherein the computer-executable instructions cause the system to perform a method when executed, the method comprising; monitoring a pre-defined policy application point to detect the transfer of content; accessing the content being transferred through the pre-defined policy application point; determining, based on the content, the content classification rules and the system state, that the content should be protected, wherein the content classification rules are maintained in a repository at a known location so that any appropriate enforcement mechanism can access the policy rule; identifying, based on the content, the content classification rules and the system state, a usage policy that is to be applied to the content, wherein the usage policy is maintained at the repository so that any appropriate enforcement mechanism can access the policy rule; and applying the usage policy to the content, wherein the application of the usage policy template results in a functional usage policy for the content. - View Dependent Claims (18, 19, 20)
-
Specification