Methods and apparatus for classifying objects
First Claim
Patent Images
1. A computer-implemented method of classifying an object in an object classification system, the method comprising:
- (A) receiving a first request from at least one user to access the object;
(B) providing a user interface for prompting the at least one user to provide information relating to the object;
(C) receiving, from at least one user information relating to the object, wherein the information does not directly specify a classification for the object;
(D) applying, by at least one computer, at least one security classification rule that classifies the object based, at least in part, on the information received from the at least one user;
(E) storing the information after applying the security classification rule that classifies the object;
(F) receiving a second request from the at least one user to access the object; and
(G) applying, by the at least one computer, in response to the second request from the at least one user to access the object, at least one modified security classification rule to re-classify the object based, at least in part, on the information received from the at least one user.
8 Assignments
0 Petitions
Accused Products
Abstract
An object classification system is provided that receives, from a user, at least one piece of information relating to the object, wherein the information does not directly specify a classification for the object, and that applies at least one rule that classifies the object based, at least in part, on the at least one piece of information received from the user. The techniques described herein also enable classifying an object by, in response to a request from at least one application to access the object, applying at least one rule that dynamically classifies the object.
70 Citations
15 Claims
-
1. A computer-implemented method of classifying an object in an object classification system, the method comprising:
-
(A) receiving a first request from at least one user to access the object; (B) providing a user interface for prompting the at least one user to provide information relating to the object; (C) receiving, from at least one user information relating to the object, wherein the information does not directly specify a classification for the object; (D) applying, by at least one computer, at least one security classification rule that classifies the object based, at least in part, on the information received from the at least one user; (E) storing the information after applying the security classification rule that classifies the object; (F) receiving a second request from the at least one user to access the object; and (G) applying, by the at least one computer, in response to the second request from the at least one user to access the object, at least one modified security classification rule to re-classify the object based, at least in part, on the information received from the at least one user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. At least one non-transitory computer readable medium encoded with a plurality of instructions that, when executed on a computer system, perform a method for classifying an object in an object classification system, the method comprising:
-
(A) receiving a first request from at least one user to access the object; (B) providing a user interface for prompting the at least one user to provide information relating to the object; (C) receiving, from at least one user information relating to the object, wherein the information does not directly specify a classification for the object; (D) applying, by at least one computer, at least one security classification rule that classifies the object based, at least in part, on the information received from the at least one user; (E) storing the information after applying the security classification rule that classifies the object; (F) receiving a second request from the at least one user to access the object; and (G) applying, by the at least one computer, in response to the second request from the at least one user to access the object, at least one modified security classification rule to re-classify the object based, at least in part, on the information received from the at least one user. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. At least one computer comprising:
at least one processor programmed to implement an object classification system that classifies objects, the processor programmed to, receive, from at least one user, information that relates to an object but does not directly specify a classification for the object, apply at least one security classification rule that classifies the object based, at least in part, on the information received from the at least one user, store the information after applying the security classification rule that classifies the object, receive a second request from the at least one user to access the object, and, in response to the second request from the at least one user to access the object, apply at least one modified security classification rule to re-classify the object based, at least in part, on the information received from the at least one user. - View Dependent Claims (14)
-
15. A computer-implemented method of classifying an object in an object classification system, the method comprising:
-
receiving a first request from at least one user to access the object; receiving at least one piece of information relating to the object, wherein the information is automatically generated and does not directly specify a classification for the object; applying, by at least one computer, at least one security classification rule that classifies the object based on the automatically generated piece of information; receiving, from at least one user, information relating to the object, wherein the information does not directly specify a classification for the object; storing the information received from the at least one user; receiving a second request from the at least one user to access the object; and applying, by the at least one computer, in response to the second request from the at least one user to access the object, at least one modified security classification rule to re-classify the object based, at least in part, on the automatically generated information.
-
Specification