Method and apparatus to report policy violations in messages
First Claim
Patent Images
1. A method comprising:
- identifying, by a computing device, a policy that protects use-restricted content, the use-restricted content stored in a tabular structure of source data comprising a plurality of data elements in a plurality of columns and a plurality of rows, wherein the policy identifying the use-restricted content is stored separately from the user-restricted content;
searching, based on the policy, text in a message for the use-restricted content;
identifying a violation of the policy when detecting fragments in the message that match one or more of the plurality of data elements of the use-restricted content from one or more of the plurality of columns and one or more of the plurality of rows within the tabular structure; and
specifying, in a report of the violation;
the detected fragments in the message that match the one or more data elements of the use-restricted content from the one or more columns and the one or more rows within the tabular structure, andthe one or more columns within the tabular structure that contain the data elements matching the detected fragments in the message.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for reporting policy violations in messages is described. A violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.
158 Citations
20 Claims
-
1. A method comprising:
-
identifying, by a computing device, a policy that protects use-restricted content, the use-restricted content stored in a tabular structure of source data comprising a plurality of data elements in a plurality of columns and a plurality of rows, wherein the policy identifying the use-restricted content is stored separately from the user-restricted content; searching, based on the policy, text in a message for the use-restricted content; identifying a violation of the policy when detecting fragments in the message that match one or more of the plurality of data elements of the use-restricted content from one or more of the plurality of columns and one or more of the plurality of rows within the tabular structure; and specifying, in a report of the violation; the detected fragments in the message that match the one or more data elements of the use-restricted content from the one or more columns and the one or more rows within the tabular structure, and the one or more columns within the tabular structure that contain the data elements matching the detected fragments in the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a memory; and a processor coupled with the memory, the process configured to; identify a policy that protects use-restricted content, the use-restricted content stored in a tabular structure of source data comprising a plurality of data elements in a plurality of columns and a plurality of rows, wherein the policy identifying the use-restricted content is stored separately from the user-restricted content search, based on the policy, text in a message for the use-restricted content; identify a violation of the policy when detecting fragments in the message that match one or more of the plurality of data elements of the use-restricted content from one or more of the plurality of columns and one or more of the plurality of rows within the tabular structure; and specify, in a report of the violation; the detected fragments in the message that match the one or more data elements of the use-restricted content from the one or more columns and the one or more rows within the tabular structure, and the one or more columns within the tabular structure that contain the data elements matching the detected fragments in the message. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium including instructions that, when executed by a processor, cause the processor to perform a method comprising:
-
identifying, by the processor, a policy that protects use-restricted content, the use-restricted content stored in a tabular structure of source data comprising a plurality of data elements in a plurality of columns and a plurality of rows of, wherein the policy identifying the use-restricted content is stored separately from the user-restricted content searching, based on the policy, text in a message for the use-restricted content; identifying a violation of the policy when detecting fragments in the message that match one or more of the plurality of data elements of the use-restricted content from one or more of the plurality of columns and one or more of the plurality of rows within the tabular structure; and specifying, in a report of the violation; the detected fragments in the message that match the one or more data elements of the use-restricted content from the one or more columns and the one or more rows within the tabular structure, and the one or more columns within the tabular structure that contain the data elements matching the detected fragments in the message. - View Dependent Claims (18, 19, 20)
-
Specification