Preventing conflicts of interests between two or more groups using applications
First Claim
Patent Images
1. A method of managing information comprising:
- providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization;
within the first group of the organization, providing a first user at a first device and a first application program managed by a policy enforcer program of the information management system;
when the first user uses the first application program to connect to a second user to transfer a first piece of information, with the policy enforcer program, seeking approval from the policy server further comprising;
determining the first piece of information corresponds to an identifier designating the first piece of information as confidential includes at least one of accessing contents of the first piece of information and detecting a keyword in the contents, or accessing a metadata information associated with the first piece of information and detecting a keyword in the metadata information;
extracting at least one attribute associated with the first piece of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first piece of information;
based on the at least one attribute, evaluating using the policy server whether to allow access to the first piece of information includes at least one of;
determining whether the first user'"'"'s use of the first application program to connect to the second user is during a critical time period of the organization,if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is not during the critical time period, andif not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is during the critical time period;
ordetermining a location of the first user, and wherein the permitting the first user to use the first application program to connect to the second user and the blocking the first user from using the first application program to connect to the second user are based on the determined location of the first user;
if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user and connecting the first user to the second user without seeking approval from the policy server; and
if not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.
-
Citations
30 Claims
-
1. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization; within the first group of the organization, providing a first user at a first device and a first application program managed by a policy enforcer program of the information management system; when the first user uses the first application program to connect to a second user to transfer a first piece of information, with the policy enforcer program, seeking approval from the policy server further comprising; determining the first piece of information corresponds to an identifier designating the first piece of information as confidential includes at least one of accessing contents of the first piece of information and detecting a keyword in the contents, or accessing a metadata information associated with the first piece of information and detecting a keyword in the metadata information; extracting at least one attribute associated with the first piece of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first piece of information; based on the at least one attribute, evaluating using the policy server whether to allow access to the first piece of information includes at least one of; determining whether the first user'"'"'s use of the first application program to connect to the second user is during a critical time period of the organization, if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is not during the critical time period, and if not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is during the critical time period;
ordetermining a location of the first user, and wherein the permitting the first user to use the first application program to connect to the second user and the blocking the first user from using the first application program to connect to the second user are based on the determined location of the first user; if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user and connecting the first user to the second user without seeking approval from the policy server; and if not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization; within the first group of the organization, providing a first user, a first device of the first user, and a first application program managed by the information management system and executing on the first device; storing a subset of the one or more rules of the policy server on the first device of the first user; when the first user uses the first application program executing on the first device to connect to a second user to transfer a first piece of information, evaluating at the first device the subset of the one or more rules stored on the first device to determine whether to approve the connection from the first user to a second user further comprising; determining the first piece of information corresponds to an identifier designating the first piece of information as confidential includes at least one of accessing contents of the first piece of information and detecting a keyword in the contents, or accessing a metadata information associated with the first piece of information and detecting a keyword in the metadata information, extracting at least one attribute associated with the first piece of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system based on a uniform resource identifier containing at least one wildcard, and based on the at least one attribute, evaluating using the policy server whether to allow access to the first piece of information and includes at least one of determining to not approve when the first user'"'"'s use corresponds to a critical period of the organization;
or determining based on the location of the first user to not approve the first user'"'"'s use;if approved, permitting the first user to use the first application program to connect to the second user without seeking approval from the policy server; and if not approved, blocking the first user from using the first application program to connect to the second user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization;
within the first group of the organization, providing a first user and a plurality of application programs, each application program being managed by a policy enforcer program of the information management system;storing a subset of the one or more rules of the policy server on a first device of the first user; when the first user uses a first application program of the plurality of application programs to communicate with a second user to transmit a first piece of information, evaluating with the policy enforcer program the subset of the one or more rules stored on the first device to determine whether to approve the communication from the first user to the second user further comprising; determining the first piece of information corresponds to an identifier designating the first piece of information as confidential wherein the identifier comprises a keyword in the contents of the first piece of information or a keyword in the metadata information associated with the first piece of information, extracting at least one attribute associated with the first piece of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system based on a storage location of the first piece of information, and based on the at least one attribute, evaluating using the policy server whether to allow access to the first piece of information comprising at least one of determining to approve when the first user'"'"'s use is outside a critical period of the organization;
or determining to approve the first user'"'"'s user based on a location of the first user;if approved, permitting the first user to use the first application program to communicate with the second user without receiving approval from the policy server; if not approved, blocking the first user from using the first application program to communicate with the second user; when the first user uses a second application program of the plurality of application programs, different from the first application program, to communicate with the second user, evaluating with the policy enforcer program the subset of the one or more rules stored on the first device to determine whether to approve the communication from the first user to the second user; if approved, permitting the first user to use the second application program to communicate with the second user; and if not approved, blocking the first user from using the second application program to communicate with the second user. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method of managing information comprising:
-
providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization; within the first group of the organization, providing a first user at a first device and a first e-mail application managed by a policy enforcer program of the information management system; when the first user sends an e-mail using the e-mail application to a second user, with the policy enforcer program, seeking approval from the policy server further comprising; determining the e-mail corresponds to an identifier designating the first piece of information as confidential includes based on a body or a header of the e-mail, determining whether the e-mail is designated confidential, extracting at least one attribute associated with the e-mail and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system and the at least one attribute comprises a location in a file structure, and based on the at least one attribute, evaluating using the policy server whether to allow access to the e-mail by the second user includes at least one of determining whether the first user sending the e-mail corresponds to a critical period of the organization;
or determining whether the first user sending the e-mail corresponds to a prohibited location;if approved, transmitting the e-mail to the second user; and if not approved, with the policy enforcer program, blocking the first user from transmitting the e-mail to the second user. - View Dependent Claims (27, 28, 29, 30)
-
Specification