×

Preventing conflicts of interests between two or more groups using applications

  • US 8,762,412 B2
  • Filed: 01/10/2011
  • Issued: 06/24/2014
  • Est. Priority Date: 12/29/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing information comprising:

  • providing an organization comprising a first group and a second group, wherein the organization has an information management system comprising a policy server comprising one or more rules to manage information of the organization;

    within the first group of the organization, providing a first user at a first device and a first application program managed by a policy enforcer program of the information management system;

    when the first user uses the first application program to connect to a second user to transfer a first piece of information, with the policy enforcer program, seeking approval from the policy server further comprising;

    determining the first piece of information corresponds to an identifier designating the first piece of information as confidential includes at least one of accessing contents of the first piece of information and detecting a keyword in the contents, or accessing a metadata information associated with the first piece of information and detecting a keyword in the metadata information;

    extracting at least one attribute associated with the first piece of information and the identifier, wherein the at least one attribute is used to determine whether to allow access to the first piece of information to a user of the information management system, wherein the identifier is an uniform resource identifier associated with the first piece of information;

    based on the at least one attribute, evaluating using the policy server whether to allow access to the first piece of information includes at least one of;

    determining whether the first user'"'"'s use of the first application program to connect to the second user is during a critical time period of the organization,if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is not during the critical time period, andif not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user comprises determining the first user'"'"'s use of the first application program to connect to the second user is during the critical time period;

    ordetermining a location of the first user, and wherein the permitting the first user to use the first application program to connect to the second user and the blocking the first user from using the first application program to connect to the second user are based on the determined location of the first user;

    if approved, with the policy enforcer program, permitting the first user to use the first application program to connect to the second user and connecting the first user to the second user without seeking approval from the policy server; and

    if not approved, with the policy enforcer program, blocking the first user from using the first application program to connect to the second user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×