×

System and method for dynamically enforcing security policies on electronic files

  • US 8,769,605 B2
  • Filed: 03/27/2009
  • Issued: 07/01/2014
  • Est. Priority Date: 03/27/2008
  • Status: Active Grant
First Claim
Patent Images

1. A system for automatically enforcing security policies on an electronic file regardless of its physical or electronic location for an organization, comprising:

  • a plurality of files, each file containing a data object and a policy for enforcing rules on one or more operations on the data object, whereby a plurality of policies are provided, wherein said policy is attached to each of said files;

    a plurality of agents responsible for enforcing the policies and for independently determining whether an enforcement action is necessary according to the policy attached to each of said files, each agent being installed on a computational device and featuring at least one application component;

    a policy builder console being responsible for generating the said policies; and

    a policy distribution server for distributing the policies to the files;

    wherein the policy builder console is operable to change one of the policies after it has been applied to one of the files, the policy distribution server is operable to distribute the changed policy to said one of the files, and the agents are operable to apply said changed policy to said one of the files in place of the policy previously applied to said one of the files, thereby providing dynamic policies;

    further comprising a secure data wrapper (SDW) for securing said file, wherein said SDW comprises said policy and wherein said SDW prevents an unauthorized operation on said file; and

    a key management server for distributing encryption/decryption keys to said agent;

    wherein said encryption keys are used to encrypt and decrypt said SDW and said policy by said agent;

    wherein said policy comprises limiting the access and usage based on one or more system attributes, wherein the said policy limits the access and usage of the file based on an environment in which said particular file is located, wherein said environment is determined according to a physical and/or electronic boundary of the organization.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×