Method and system for scanning a computer system for sensitive content
First Claim
1. A computer-implemented method for managing a scan of a computer for sensitive data, the computer-implemented method comprising the steps of:
- providing a first computer comprising a non-transitory computer-readable medium and a scan manager module;
receiving at the first computer a request from a user to scan a second computer and identify sensitive files stored on the second computer, wherein sensitive files have content that includes at least one category of sensitive information and wherein sensitive information includes data that the user intends to protect from unauthorized access by others;
receiving at the first computer recipient information comprising information identifying intended recipients of a scan report including results of the scan;
using the scan manager module to respond to the request to scan by;
generating a user profile identifying the at least one category of sensitive information and the recipient information;
making the user profile available to a category server for use in creating a scan profile defining scan criteria;
deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile, and identifying the sensitive files based on their content, wherein the scan agent is configured to cause the second computer to remove the scan agent in response to an uninstall request received from the category server and the category server is configured to provide, upon completion of the scan, repeated uninstall requests to the scan agent until the category server receives an indication of the removal of the scan agent; and
when the scan is complete, making the scan report including results of the scan generated by the category server available to intended recipients based on the recipient information included in the user profile, wherein the scan report includes information about the sensitive files identified by the scan.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for scanning a computer system for sensitive data. A scan manager manages a scan of files of a second computer. The scan manager receives a request to scan and identify files stored on the second computer based on at least one category of sensitive data. The scan manager receives scan report recipient information and generates a user profile based on the at least one category and the recipient information. The scan manager makes the user profile available to a category server for use in creating a scan profile defining the scan criteria and deploys a scan agent to a computer to conduct the scan based on the scan profile. When the scan is complete and upon creation of the scan report, the scan manager makes the scan report available to the intended recipients.
31 Citations
37 Claims
-
1. A computer-implemented method for managing a scan of a computer for sensitive data, the computer-implemented method comprising the steps of:
-
providing a first computer comprising a non-transitory computer-readable medium and a scan manager module; receiving at the first computer a request from a user to scan a second computer and identify sensitive files stored on the second computer, wherein sensitive files have content that includes at least one category of sensitive information and wherein sensitive information includes data that the user intends to protect from unauthorized access by others; receiving at the first computer recipient information comprising information identifying intended recipients of a scan report including results of the scan; using the scan manager module to respond to the request to scan by; generating a user profile identifying the at least one category of sensitive information and the recipient information; making the user profile available to a category server for use in creating a scan profile defining scan criteria; deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile, and identifying the sensitive files based on their content, wherein the scan agent is configured to cause the second computer to remove the scan agent in response to an uninstall request received from the category server and the category server is configured to provide, upon completion of the scan, repeated uninstall requests to the scan agent until the category server receives an indication of the removal of the scan agent; and when the scan is complete, making the scan report including results of the scan generated by the category server available to intended recipients based on the recipient information included in the user profile, wherein the scan report includes information about the sensitive files identified by the scan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program product, comprising:
-
a non-transitory computer-readable medium including computer-readable program code comprising instructions adapted to be executed on a first computer comprising a scan manager module and a non-transitory computer-readable medium to implement a method for managing a scan of a computer system for sensitive data, comprising the steps of; receiving at the first computer a request from a user to scan a second computer and identify sensitive files stored on the second computer, wherein sensitive files have content that includes at least one category of sensitive information and wherein sensitive information includes data that the user intends to protect from unauthorized access by others; receiving at the first computer recipient information comprising information identifying intended recipients of a scan report including results of the scan; using the scan manager module to respond to the request to scan by; generating a user profile identifying the at least one category of sensitive information and the recipient information; making the user profile available to a category server for use in creating a scan profile defining scan criteria; deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile, and identifying the sensitive files based on their content, wherein the scan agent is configured to cause the second computer to remove the scan agent in response to an uninstall request received from the category server and the category server is configured to provide, upon completion of the scan, repeated uninstall requests to the scan agent until the category server receives an indication of the removal of the scan agent; and when the scan is complete, making the scan report including results of the scan generated by the category server available to intended recipients based on the recipient information included in the user profile, wherein the scan report includes information about the sensitive files identified by the scan. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A system for managing a scan of a computer system for sensitive data, said system comprising:
-
a first computer comprising a scan manager module and a non-transitory computer-readable medium storing data and instructions; wherein the scan manager module is configured to access the non-transitory computer-readable medium for the data and the instructions and, when executing the instructions, to perform computer-implemented steps on the first computer for managing a scan of files of a second computer, and wherein said first computer is adapted to; receive at the first computer a request from a user to scan the second computer and identify sensitive files stored on the second computer, wherein sensitive files have content that includes at least one category of sensitive information and wherein sensitive information includes data that the user intends to protect from unauthorized access by others; and receive at the first computer recipient information comprising information identifying intended recipients of a scan report including results of the scan; and wherein said scan manager module is adapted to, in response to the request to scan the second computer; generate a user profile identifying the at least one category of sensitive information and the recipient information; make the user profile available to a category server for use in creating a scan profile defining scan criteria; deploy a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile, and identifying the sensitive files based on their content, wherein the scan agent is configured to cause the second computer to remove the scan agent in response to an uninstall request received from the category server and the category server is configured to provide, upon completion of the scan, repeated uninstall requests to the scan agent until the category server receives an indication of the removal of the scan agent; and when the scan is complete, make the scan report including results of the scan generated by the category server available to intended recipients based on the recipient information included in the user profile, wherein the scan report includes information about the sensitive files identified by the scan. - View Dependent Claims (33, 34, 35, 36, 37)
-
Specification