×

Method and system for scanning a computer system for sensitive content

  • US 8,898,774 B2
  • Filed: 06/25/2009
  • Issued: 11/25/2014
  • Est. Priority Date: 06/25/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for managing a scan of a computer for sensitive data, the computer-implemented method comprising the steps of:

  • providing a first computer comprising a non-transitory computer-readable medium and a scan manager module;

    receiving at the first computer a request from a user to scan a second computer and identify sensitive files stored on the second computer, wherein sensitive files have content that includes at least one category of sensitive information and wherein sensitive information includes data that the user intends to protect from unauthorized access by others;

    receiving at the first computer recipient information comprising information identifying intended recipients of a scan report including results of the scan;

    using the scan manager module to respond to the request to scan by;

    generating a user profile identifying the at least one category of sensitive information and the recipient information;

    making the user profile available to a category server for use in creating a scan profile defining scan criteria;

    deploying a scan agent to the second computer to conduct the scan of the files of the second computer, the scan conducted based on the scan profile, and identifying the sensitive files based on their content, wherein the scan agent is configured to cause the second computer to remove the scan agent in response to an uninstall request received from the category server and the category server is configured to provide, upon completion of the scan, repeated uninstall requests to the scan agent until the category server receives an indication of the removal of the scan agent; and

    when the scan is complete, making the scan report including results of the scan generated by the category server available to intended recipients based on the recipient information included in the user profile, wherein the scan report includes information about the sensitive files identified by the scan.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×