×

Confidential content search engine

  • US 9,262,727 B2
  • Filed: 05/30/2008
  • Issued: 02/16/2016
  • Est. Priority Date: 01/20/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, in a server data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:

  • installing a client agent on the client computing device wherein the client agent, when executed by the client computing device, retrieves one or more security search rules from a security search rules database setting forth one or more security criteria for identifying items of information that contain confidential information and performs a security search of an information storage at a client computing device to identify at least one item of information meeting the one or more security criteria;

    retrieving search results of the security search from the client agent, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;

    retrieving one or more security policies from a security policy database, wherein the one or more security policies set forth security policy compliance requirements that identify requirements for maintaining items of information that contain confidential information in a confidential state;

    wherein retrieving search results of the security search includes gathering characteristic information associated with the at least one item of information, wherein the characteristic information includes at least one of an identity of the at least one item of information, the search criteria met by the at least one item of information, or information identifying a protection mechanism currently applied to the at least one item of information;

    analyzing the search results to determine if the at least one item of information is maintained in a confidential state in the information storage in accordance with the security policy compliance requirements of the one or more security policies; and

    generating a report based on results of the analysis of the search results, wherein responsive to a given item of information within the at least one item of information violating security policy compliance requirements of a given security policy, the report provides a notification to the client computing device indicating a violation of the given security policy and provides a solution for placing the given item of information in compliance with the given security policy; and

    transmitting the report to the client computing device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×