Confidential content search engine
First Claim
1. A method, in a server data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
- installing a client agent on the client computing device wherein the client agent, when executed by the client computing device, retrieves one or more security search rules from a security search rules database setting forth one or more security criteria for identifying items of information that contain confidential information and performs a security search of an information storage at a client computing device to identify at least one item of information meeting the one or more security criteria;
retrieving search results of the security search from the client agent, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria;
retrieving one or more security policies from a security policy database, wherein the one or more security policies set forth security policy compliance requirements that identify requirements for maintaining items of information that contain confidential information in a confidential state;
wherein retrieving search results of the security search includes gathering characteristic information associated with the at least one item of information, wherein the characteristic information includes at least one of an identity of the at least one item of information, the search criteria met by the at least one item of information, or information identifying a protection mechanism currently applied to the at least one item of information;
analyzing the search results to determine if the at least one item of information is maintained in a confidential state in the information storage in accordance with the security policy compliance requirements of the one or more security policies; and
generating a report based on results of the analysis of the search results, wherein responsive to a given item of information within the at least one item of information violating security policy compliance requirements of a given security policy, the report provides a notification to the client computing device indicating a violation of the given security policy and provides a solution for placing the given item of information in compliance with the given security policy; and
transmitting the report to the client computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
-
Citations
19 Claims
-
1. A method, in a server data processing system, for searching a client computing device to identify items of information containing confidential information, comprising:
-
installing a client agent on the client computing device wherein the client agent, when executed by the client computing device, retrieves one or more security search rules from a security search rules database setting forth one or more security criteria for identifying items of information that contain confidential information and performs a security search of an information storage at a client computing device to identify at least one item of information meeting the one or more security criteria; retrieving search results of the security search from the client agent, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; retrieving one or more security policies from a security policy database, wherein the one or more security policies set forth security policy compliance requirements that identify requirements for maintaining items of information that contain confidential information in a confidential state; wherein retrieving search results of the security search includes gathering characteristic information associated with the at least one item of information, wherein the characteristic information includes at least one of an identity of the at least one item of information, the search criteria met by the at least one item of information, or information identifying a protection mechanism currently applied to the at least one item of information; analyzing the search results to determine if the at least one item of information is maintained in a confidential state in the information storage in accordance with the security policy compliance requirements of the one or more security policies; and generating a report based on results of the analysis of the search results, wherein responsive to a given item of information within the at least one item of information violating security policy compliance requirements of a given security policy, the report provides a notification to the client computing device indicating a violation of the given security policy and provides a solution for placing the given item of information in compliance with the given security policy; and
transmitting the report to the client computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program, when executed on a server computing device, causes the server computing device to:
-
installing a client agent on the client computing device wherein the client agent, when executed by the client computing device, retrieves one or more security search rules from a security search rules database setting forth one or more security criteria for identifying items of information that contain confidential information and performs a security search of an information storage at a client computing device to identify at least one item of information meeting the one or more security criteria; retrieving search results of the security search from the client agent, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; retrieving one or more security policies from a security policy database, wherein the one or more security policies set forth security policy compliance requirements that identify requirements for maintaining items of information that contain confidential information in a confidential state; wherein retrieving search results of the security search includes gathering characteristic information associated with the at least one item of information, wherein the characteristic information includes at least one of an identity of the at least one item of information, the search criteria met by the at least one item of information, or information identifying a protection mechanism currently applied to the at least one item of information; analyzing the search results to determine if the at least one item of information is maintained in a confidential state in the information storage in accordance with the security policy compliance requirements of the one or more security policies; and generating a report based on results of the analysis of the search results, wherein responsive to a given item of information within the at least one item of information violating security policy compliance requirements of a given security policy, the report provides a notification to the client computing device indicating a violation of the given security policy and provides a solution for placing the given item of information in compliance with the given security policy; and
transmitting the report to the client computing device. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A server data processing system for searching a client computing device to identify items of information containing confidential information, comprising:
-
A processor; A memory coupled to the processor; and A storage device coupled to the processor, wherein the memory comprises computer executable instructions which, when executed by the processor, causes the processor to; installing a client agent on the client computing device wherein the client agent, when executed by the client computing device, retrieves one or more security search rules from a security search rules database setting forth one or more security criteria for identifying items of information that contain confidential information and performs a security search of an information storage at a client computing device to identify at least one item of information meeting the one or more security criteria; retrieving search results of the security search from the client agent, wherein the search results of the security search contain the at least one item of information that meets the one or more security criteria; retrieving one or more security policies from a security policy database, wherein the one or more security policies set forth security policy compliance requirements that identify requirements for maintaining items of information that contain confidential information in a confidential state; wherein retrieving search results of the security search includes gathering characteristic information associated with the at least one item of information, wherein the characteristic information includes at least one of an identity of the at least one item of information, the search criteria met by the at least one item of information, or information identifying a protection mechanism currently applied to the at least one item of information; analyzing the search results to determine if the at least one item of information is maintained in a confidential state in the information storage in accordance with the security policy compliance requirements of the one or more security policies; and generating a report based on results of the analysis of the search results, wherein responsive to a given item of information within the at least one item of information violating security policy compliance requirements of a given security policy, the report provides a notification to the client computing device indicating a violation of the given security policy and provides a solution for placing the given item of information in compliance with the given security policy; and
transmitting the report to the client computing device. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification