×

Managing data handling policies

  • US 9,864,873 B2
  • Filed: 03/15/2013
  • Issued: 01/09/2018
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of automatically sharing sensitive data in accordance with a set of predetermined policy requirements including data handling policies a node requires for handling and protecting sensitive data, the method comprising:

  • establishing a secure connection between a first node and a second node across a network;

    receiving a request from the first node across the network to provide a set of data for the first node;

    determining whether the requested set of data includes a set of sensitive data;

    upon a positive determination of a set of sensitive data, requesting a set of certified policy commitments from the first node, wherein the set of certified policy commitments includes data handling policies that the first node commits to utilize in handling and protecting the set of sensitive data of the second node;

    the second node receiving across the network the set of certified policy commitments for the first node;

    authenticating the set of certified policy commitments;

    the second node comparing the data handling policies of the authenticated set of certified policy commitments from the first node to the data handling policies of the set of predetermined policy requirements that the second node requires for handling and protecting the requested sensitive data;

    utilizing a processor of the second node to automatically determine from the comparison whether the data handling policies of the authenticated set of certified policy commitments of the first node at least meets the data handling policies of the set of predetermined policy requirements of the second node; and

    upon a positive determination by the second node that the data handling policies of the authenticated set of certified policy commitments of the first node at least meets the data handling policies of the set of predetermined policy requirements of the second node, transmitting across the network the requested set of data including the set of sensitive data from the second node to the first node through the secure connection.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×