System and method for securing documents prior to transmission
First Claim
Patent Images
1. A method executed by a computer system for securing an electronic message comprised of data stored on the computer system, that is in a state of being composed as a result of a user operating a computer program running on said computer comprising:
- automatically detecting a change in at least one of a plurality of predetermined conditions of the data representing the electronic message during the period that the electronic message is in the state of being composed;
in response to the automatic detection of the change of the at least one predetermined condition, applying at least one security policy rule to the data representing the electronic message while the electronic message remains in the state of being composed, said at least one security policy being selected by the computer system in dependence on which of the at least one of the plurality of predetermined conditions was detected as having been changed;
wherein the step of applying at least one of the security policy rule comprises;
determining a first security indicia for a file attachment to the electronic message;
determining a second security indicia for the security privilege of the user composing the electronic message;
using the first and second security indicia to determine whether to prevent the file attachment from being transmitted in the electronic message, and in dependence on such determination, either modifying a data structure associated with the electronic message to remove the file attachment from the electronic message or blocking the transmission of the electronic message.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing documents attached to emails is disclosed. The system and method apply security rules to an email as it is being composed to ensure that the security policies have been expressed prior to the email being sent. The security program hooks in to the message object model so that as the message is modified, the security rules are applied to each modification.
-
Citations
28 Claims
-
1. A method executed by a computer system for securing an electronic message comprised of data stored on the computer system, that is in a state of being composed as a result of a user operating a computer program running on said computer comprising:
-
automatically detecting a change in at least one of a plurality of predetermined conditions of the data representing the electronic message during the period that the electronic message is in the state of being composed; in response to the automatic detection of the change of the at least one predetermined condition, applying at least one security policy rule to the data representing the electronic message while the electronic message remains in the state of being composed, said at least one security policy being selected by the computer system in dependence on which of the at least one of the plurality of predetermined conditions was detected as having been changed; wherein the step of applying at least one of the security policy rule comprises; determining a first security indicia for a file attachment to the electronic message; determining a second security indicia for the security privilege of the user composing the electronic message; using the first and second security indicia to determine whether to prevent the file attachment from being transmitted in the electronic message, and in dependence on such determination, either modifying a data structure associated with the electronic message to remove the file attachment from the electronic message or blocking the transmission of the electronic message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprised of at least one computer for securing an electronic message comprised of data stored on the computer, that is in a state of being composed as a result of a user operating a computer program running on one of said at least one computers comprising:
-
a module configured to automatically detect a change in at least one of a plurality of predetermined conditions of the data representing the electronic message during the period that the electronic message is in the state of being composed; and in response to the automatic detection of the change of the at least one predetermined condition, apply at least one security policy rule to the data representing the electronic message while the electronic message remains in the state of being composed, said at least one security policy being selected by the computer system in dependence on which of the plurality of at least one of the predetermined conditions was detected as having been changed; wherein the module is further configured to apply at least one security policy rule by; determining a first security indicia for a file attachment to the electronic message; determining a second security indicia for the security privilege of the user composing the electronic message; using the first and second security indicia to determine whether to prevent the file attachment from being transmitted in the electronic message, and in dependence on such determination, either modifying a data structure associated with the electronic message to remove the file attachment from the electronic message or blocking the transmission of the electronic message. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification