×

Techniques and system to monitor and log access of information based on system and user context using policies

  • US 10,114,965 B2
  • Filed: 09/09/2014
  • Issued: 10/30/2018
  • Est. Priority Date: 12/29/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing information comprising:

  • providing an organization having an information management system comprising one or more rules and policy abstractions to manage information of the organization, wherein a rule comprises an expression having a policy abstraction;

    within the organization, providing a user at a client and a confidential document managed by the information management system, wherein the client comprises an interceptor code component and a policy engine code component executing on the client, the interceptor code component resides within an operating system layer of the client and is designed to intercept file system library requests received by an operating system installed on the client, and the policy engine code component installed outside of the operating system layer receives information on the intercepted file system library requests; and

    when the user at the client attempts to perform an operation on the confidential document, detecting the operation by the interceptor code component by intercepting one or more file system library requests received by the operating system corresponding to the operation, wherein the interceptor code component transfers handling of the document access operation to the policy engine code component, and the policy engine code component evaluates, based on received information associated with the intercepted one or more file system library requests at the operating system by the engine code component installed outside of the operating system layer and the one or more rules, to determine whether to store information regarding the attempted operation in a storage location.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×