Techniques and system to monitor and log access of information based on system and user context using policies
First Claim
Patent Images
1. A method of managing information comprising:
- providing an organization having an information management system comprising one or more rules and policy abstractions to manage information of the organization, wherein a rule comprises an expression having a policy abstraction;
within the organization, providing a user at a client and a confidential document managed by the information management system, wherein the client comprises an interceptor code component and a policy engine code component executing on the client, the interceptor code component resides within an operating system layer of the client and is designed to intercept file system library requests received by an operating system installed on the client, and the policy engine code component installed outside of the operating system layer receives information on the intercepted file system library requests; and
when the user at the client attempts to perform an operation on the confidential document, detecting the operation by the interceptor code component by intercepting one or more file system library requests received by the operating system corresponding to the operation, wherein the interceptor code component transfers handling of the document access operation to the policy engine code component, and the policy engine code component evaluates, based on received information associated with the intercepted one or more file system library requests at the operating system by the engine code component installed outside of the operating system layer and the one or more rules, to determine whether to store information regarding the attempted operation in a storage location.
1 Assignment
0 Petitions
Accused Products
Abstract
An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others.
50 Citations
21 Claims
-
1. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules and policy abstractions to manage information of the organization, wherein a rule comprises an expression having a policy abstraction; within the organization, providing a user at a client and a confidential document managed by the information management system, wherein the client comprises an interceptor code component and a policy engine code component executing on the client, the interceptor code component resides within an operating system layer of the client and is designed to intercept file system library requests received by an operating system installed on the client, and the policy engine code component installed outside of the operating system layer receives information on the intercepted file system library requests; and when the user at the client attempts to perform an operation on the confidential document, detecting the operation by the interceptor code component by intercepting one or more file system library requests received by the operating system corresponding to the operation, wherein the interceptor code component transfers handling of the document access operation to the policy engine code component, and the policy engine code component evaluates, based on received information associated with the intercepted one or more file system library requests at the operating system by the engine code component installed outside of the operating system layer and the one or more rules, to determine whether to store information regarding the attempted operation in a storage location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules and policy abstractions stored at a policy server to manage information of the organization, wherein a rule comprises an expression having a policy abstraction; within the organization, providing a user logged onto a client device and a confidential document managed by the information management system, wherein the client device comprises an interceptor code component and a policy engine code component executing on the client device, the interceptor code component resides within an operating system layer of the client device and is designed to intercept file system library requests received by an operating system installed on the client device, and the policy engine code component installed outside of the operating system layer receives information on the intercepted file system library requests; receiving at the information management system a profile of the client device, wherein the profile is based on the user and the client device; at the information management system, determining a subset of the one or more rules of the policy server relevant to the profile, wherein a rule is relevant to the profile when the client device is capable of supporting a syntax format of the rule; determining a first rule of the subset of the one or more rules in a first syntax format is not supported by the client device; converting the first rule into a second syntax format, wherein the client device supports the second syntax format but not the first syntax format; storing the subset of the one or more rules of the policy server on the client device including the first translated rule, wherein when an application program on a client device attempts to access the confidential document, the document access operation is initiated by the application program and detected by the interceptor code component, and the interceptor code component transfers handling of the document access operation to the policy engine code component; and in response to the operation, evaluating, based on received information associated with the operation from the engine code component installed outside of the operating system layer and the one or more rules, to determine whether to store information regarding the operation in a storage location. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules comprising a context expression stored on a server to manage information of the organization; within the organization, providing a user logged onto a client and a confidential document managed by the information management system, wherein the client comprises an interceptor code component and a policy engine code component executing on the client, wherein the interceptor code component resides within an operating system layer of the client and is designed to intercept file system library requests received by an operating system installed on the client, and the policy engine code component installed outside of the operating system layer receives information on the intercepted file system library requests; storing a subset of the one or more rules of the policy on the client, wherein the subset of one or more rules of the policy are supported by the client and a first rule of the subset of one or more rules comprises translating the first rule from a first syntax format not supported by the client to a second syntax format supported by the client; and when the user at the client attempts to perform an operation on the confidential document, detecting the operation by the interceptor code component, wherein the interceptor code component transfers handling of the document access operation to the policy engine code component, and the policy engine code component evaluates, based on received information associated with the intercepted one or more file system library requests at the operating system by the engine code component installed outside of the operating system layer and the one or more rules at the client only to determine whether to store information regarding the attempted operation in a storage location. - View Dependent Claims (19, 20, 21)
-
Specification