Enforcing rights mangement through edge email servers
First Claim
1. In an electronic messaging system, a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages, the method comprising acts of:
- receiving a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
accessing a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter;
comparing the one or more pieces of evidence with content within the message for identifying the sensitive subject matter in the message; and
determining one or more actions to be taken on the message in accordance with policy remedies for ensuring that the sensitive subject matter is not inappropriately, transferred between the at least two domains.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agents or servers along with policy documents that include configurable semantics pattern recognition data for identifying deviant messages. Once deviant messages or messages that potentially have sensitive subject matter are identified, the present invention further provides for adaptable actions or remedies for ensuring that the sensitive subject matter is not inappropriately transferred between domains.
-
Citations
40 Claims
-
1. In an electronic messaging system, a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages, the method comprising acts of:
-
receiving a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
accessing a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter;
comparing the one or more pieces of evidence with content within the message for identifying the sensitive subject matter in the message; and
determining one or more actions to be taken on the message in accordance with policy remedies for ensuring that the sensitive subject matter is not inappropriately, transferred between the at least two domains. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In an electronic messaging system, a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages, the method comprising:
-
an act of receiving a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
a step for identifying the message as deviant by using a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter; and
an act of determining one or more actions to be taken on the message in accordance with policy remedies for ensuring that the sensitive subject matter is not inappropriately transferred between the at least two domains. - View Dependent Claims (10, 11, 12)
-
-
13. In an electronic messaging system, a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages and policy remedies that define how to process the deviant messages, the method comprising acts of:
-
receiving a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
accessing a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter;
scanning the message for identifying the one or more pieces of evidence corresponding to the sensitive subject matter within the message; and
based on the identified one or more pieces of evidence, triggering one or more adaptable actions for ensuring the sensitive subject matter is not inappropriately transferred between the at least two domains. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer program product for use in an electronic messaging system, the computer program product for implementing a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages, the computer program product comprising one or more computer readable media having stored thereon computer executable instructions that, when executed by a processor, can cause the distributed computing system to perform the following:
-
receive a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
access a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter;
compare the one or more pieces of evidence with content within the message for identifying the sensitive subject matter in the message; and
determine one or more actions to be taken on the message in accordance with policy remedies for ensuring that the sensitive subject matter is not inappropriately transferred between the at least two domains. - View Dependent Claims (28, 29, 30)
-
-
31. A computer program product for use in an electronic messaging system, the computer program product used to implement a method of ensuring that confidential, proprietary, privileged or other sensitive subject matter is not inappropriately transferred between domains with differing security rights by utilizing policy documents that include semantics pattern recognition data for identifying deviant messages and policy remedies that define how to process the deviant messages, the computer program product comprising one or more computer readable media having stored thereon computer executable instructions that, when executed by a processor, can cause the distributed computing system to perform the following:
-
receive a message at a message transfer agent located at an edge between at least two domains with different security rights, the message including sensitive subject matter that is not supposed to be inappropriately transferred between the at least two domains based on the security rights of each domain;
access a policy document that includes one or more pieces of evidence, which are configurable characteristics corresponding to the sensitive subject matter;
scan the message for identifying the one or more pieces of evidence corresponding to the sensitive subject matter within the message; and
based on the identified one or more pieces of evidence, trigger one or more adaptable actions for ensuring the sensitive subject matter is not inappropriately transferred between the at least two domains. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification