Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies
First Claim
Patent Images
1. A method of managing information comprising:
- providing an organization having an information management system comprising one or more rules and policy abstractions to manage information of the organization, wherein a rule comprises an expression having a policy abstraction;
within the organization, providing a user and a confidential document managed by the information management system; and
when the user attempts to perform an operation on the confidential document, evaluating the one or more rules to determine whether to store information regarding the attempted operation in a storage location.
1 Assignment
0 Petitions
Accused Products
Abstract
An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others.
131 Citations
25 Claims
-
1. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules and policy abstractions to manage information of the organization, wherein a rule comprises an expression having a policy abstraction;
within the organization, providing a user and a confidential document managed by the information management system; and
when the user attempts to perform an operation on the confidential document, evaluating the one or more rules to determine whether to store information regarding the attempted operation in a storage location. - View Dependent Claims (2, 7, 8, 9, 10, 11, 12, 13)
-
-
3. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules comprising a context expression to manage information of the organization;
within the organization, providing a user and a confidential document managed by the information management system; and
when the user attempts to perform an operation on the confidential document, evaluating the one or more rules to determine whether to store information regarding the attempted operation in a storage location. - View Dependent Claims (4, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
5. A method of managing information comprising:
-
providing an organization having an information management system comprising a policy server comprising one or more rules to manage information of the organization;
within the organization, providing a user logged onto a device and a confidential document managed by the information management system;
storing a subset of the one or more rules of the policy server on the device; and
when the user attempts to perform an operation on the confidential document, evaluating the one or more rules to determine whether to store information regarding the attempted operation in a storage location. - View Dependent Claims (6)
-
Specification