×

INFORMATION PROTECTION USING ZONES

  • US 20110219424A1
  • Filed: 03/05/2010
  • Published: 09/08/2011
  • Est. Priority Date: 03/05/2010
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for information protection performed by a computer comprising at least one processor and at least one tangible memory, the computer operating in an information space comprising a plurality of zones of users, devices, and/or domains, wherein each of the plurality of zones is a logical grouping of users, devices, and/or domains, and wherein the method comprises:

  • in response to initiation of a transfer of information, determining whether the transfer of information would cause the information to cross a zone boundary between two of the plurality of zones;

    when it is determined that the transfer would not cause the information to cross the zone boundary, permitting the transfer;

    when it is determined that the transfer would cause the information to cross the zone boundary;

    accessing information protection rules;

    applying the information protection rules to the transfer to determine whether a policy action is to be performed; and

    when it is determined the policy action is to be performed, performing the policy action.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×