SERVICE ORIENTED SECURE COLLABORATIVE SYSTEM FOR COMPARTMENTED NETWORKS
First Claim
1. A system comprising:
- a computer processor configured to;
receive a request from a user to store a document in a database;
receive a user security token;
analyze the document to determine an adjudicated security level for the document;
compare the user security token to the adjudicated security level;
store the document in the database when the user security token is equal to the adjudicated security level;
when the user security token is not equal to the adjudicated security level, query the user as to whether the document should be stored in the database with the adjudicated security level;
receive a response to the query from the user;
store the document in the database when the user agrees to store the document in the database with the adjudicated security level; and
when the user does not agree to store the document in the database with the adjudicated security level, transmit a message to a security officer and quarantine the document.
1 Assignment
0 Petitions
Accused Products
Abstract
A system receives a request to store a document in a database, receives a user security token, analyzes the document to determine an adjudicated security level for the document, compares the user security token to the adjudicated security level, stores the document when the user security token is equal to the adjudicated security level, when the user security token is not equal to the adjudicated security level, queries the user as to whether the document should be stored with the adjudicated security level, receives a response to the query from the user, stores the document when the user agrees to store the document with the adjudicated security level, and when the user does not agree to store the document with the adjudicated security level, transmits a message to a security officer and quarantine the document.
69 Citations
24 Claims
-
1. A system comprising:
a computer processor configured to; receive a request from a user to store a document in a database; receive a user security token; analyze the document to determine an adjudicated security level for the document; compare the user security token to the adjudicated security level; store the document in the database when the user security token is equal to the adjudicated security level; when the user security token is not equal to the adjudicated security level, query the user as to whether the document should be stored in the database with the adjudicated security level; receive a response to the query from the user; store the document in the database when the user agrees to store the document in the database with the adjudicated security level; and when the user does not agree to store the document in the database with the adjudicated security level, transmit a message to a security officer and quarantine the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
19. A system comprising:
a computer processor configured to; receive a user security token; receive a labeled message from a user; store the message from the user in a computer storage device, the computer storage device comprising a list security level; analyze the content of the message and assign an adjudicated security level to the message as a function of the analysis; compare the adjudicated security level to the list security level; post the message for one or more other users to view when the adjudicated security level is less than or equal to the list security level; and when the adjudicated security level is greater than the list security level, notify the user without disclosing additional information to the user and transmit a second message to a security officer.
-
20. A system comprising:
a computer processor configured to; enable a user to create an electronic mail message; lookup or receive a user security token for the user; enable a user to label the electronic mail message using a classification line and apply a user security level from the user security token as metadata to the electronic mail message; analyze the electronic mail message to determine an adjudicated security level as a function of content of the electronic mail message; record an electronic mail message identifier and the adjudicated security level; compare the user security token with the adjudicated security level; validate the user security level of the electronic mail message with a mail security level as a function of the comparison of the user security token with the adjudicated security level; lookup a recipient security level; compare the recipient security level with the mail security level of the labeled electronic mail message; remove the recipient from the labeled electronic mail message or maintain the recipient on the labeled electronic mail message as a function of the comparison of the recipient security level with the mail security level of the labeled electronic mail message; transmit a message to a security officer as a function of the comparison of the user security token with the adjudicated security level and the comparison of the recipient security token with the mail security level of the labeled electronic mail message; and transmit the labeled electronic mail message to the recipient when the recipient is maintained on the labeled electronic mail message. - View Dependent Claims (21)
-
22. A system comprising:
a computer processor configured to; receive visual data; receive input from a security operator labeling the visual data with a security level; receive a request from a user to view the visual data; compare a user security token associated with the user to the security level of the visual data; and grant or deny access to the visual data for the user as a function of the comparison of the user security token with the security level of the video data.
-
23. A process comprising:
-
storing a document in a database, the document including a plurality of portion marked segments, each of the plurality of portion marked segments labeled with a security level; receiving a search request from a user to retrieve data from the database, wherein a user security token is associated with the user; retrieving a segment from the document when the user security token is equal to or greater than the security level for the segment; and displaying the retrieved segment to the user.
-
-
24. A process comprising:
-
receiving data input from a first user; storing the first user data input on a computer storage device; creating a session and label the session with a session security level; receiving a log on command from a second user; receiving a security token associated with the second user; comparing the second user security token with the session security level; permitting the second user to simultaneously view the first user data input during the session as the first user inputs the data if the second user security token is equal to or greater than the session security level; and transmitting a message to a security officer when the second user security token is less than the session security level.
-
Specification