Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for managing confidential information

a confidential information and management method technology, applied in the field of managing confidential information, can solve the problems of exposing the organization to legal sanctions and liabilities, severe financial damage, and constant information leakage, and achieve the effect of efficient digital information management, audit and control

Inactive Publication Date: 2013-04-25
FORCEPOINT LLC
View PDF12 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a way to manage and control information using a flexible and efficient system. This system can handle different types of information like text, numbers, videos, and pictures. It can also protect against information policy breaches like misuse, unauthorized distribution, and leakage. Overall, this system allows for more efficient and effective management of information.

Problems solved by technology

However, ease of the promptness, comfort and information availability offered by these digital networks is accompanied by a constant hazard of information leak due to innocent mistakes, carelessness and malicious attempts to deliver non-public or otherwise confidential information to unauthorized entities.
Information losses can cause anything from minor embarrassment to severe financial damage by enabling fraud and by causing loss of business secrets and consequent competitive advantage.
In addition, such loss may expose the organization to legal sanctions and liabilities (e.g., under the US Gramm-Leach-Bliley act, the US Sarbanes-Oxley act, the US HIPAA privacy and security regulations, and directive 95 / 46 / EC of the European Parliament).
This state of affairs further complicates the information-management task.
Some of these methods utilize file meta-data, which may not be robust against changes in the file format.
DRM applications have the disadvantage that they hamper normal workflow and require large to massive investment levels.
Still other methods consider the binary signature of the file, but this has the disadvantage of depending critically on the precise representation of the data.
The above methods thus do not provide an adequate solution to the problem of modern businesses for the reasons outlined above.
The large number of formats in which the same information can be represented, the large number of applications that can use the same information in different ways, the large numbers of kinds of storage that the information can be kept in, and the large number of information distribution channels types, tend to render any given method ineffective over a business environment taken as a whole.
Binary digital signature is of zero-tolerance to any changes in the signed data, and keyword or key-phrase based tracking cover only a very limited aspect of the problem.
These methods lack the resolution needed for effective policy definition and enforcement, and tend to be over exclusive or over inclusive,
These methods are optimized for information retrieval and for providing answers to specific queries, and, in general, cannot provide either for effective tracking of specific information items or for effective policy enforcement.
Another issue that further complicates the monitoring process is the so-called template document.
Tracking different derivatives of a template document is not adequately addressed by current methods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for managing confidential information
  • Method and system for managing confidential information
  • Method and system for managing confidential information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0135]The present embodiments describe a method and system for managing confidential information. In particular, the present invention described methods for information tracking, identification, classification and management along the information lifecycle, utilizing a modular and abstract description of information.

[0136]According to embodiments, a system for information management and control is presented which uses modular and abstract descriptions of the information. The system allows for flexible and efficient policy management and enforcement, in which a policy can be defined with direct respect to the actual information content of the digital information items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information leakage independently of other information management systems.

[0137]Before explaining in detail preferred embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and a system for information management and control is presented, based on modular and abstract description of the information. Identifiers are used to identify features of interest in the information and information use policies are assigned directly or indirectly on the basis of the identifiers, allowing for flexible and efficient policy management and enforcement, in that a policy can be defined with a direct relationship to the actual information content of digital data items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information policy breaches such as information misuse, unauthorized distribution and leakage, and for information tracking.

Description

RELATED APPLICATIONS[0001]This application is a divisional of U.S. patent application Ser. No. 10 / 533,452 filed on May 2, 2005, which is a National Phase of PCT Patent Application No. PCT / IL03 / 00889 filed on Oct. 28, 2003, which claims the benefit of priority under 35 USC §119(e) of U.S. Provisional Patent Application No. 60 / 422,128 filed on Oct. 30, 2002. The contents of the above applications are all incorporated by reference as if fully set forth herein in their entirety.FIELD OF THE INVENTION[0002]The present invention relates generally to the field of managing and securing digital information. More specifically, the present invention deals with methods for classification, management and tracking digital information over the course of its lifecycle.BACKGROUND OF THE INVENTION[0003]The information and knowledge assets created and accumulated by organizations and businesses are of extreme value in the modern economical environment. As such, managing and keeping the information and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/60G06Q10/06G06Q10/10G06Q50/26H04L12/26H04L29/06
CPCG06F21/10G06F21/554G06F2221/0737G06F2221/0775G06Q10/0637H04L63/20G06Q50/265H04L63/0245H04L63/10G06F21/60H04L63/0281G06Q10/10G06F21/1078G06F21/16
Inventor PELED, ARIELGRINDLINGER, YAIRTROYANSKY, LIDRORCARNY, OFIRBARATZ, ARIK
Owner FORCEPOINT LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products