Claims
- 1. A method for distributed management of phrase-based security policy, said security policy being applied with respect to a digital medium, the method comprising:
a. storing at least one phrase together with an accompanying security policy; b. assigning an owner to said at least one stored phrase; c. scanning and analyzing said digital medium in order to locate and identify said at least one stored phrase; d. upon detection of said at least one stored phrase within a digital item in said digital medium:
i applying said security policy with respect to said digital item, and ii notifying said owner.
- 2. A method according to claim 1, further comprising:
a. receiving at least one instruction from said owner, and b. applying an instruction of said owner with respect to said digital item.
- 3. A method according to claim 1, wherein said phrase comprises any of: keyword, keyphrase and number.
- 4. A method according to claim 1, wherein said security policy comprises either of a distribution policy and a usage policy.
- 5. A method according to claim 1, wherein said security policy comprises determining a legitimacy of at least one of the following:
a set of authorized recipients; a set of authorized usages; a set of allowed formats; a set of allowed distribution channels, and a required action.
- 6. A method according to claim 1, further comprising approving at least one phrase or its said accompanying security policy before said storing at least one phrase.
- 7. A method according to claim 1, wherein said security policy comprises rules to be applied after detecting at least one set of said stored phrases within said digital item.
- 8. A method according to claim 7, wherein said at least one set comprises one or more combinations of said stored phrases.
- 9. A method according to claim 1, wherein said security policy comprises at least one rule, said at least one rule being to determine the actions to be applied according to the number of said phrases detected within said digital item.
- 10. A method according to claim 1, further comprising assigning a default security policy to said at least one stored phrase.
- 11. A method according to claim 10, wherein said assigning said default security policy comprises:
a. allowing said owner to assign an impact parameter to said stored phrase, said impact parameter reflecting the expected negative impact of an unauthorized dissemination of a message containing said stored phrase; b. defining at least one rule, said at least one rule defines at least one action to be taken upon detecting at least one phrase to which said impact parameter was assigned, and wherein said at least one action is determined according to said impact parameter.
- 12. A method according to claim 10, wherein said assigning said default security policy comprises:
a. allowing said owner to assign a secrecy level to said stored phrase; b. defining at least one rule, wherein said at least one rule defines at least one action to be taken upon detecting at least one phrase to which said secrecy level was assigned, and wherein said at least one action is determined according to said secrecy level.
- 13. A method according to claim 10, wherein said assigning said default security policy comprises:
a. allowing said owner to define a project to which said stored phrase are related; b. defining at least one rule, said rules defines at least one action to be taken upon detecting at least one phrase to which said project was assigned, and wherein said at least one action is determined according to said project.
- 14. A method according to claim 1, wherein said owner comprises a group of users.
- 15. A method according to claim 6, wherein said approving at least one phrase comprises:
a. determining the expected increase in false-alarm rate due to adding said at least one phrase or its said accompanying security policy, and b. deciding whether to approve said at least one phrase based on said expected increase in said false-alarm rate.
- 16. A method according to claim 15, wherein said determining said expected increase in false-alarm rate comprises comparing the distribution of said at least phrase in classified documents and in un-classified documents.
- 17. A method according to claim 15, wherein said determining said expected increase in false-alarm rate comprises comparing the distribution of said at least one phrase in documents owned by the user that suggests said phrase or by users that are authorized senders according to said accompanying security policy of said at least phrase, with the distribution of said phrase candidate within the documents of users that are not authorized senders according to said accompanying security policy of said at least one phrase.
- 18. A method according to claim 5, wherein said required action comprises at least one of the following:
preventing distribution of said digital item; preventing storage of said digital item; preventing usage of said digital item; reporting distribution of said digital item; reporting storage of said digital item; reporting usage of said digital item; reporting; alerting about distribution of said digital item; alerting storage of said digital item; alerting usage of said digital item; alerting; logging distribution of said digital item; logging storage of said digital item; logging usage of said digital item; logging; notifying about distribution of said digital item; notifying about storage of said digital item; notifying about usage of said digital item; notifying; notifying to an administrator; notifying to a manager; notifying to a recipient; notifying to a sender; notifying to an owner of said digital item; quarantine; alerting an administrator; alerting a manager; alerting a recipient; alerting a sender; alerting an owner of said digital item; reporting to an administrator; reporting to a manager; reporting to a recipient; reporting to a sender; reporting to an owner of said digital item; encrypting said digital item; changing said digital item; replacing an information object with said digital data item; and utilizing digital rights management technology on said digital item.
- 19. A method according to claim 4, wherein said usage comprises at least one of the following:
storage; sopying a file; copying an excerpt; editing; copying to clipboard; copying an excerpt to clipboard; changing format; changing encoding; renaming a file; encryption; decryption; changing digital management; opening by an application; and printing.
- 20. A method according to claim 4, wherein said distribution policy comprises distribution regulation, said distribution regulation being for regulating at least one of the following:
sending said digital item via mail; sending said digital item via web mail; uploading said digital item to a web server; uploading said digital item to a FTP server; sending said digital item via a file transfer application; sending said digital item via an instant messaging application; sending said digital item via a file transfer protocol; and sending said digital item via an instant messaging protocol.
- 21. A method according to claim 1, wherein said security policy comprises at least one rule that assign authorizations based on both horizontal and vertical compartmentalization within an organization.
- 22. A method according to claim 1, wherein said security policy comprises at least one rule that allows organizational entities to inherit the authorizations of their subordinates.
- 23. A method according to claim 1, wherein said policy comprises placing a substantially imperceptible marking in said digital item, said marking comprising information content, and said method comprising placing said marking, when indicated by said policy, before allowing at least one of the following:
storage of said digital item; usage of said digital item; and distribution of said digital item.
- 24. A method according to claim 1, further comprising assigning a custodian to said phrase.
- 25. A method according to claim 1, wherein said policy is dependent on at least one of the following:
the domain of a respective digital item; the identity of a system; the identity of a user; the identity level of a user authorizing an action; the identity of a user requesting an action; the identity of a user involved in an action; the identity of a user receiving an digital item; the authentication level of a system; the authentication level of a user; the authentication level of a user requesting an action; the authentication level of a user authorizing an action; the authentication level of a user involved in an action; the authentication level of a user receiving said digital item; the authentication level of a user sending said digital item; the format of an digital item instance; an interface being used; an application being used; encryption being used; digital rights management technology being used; detection of transformation, wherein said transformation is operable to reduce the ability to identify said transformed digital item; digital item integrity; regular usage pattern; regular distribution pattern; regular storage pattern; information path; consistency of an action with usage pattern; the identity of a user overriding policy and authorizing the action in respect to said digital item; the authentication level of a user overriding policy and authorizing the action in respect to said digital item; the identity of a user sending digital item; information property of said digital item; language of said digital item; representation of said digital item; operations done on of said digital item; identity of users involved along the life cycle of said digital item; application used on of said digital item; transition channel of said digital item; participant agents; virtual location of a computer; logical location of a computer; physical location of a computer; type of a computer; type of a laptop computer; type of a desktop computer; type of a server computer; and owner identity.
- 26. A method according to claim 1, wherein said digital medium comprises at least one of the following:
a distribution channel; and a storage medium.
- 27. A method for distributed management of document distribution over an electronic network, the method comprising:
allowing each of a plurality of users to define respective key words or key phrases; assigning a user defining a respective keyword or key phrase as an owner of said respective keyword or key phrase; monitoring documents in distribution over said network for the presence of defined keywords or key phrases; and upon discovering a defined key word or key phrase, determining an owner thereof and notifying said owner.
- 28. The method of claim 27, wherein said step of allowing each of a plurality of users to define respective key words or key phrases comprises:
testing a suggested key word or key phrase against said document distribution to determine a rate of false alarms that use of said suggested key word or key phrase would cause, and accepting said suggested key word or key phrase only if a predetermined false alarm threshold level is not reached.
- 29. An apparatus for distributed management of phrase-based security policy, said security policy being applied with respect to a digital medium, comprising:
a. a storage device for storing at least one phrase together with an accompanying security policy; b. a policy reference monitor for assigning an owner to said at least one stored phrase; c. a network monitoring module for scanning and analyzing said digital medium in order to locate and identify said at least one stored phrase; d. a policy enforcement unit for applying and enforcing said security policy with respect to said digital item upon detection of said at least one stored phrase within a digital item in said digital medium, and e. a notification and instruction's receiving module for notifying said owner about detection of said phrase owned by said owner and receiving the instruction of said owner.
- 30. An apparatus according to claim 29, wherein said phrase comprises any of: keyword, keyphrase and number.
- 31. An apparatus according to claim 29, wherein said security policy comprises either of a distribution policy and a usage policy.
- 32. An apparatus according to claim 29, wherein said security policy comprises determining a legitimacy of at least one of the following:
a set of authorized recipients; a set of authorized usages; a set of allowed formats; a set of allowed distribution channels, and a required action.
- 33. An apparatus according to claim 29, wherein said digital medium comprises at least one of the following:
a distribution channel; and a storage medium.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is related to and claims priority from U.S. Provisional Patent Application No. 60/475,491, filed Jun. 4, 2003, the contents of which are hereby incorporated herein by reference in their entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60475491 |
Jun 2003 |
US |