There are currently a variety of different sources of policies and regulations that govern the dissemination of personal information. In fact, there are even a variety of different sources of governmental regulations that govern the dissemination of personal information. Some of these regulations include SOX, HIPPA, and GLBA. Organizations that deal with certain types of information are required to be in compliance with all of these regulations.
Another source of data dissemination policies can come from an organization itself. For instance, organizations often have internal policies that govern how certain types of information can be disseminated. By way of example, some organizations have policies governing the dissemination of intellectual property content, to ensure that it does not leak out of the company. Some organizations also have policies that govern the use of inappropriate language by employees in various forms of communications, such as electronic mail communications, instant messaging communications, chats, etc.
Often, the content that is subject to these regulations and policies is operated on by information workers that have specific business needs and are operating under time constraints. These information workers may have a handbook that contains a large volume of regulations or policies (both internal and external), and the worker is expected to know and comply with all of them.
Current attempts to enforce data dissemination policies or regulations (collectively referred to as data dissemination policies) is quite cumbersome and can interfere with the information worker's daily tasks. For instance, some organizations attempt to enforce both internal and external data dissemination policies on information workers through different mechanisms. Some current systems enforce these polices in electronic mail traffic by making an estimate of whether an electronic mail message has sensitive data in it, and then blocking or moderating that data. In one specific example, when an information worker composes an email, with sensitive content, to multiple recipients, the information worker is presented with a dialog requiring the information worker to ensure that each recipient has authorization to access the sensitive content. This is a fairly cumbersome process and usually reduces productivity, while its impact on ensuring compliance with data dissemination policies is relatively small. These and other types of measures often impede the business that can be conducted by an information worker, causing the information worker to become annoyed with such policies and attempt to work around them in order to complete the business transactions they are attempting to perform.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
An authoring component determines the sensitivity of an authored document and generates a user interface conveying contextual educational information about data dissemination policies that apply to the document. The user interface also provides user input mechanisms that allow the user to provide inputs that affect the enforcement of a given data dissemination policy on the document.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
In the embodiment shown in
The document 112, as it is being authored, is provided to sensitivity determination component 122. Component 122 can take a variety of different forms (some of which are described below) to determine whether document 112 is a sensitive document that is subject to either internal or external document dissemination policies. If so, document determination component 122 causes user interface component 120 to generate, on user interface 119, a display that describes the data dissemination policies that apply to document 112, and any actions which will be taken based on the application of those policies to document 112. Similarly, in one embodiment, component 122 causes user interface component 120 to generate a user input mechanism 118 that allows user 110 to provide feedback on the policy or to take a variety of other actions that affect the application of the specific data dissemination policy to document 112 being authored by user 110. A variety of these actions are described below with respect to
Before proceeding further with the present description, it should be noted that the various components and portions of system 100 are shown divided into various applications and components, but this is done for the sake of example only. The components can be combined in other ways, or split up differently, so that the functionality performed by any given component in
In any case,
In one embodiment, user 110 first accesses authoring component 102 and opens authoring application 116. Authoring application 116 generates, though user interface component 120, a user interface display 119 that allows user 110 to create a document 112 and generate content in document 112. In the embodiment where application 116 is an electronic mail application, user 110 provides the necessary user inputs through mechanisms 118 to open a new electronic email message and begin typing, attaching other documents, or taking other actions to generate content in an electronic mail message. The user generating content in a document 112 is indicated by block 150 in
As briefly described above, the document 112 need not necessarily be an electronic mail message or attachment, as indicated by block 152 in
As the user 110 is generating document 112, authoring application 116 invokes sensitivity determination component 122 to perform a sensitivity analysis on document 112 to determine whether it (as yet) includes sensitive information or is otherwise determined to be a sensitive document that is subject to one or more data dissemination policies. This is indicated by block 164 in
Other types of sensitivity analysis can be performed as well. For instance, some documents 112 may have associated metadata tags where one of those tags may indicate whether the document 112 is sensitive. In that case, sensitivity determination component 122 simply reads the appropriate metadata tag to determine whether document 112 is sensitive, regardless of its content. Analyzing metadata is indicated by block 168 in
Alternatively, user 110 may expressly mark document 112 as being sensitive in some other way. If that is the case, component 122 simply looks for the user marking of sensitivity, again regardless of the content of document 112. This is indicated by block 170 in
In another embodiment, component 122 determines the sensitivity of document 112 based on a location where it is stored or from which it is being accessed or generated. For instance, a supervisor may be conducting research on whether to acquire a competitor. All of the documents that embody the research may be shared on a collaboration site, or stored in a given folder on a storage system. The supervisor may mark the entire collaboration site or folder as being sensitive. In that case, sensitivity determination component 122 simply determines whether the location where the document 112 is stored or where it is being accessed or generated has been marked as sensitive. If so, document 112 is automatically marked as sensitive, regardless of its content. This is indicated by block 172 in
In another embodiment, it may be that a given user 110 or recipient of a document 112 means that the document 112, itself, is sensitive. For instance, it may be that a certain individual in a human resources department is in charge of collecting all employee evaluations (that were generated from the employees' supervisors). In that case, it may be that all documents sent to that particular recipient in the human resources department will be labeled as sensitive. Also, it may be that a give person in the human resources department is responsible for handling salary information with individual employees. In that case, it may be desirable to have all documents generated by that person in the human resources department labeled sensitive. Therefore, every document generated by that person will be determined to be sensitive by component 122. Analyzing the author and recipient of a document to determine sensitivity is determined by block 174 in
Of course, these are exemplary only and other sensitivity analyses can be performed. This is indicated by block 176.
Based on the analysis performed, sensitivity determination component 122 determines whether document 112, as yet, is classified as a sensitive document. This is indicated by block 178 in
However, if at block 178 it is determined that the document 112 is sensitive, then authoring application 116 illustratively performs sensitivity processing to determine whether and which data dissemination policies apply and what action is to be taken based on the policies that are to be applied to document 112. This is indicated by block 180 in
A number of exemplary actions that can be taken by application 116 are based on application of the data dissemination policies to document 112 also shown in
Application 116 can also block an action that the user is attempting to take. For instance, where application 116 is an electronic mail application, and either the attachment or the body of the electronic mail contains sensitive material, and where the user is attempting to send that electronic mail message outside of the company, the sending operation may be blocked. The blocking action is indicated by block 186 in
In another embodiment, application 116 not only conveys a message indicating why a data dissemination policy is going to apply to document 112, and describes the action that the application will take (such as blocking the sending of an email), but it can also provide the user with an opportunity to modify or override the action to be taken by application 116 in enforcing the data dissemination policy. For instance, assume that the user has typed a sequence of numbers in the body of an electronic mail message. Assume also that sensitivity determination component 122 has analyzed that content and has estimated that it contains a credit card number. Then, when the user clicks on the Send button to send the electronic mail message, application 116 can display a notification 184 indicating that it has been determined that the electronic mail message contains sensitive material and further indicating that the send operation will be blocked. However, application 116 may also provide suitable user mechanisms 118 on a user interface generated by user interface component 120, that allows the user to override the blocking action. By way of example, assume that the digits entered in the body of the electronic mail message were not actually a credit card number, but were instead some other type of number that is not sensitive. Then, when the user actuates the appropriate override user input mechanism, the user can change the sensitivity determination or simply override the blocking action. Generating the user interface with the blocking and overriding features is indicated by block 188 in
In response to generating the policy tip and describing the action to be taken, at block 182, the user can provide one or more user inputs through user input mechanisms 118, that determine how further processing is performed. This is indicated by block 192 in
The user 110 may also take an override action. This was discussed above with respect to block 188. Again, the description of the policy being implemented and the action being taken may be that the electronic mail message is to be blocked, because it contains sensitive information or because it is being sent to an unauthorized recipient. The user may wish to override this action because, while the sensitive information is being sent to an unauthorized recipient, the recipient can be trusted and the electronic mail message contains time sensitive information that is required in order to complete a business transaction, on time. Taking the override action is indicated by block 196 in
The user may also input a reason that the user is overriding the action. For instance, and as is discussed below in greater detail with respect to
Similarly, user 110 may change the sensitivity determination. For instance, if sensitivity determination component 122 identifies a sequence of numbers in document 112 and estimates the sequence is a credit card number, when in fact it is not, user 110 can illustratively input, through one of user input mechanisms 118, an indication that the sensitivity determination component 122 is inaccurate, and that document 112 actually does not contain sensitive information. Changing the sensitivity determination is indicated by block 198 in
Finally, application 116 performs any additional processing based on the user inputs received at block 192. For instance, as discussed above, application 116 might generate a dialog box that allows the user to input even further inputs or to select from a menu of items. This is indicated by block 204 and examples are described below with respect to
A series of user interface displays will now be discussed to better illustrate one embodiment of the operation of system 100, as described with respect to
In any case,
As the user is generating the electronic mail message (which corresponds to document 112) sensitivity determination component 122 is analyzing document 112 to determine whether it contains sensitive material. When the spreadsheet attachment is attached in portion 306, sensitivity determination component 122 also analyzes that attachment.
In the embodiment shown in
Heading note portion 318 is simply a heading that indicates that a data dissemination policy is going to be applied to the electronic mail message being authored, or to an attachment. Description portion 320, in this embodiment, states “This e-mail contains sensitive records.” Thus, description portion 320 describes the reason that a data dissemination policy is going to be applied to this electronic mail message. Warning or instruction portion 322 states “Ensure it is sent to authorized recipients.” This portion instructs the user how to comply with the particular data dissemination policy being implemented. Therefore, in portion 312 in display 300 it can be seen that portion 318 notifies the user that a data dissemination is being implemented, and description portion 320 and warning or instruction portion 322 educate user 110 as to the reason that a data dissemination policy is being implemented and as to how to comply with that policy. This is all done in the context of the document itself (the email message and attachment) while the document is being authored and while it is being displayed to user 110.
In the embodiment shown in
It will be noted, however, that description portion 320 describes a different set of circumstances for applying a data dissemination policy. In the embodiment shown in
Portion 312 on display 340 also includes an unauthorized recipient portion 342. Portion 342 specifically identifies the unauthorized recipient, Jacob Smith. That is, in the example shown, portion 342 states “Jacob Smith is not authorized to receive this mail.” Portion 342 also illustratively includes another user input mechanism 344 that allows the user to quickly remove Jacob Smith from the recipient portion 302 of the email shown in
It should also be noted that in one embodiment, the offending recipient (Jacob Smith) is also indicated by a visual cue in portion 302. For instance, the name Jacob Smith in portion 302 can be shown in red, or in another color that visually distinguishes it on display 340 and that also distinguishes it from other, non-offending, recipients that may appear in portion 302.
Display 360 also shows that application 116 has given user 110 two options in order to send the email. The first is to override it using button 356, but the second is to take a remedial action by removing the offending recipient by clicking element 344.
Display 362 shown in
It should be noted that, when the user overrides a policy, some additional processing can be performed. For instance, certain members of the organization may be notified so that the override can be audited, or otherwise monitored by other personnel.
In the embodiment shown in
In either case, in the embodiment shown in
Dialog box 388 also provides a user actuable button 390 that enables the user to provide feedback to application 116 as to the accuracy of the sensitivity determination made by component 122. By actuating button 390, the user 110 can provide feedback to application 116 indicating that sensitivity determination component 122 has misidentified the information in the email as being sensitive information.
Now assume that the user tries to save the spreadsheet to a public storage system. Application 116 illustratively applies the data dissemination policies to the sensitive information and blocks that operation, or notifies the user that he or she should not perform that operation, or blocks the operation and offers the user the ability to override data dissemination policy, or any of the other actions discussed above, or even different actions. All of these same features can be used with many other applications as well.
It should also be noted that system 100 can be deployed in a wide variety of different architectures. Different portions of system 100 can be deployed on user device 108, or on servers. In addition, portions of system 100 can be cloud-based services, deployed in a cloud-based architecture.
Also, they can be deployed in many architectures such as on a client device, hosted on a server, divided among one or more clients and one or more servers, or in a cloud computing architecture.
A cloud computing architecture illustratively include infrastructure, platforms and applications. The cloud services are coupled to other devices or systems such as cloud servers, desktop computers, tablet computers, laptop computers, cellular phones or smart phones or other mobile devices or personal digital assistants. Cloud computing provides computation, software, data access, and storage services, rather than products, that do not require end-user knowledge of the physical location or configuration of the system that delivers the services. In various embodiments, cloud computing delivers the services over a wide area network, such as the internet, using appropriate protocols. For instance, cloud computing providers deliver applications over a wide area network and they can be accessed through a web browser or any other computing component. Software or components of systems 100 as well as the corresponding data, can be stored on servers at a remote location in the cloud. The computing resources in a cloud computing environment can be consolidated at a remote data center location or they can be dispersed. Cloud computing infrastructures can deliver services through shared data centers, even though they appear as a single point of access for the user. Thus, the components and functions described herein can be provided from a service provider at a remote location using a cloud computing architecture. Alternatively, they can be provided from a conventional server, or they can be installed on a client device directly, or in other ways.
Under other embodiments, applications or systems (like system 100) are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 along a bus 19 that is also connected to memory 21 and input/output (I/O) components 23, as well as clock 25 and location system 27.
I/O components 23, in one embodiment, are provided to facilitate input and output operations. I/O components 23 for various embodiments of the device 16 can include input components such as buttons, touch sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as a display device, a speaker, and or a printer port. Other I/O components 23 can be used as well.
Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.
Location system 27 illustratively includes a component that outputs a current geographical location of device 16. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.
Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, data store 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. It can also include computer storage media (described below). Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Portions of system 100, for example, can reside in memory 21. Processor 17 can be activated by other components to facilitate their functionality as well.
Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.
Applications 33 can be applications that have previously been stored on the device 16 or applications that are installed during use, although these can be part of operating system 29, or hosted external to device 16, as well.
The mobile device of
Note that other forms of the devices 16 are possible. Examples include tablet computing devices, music or video players, and other handheld computing devices.
Computer 810 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media is different from, and does not include, a modulated data signal or carrier wave. It includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation,
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
The present application is a continuation of and claims priority of U.S. patent application Ser. No. 13/361,501, filed Jan. 30, 2012, the content of which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5444779 | Daniele | Aug 1995 | A |
5958005 | Thorne et al. | Sep 1999 | A |
6006242 | Poole et al. | Dec 1999 | A |
6014135 | Fernandes | Jan 2000 | A |
6104990 | Chaney et al. | Aug 2000 | A |
6148297 | Swor et al. | Nov 2000 | A |
6308148 | Bruins et al. | Oct 2001 | B1 |
6629081 | Cornelius et al. | Sep 2003 | B1 |
6678409 | Wu et al. | Jan 2004 | B1 |
6826609 | Smith et al. | Nov 2004 | B1 |
6850252 | Hoffberg | Feb 2005 | B1 |
6968308 | Brockett et al. | Nov 2005 | B1 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7454778 | Pearson et al. | Nov 2008 | B2 |
7483977 | Mikhailov et al. | Jan 2009 | B2 |
7533420 | Battagin et al. | May 2009 | B2 |
7610233 | Leong et al. | Oct 2009 | B1 |
7729995 | Alain | Jun 2010 | B1 |
7738900 | Manroa et al. | Jun 2010 | B1 |
7787863 | van de Groenendaal | Aug 2010 | B2 |
7797010 | Manroa et al. | Sep 2010 | B1 |
7809698 | Salz et al. | Oct 2010 | B1 |
7853472 | Al-Abdulqader et al. | Dec 2010 | B2 |
7876335 | Pittenger et al. | Jan 2011 | B1 |
7903549 | Judge et al. | Mar 2011 | B2 |
7913167 | Cottrille | Mar 2011 | B2 |
8117022 | Linker | Feb 2012 | B2 |
8140664 | Huang et al. | Mar 2012 | B2 |
8140864 | Osaki | Mar 2012 | B2 |
8151200 | Roger et al. | Apr 2012 | B2 |
8161526 | Corrao et al. | Apr 2012 | B2 |
8234693 | Stahl et al. | Jul 2012 | B2 |
8316049 | Saito | Nov 2012 | B2 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8346532 | Chakra et al. | Jan 2013 | B2 |
8396838 | Brockway et al. | Mar 2013 | B2 |
8539349 | Kirshenbaum | Sep 2013 | B1 |
8554576 | Reicher et al. | Oct 2013 | B1 |
8676187 | Ionescu et al. | Mar 2014 | B2 |
8707384 | Jain et al. | Apr 2014 | B2 |
8880989 | Tanzer et al. | Nov 2014 | B2 |
9087039 | Gandhi | Jul 2015 | B2 |
20010018746 | Lin | Aug 2001 | A1 |
20010028364 | Fredell et al. | Oct 2001 | A1 |
20030074354 | Lee et al. | Apr 2003 | A1 |
20030105734 | Hitchen et al. | Jun 2003 | A1 |
20030182573 | Toneguzzo et al. | Sep 2003 | A1 |
20040205531 | Innes et al. | Oct 2004 | A1 |
20040243408 | Gao et al. | Dec 2004 | A1 |
20040260697 | Ohnuma et al. | Dec 2004 | A1 |
20060048224 | Duncan et al. | Mar 2006 | A1 |
20060094400 | Beachem et al. | May 2006 | A1 |
20060117014 | Qi | Jun 2006 | A1 |
20060120526 | Boucher et al. | Jun 2006 | A1 |
20060129942 | McCary | Jun 2006 | A1 |
20060253275 | Parkinson et al. | Nov 2006 | A1 |
20060272024 | Huang et al. | Nov 2006 | A1 |
20070168666 | Craigie | Jul 2007 | A1 |
20070174610 | Furuya | Jul 2007 | A1 |
20070261099 | Broussard et al. | Nov 2007 | A1 |
20080027910 | Wen et al. | Jan 2008 | A1 |
20080052395 | Wright et al. | Feb 2008 | A1 |
20080104381 | Peacock et al. | May 2008 | A1 |
20080201376 | Khedouri et al. | Aug 2008 | A1 |
20080221882 | Bundock et al. | Sep 2008 | A1 |
20080235760 | Broussard et al. | Sep 2008 | A1 |
20080302870 | Berini et al. | Dec 2008 | A1 |
20080310718 | Balchandran et al. | Dec 2008 | A1 |
20090019121 | Mears | Jan 2009 | A1 |
20090070881 | Yellepeddy et al. | Mar 2009 | A1 |
20090119372 | Callanan et al. | May 2009 | A1 |
20100036779 | Sadeh-Koniecpol et al. | Feb 2010 | A1 |
20100063923 | Lundberg et al. | Mar 2010 | A1 |
20100076957 | Staddon et al. | Mar 2010 | A1 |
20100095349 | Motoyama | Apr 2010 | A1 |
20100169771 | Pelegrin et al. | Jul 2010 | A1 |
20100174528 | Oya et al. | Jul 2010 | A1 |
20100180213 | Karageorgos et al. | Jul 2010 | A1 |
20100306139 | Wu et al. | Dec 2010 | A1 |
20110040983 | Grzymala-Busse et al. | Feb 2011 | A1 |
20110060747 | Rose et al. | Mar 2011 | A1 |
20110078587 | Guy et al. | Mar 2011 | A1 |
20110148938 | Yang | Jun 2011 | A1 |
20110166918 | Allaire et al. | Jul 2011 | A1 |
20110246965 | Strack et al. | Oct 2011 | A1 |
20110276713 | Brand | Nov 2011 | A1 |
20110276800 | Adams et al. | Nov 2011 | A1 |
20120084868 | Julisch | Apr 2012 | A1 |
20120114119 | Ahuja et al. | May 2012 | A1 |
20130198618 | Tenzer et al. | Aug 2013 | A1 |
20130204609 | Gandhi et al. | Aug 2013 | A1 |
Number | Date | Country |
---|---|---|
20060050444 | May 2006 | KR |
20060065480 | Jun 2006 | KR |
20110068072 | Jun 2011 | KR |
Entry |
---|
“Proofpoint Enterprise Privacy for Data Loss Prevention”, Retrieved at <<http://www.proofpoint.com/products/privacy/index.php>>, Retrieved Date: Jan. 13, 2012, 2 pages. |
“The Anti-Spam & Email Security Platform a Solution for Every Organization”, Retrieved at <<http://www.sonicwall.com/us/products/376.html>>, Retrieved Date: Jan. 13, 2012, 2 pages. |
International Search Report and Written Opinion for International Application No. PCT/US2013/023037, Filing date: Jan. 25, 2013, 7 pages. |
Prosecution History for U.S. Appl. No. 13/361,501 including: Issue Notification dated Oct. 15, 2014, Notice of Allowance dated Jul. 8, 2014, Amendment with RCE dated Mar. 27, 2014, Final Office Action dated Nov. 27, 2013, Amendment dated Sep. 30, 2013, Non Final Office Action dated May 24, 2013, and Application filed Jan. 30, 2012. 112 pages. |
Paukkeri, Mari-Sanna, et al. “A Language-Independent Approach to Keyphrase Extraction and Evaluation.” COLING (Posters). 2008. 4 pages |
Bracewell. D. B., Ren, F., & Kunowa, S. (2005). Multilingual single document keyword extraction for information retrieval. In Natural Language Processing and Knowledge Engineering, 2005, IEEE NLP-KE'05. Proceedings of 2005 IEEE International Conference on (pp. 517-522) IEEE. |
“International Search Report”, Mailed Date: Jun. 4, 2013, Application No. PCT/US2013/024244, Filed Date: Feb. 1, 2013, 9 pages. |
Prosecution History from U.S. Appl. No. 13/367,469 including: Advisory Action dated Nov. 13, 2014, Amendment after Final dated Oct. 30, 2014, Applicant Initiated Interview Summary dated Oct. 20, 2014, Final Office Action dated Aug. 26, 2014, Amendment dated Jun. 17, 2014, Non-Final Office Action dated Mar. 14, 2014, and Application and Drawings filed Feb. 7, 2012, 87 pages. |
Charbonneau, Stephane. “The role of user-driven security in data loss prevention,” Computer Fraud & Security 2011.11 (2011): 5-8. |
Prosecution History from U.S. Appl. No. 13/367,469 including: Non-Final Office Action dated Jan. 22, 2015 and Amendment with RCE dated Dec. 16, 2014, 14 pages. |
Prosecution History for U.S. Appl. No. 13/367,469 including: Notice of Allowance dated Mar. 27, 2015 and Amendment dated Mar. 12, 2015, 19 pages. |
Issue Notification for U.S. Appl. No. 13/367,469 dated Jun. 30, 2015, 1 page. |
Prosecution History for U.S. Appl. No. 14/747,428 including: Preliminary Amendment dated Oct. 6, 2015, Response to Notice to File Missing Parts dated Oct. 6, 2015, Notice to File Missing Parts dated Jul. 6, 2015, Application and Drawings filed Jun. 23, 2015, 49 pages. |
Non-Final Office Action for U.S. Appl. No. 14/747,428 dated Dec. 11, 2015, 10 pages. |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US13/24244”, Mailed Date: Aug. 21, 2014, 6 Pages. (MS# 335372.02). |
“Supplementary Search Report Received for European Patent Application No. 13747052.2”, Mailed Date: Nov. 4, 2015, 7 Pages. (MS# 335372.04). |
Lee, et al., “Development of a Multi-Classifier Approach for Multilingual Text Categorization”, In Proceeding of the International Conference on Data Mining, Jun. 26, 2006, 5 Pages. |
Number | Date | Country | |
---|---|---|---|
20150026763 A1 | Jan 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13361501 | Jan 2012 | US |
Child | 14508407 | US |