1. Field
The present invention is directed to a system that can prevent confidential or proprietary email messages from being inadvertently sent.
2. Description of the Related Art
Proprietary or otherwise sensitive or confidential information is routinely exchanged during the ordinary course of business. While the errant or inadvertent transmission of proprietary information in the form a “hard-copy” is rare, such is not the case when proprietary information is included in electronic form (e.g., electronic mail, or “e-mail”.) It is not at all uncommon that email is misaddressed in haste or simply as the result of an oversight. In that event, proprietary information can and does fall into the wrong hands, e.g., a business competitor or the adverse party in a legal proceeding, too frequently. What is needed is the addition of at least two steps in the process of creating and transmitting electronic messages in order to prevent inadvertent disclosure of sensitive information. The first additional step is one that scans the content of the email, including any attachments, for markings that indicate it includes proprietary information (e.g., “Proprietary” header and/or footer, etc.). The second additional step requests that the sender confirm that the email and attachments are intended for the specific addressee(s).
It is an aspect of the embodiments to provide a system that alerts the user in order to prevent confidential or proprietary email messages from being sent to an unintended recipient inadvertently.
The above aspects can be attained by a system that alerts a user with a message pop-up when an email message is to be sent that may be sensitive, such as when it includes a word such a “confidential”. The user can allow the message to be sent or go back to a mail create/edit operation where the message and/or addressees can be revised. Trigger words can be stored in a table or database. The system also detects sensitive words in attachments. The sensitive words detected and their locations can be shown in the pop-up message.
These together with other aspects and advantages which will be subsequently apparent, reside in the details of construction and operation as more fully hereinafter described and claimed, reference being had to the accompanying drawings forming a part hereof, wherein like numerals refer to like parts throughout.
Proprietary information is commonly exchanged among business partners or potential partners. When it is, confidentiality is or may be critical to a successful venture, and therefore the unintended disclosure of proprietary information can have disastrous effects.
In the modern times, most if not all business data is exchanged electronically, for example by electronic mail (“email”) via the public Internet (“Internet”).
When a sender wishes to share proprietary information that's been prepared as described above, they will ordinarily transmit it via the Internet. As is commonly done today, an email is drafted (see
It can and does happen that email is errantly addressed and therefore ends up in the possession of an unintended recipient. To catch the unintended error and prevent this undesirable result, operations 402-405 of
In the event that one of any of the recognizable words is found 403, in either the email or the attachments, the application displays a “Confirmation Request” 404 in the form of a “pop-up” 501 (see
As depicted in
The embodiments have been described with the pop-up confirmation being displayed when a trigger word is discovered, this can occur when a trigger word is first encountered and it is possible to scan the message and all attachments for trigger words before displaying the pop-up and also provide a list indicating where and what trigger words can be found in the message and/or attachments.
The alert has been described as a pop-up message; the alert can also include a sound alert as well as other alerting techniques such as a blinking red box surrounding the pop-up message.
The embodiments have been described with respect to the scan operation being performed by the client computer 101; however, the scanning can be performed by the server or another machine. The embodiments have been described as using a client computer (such as a desktop, laptop, tablet, etc.) to create the email, attach the attachments, send, etc.; however, it is possible for other types of devices to create and send the email, for example, a handheld digital assistant, a smart telephone, a smart cellular telephone, etc.
The embodiments have been discussed with respect to performing the word search for sensitive words being initiated by the SEND button being pressed. However, the checking can occur based on other events. For example, the checking can be initiated when an address is added to the address filed of a message. As another example, the checking can run in the background much like a spell checker and alert the user whenever a sensitive word is added to the message, that is, the checking can be initiated or started by the creation of an email message or the start of the text. In this situation, it is also possible to set a flag for the production of an alert during the creation of the message when it is being drafted and then pop-up the alert when an address is added to the message address field. The checking can also occur, particularly for an attachment, when or each time an attachment is attached to a message.
The embodiments can be implemented in computing hardware (computing apparatus) and/or software, such as (in a non-limiting example) any computer that can store, retrieve, process and/or output data and/or communicate with other computers. The results produced can be displayed on a display of the computing hardware. A program/software implementing the embodiments may be recorded on a computer-readable media, e.g., a non-transitory or persistent computer-readable medium. The program/software implementing the embodiments may also be transmitted over a transmission communication path, e.g., a network implemented via hardware. Examples of the non-transitory or persistent computer-readable media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or a semiconductor memory (for example, RAM, ROM, etc.). Examples of the magnetic recording apparatus include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT). Examples of the optical disk include a DVD (Digital Versatile Disc), a DVD-RAM, a CD-ROM (Compact Disc—Read Only Memory), and a CD-R (Recordable)/RW. An example of communication media via which the program/software may be sent includes, for example, a carrier-wave signal.
The many features and advantages of the invention are apparent from the detailed specification and, thus, it is intended by the appended claims to cover all such features and advantages of the invention that fall within the true spirit and scope of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
6732149 | Kephart | May 2004 | B1 |
7024462 | McErlean | Apr 2006 | B1 |
7730540 | Woirhaye et al. | Jun 2010 | B1 |
7865958 | Lieblich et al. | Jan 2011 | B2 |
7873183 | He et al. | Jan 2011 | B2 |
7877446 | Tamai et al. | Jan 2011 | B2 |
8001609 | Chan et al. | Aug 2011 | B1 |
8181036 | Nachenberg | May 2012 | B1 |
8199965 | Basavapatna et al. | Jun 2012 | B1 |
9306887 | Brunetti et al. | Apr 2016 | B1 |
20020004908 | Galea | Jan 2002 | A1 |
20030169151 | Ebling et al. | Sep 2003 | A1 |
20040215726 | Arning et al. | Oct 2004 | A1 |
20040225645 | Rowney et al. | Nov 2004 | A1 |
20040243844 | Adkins | Dec 2004 | A1 |
20050262557 | Fellenstein et al. | Nov 2005 | A1 |
20060005017 | Black et al. | Jan 2006 | A1 |
20060005247 | Zhang et al. | Jan 2006 | A1 |
20060026091 | Keen et al. | Feb 2006 | A1 |
20060075228 | Black et al. | Apr 2006 | A1 |
20060236404 | Burakoff et al. | Oct 2006 | A1 |
20070005708 | Juliano | Jan 2007 | A1 |
20070094394 | Singh et al. | Apr 2007 | A1 |
20070106741 | Christoff et al. | May 2007 | A1 |
20070112821 | Lunt et al. | May 2007 | A1 |
20070271608 | Shimizu et al. | Nov 2007 | A1 |
20080091785 | Pulfer et al. | Apr 2008 | A1 |
20080162652 | True et al. | Jul 2008 | A1 |
20080168145 | Wilson | Jul 2008 | A1 |
20080244437 | Fischer | Oct 2008 | A1 |
20080301454 | Malcolm et al. | Dec 2008 | A1 |
20090070881 | Yellepeddy et al. | Mar 2009 | A1 |
20090119579 | Fellenstein et al. | May 2009 | A1 |
20090158441 | Mohler et al. | Jun 2009 | A1 |
20090177750 | Lee et al. | Jul 2009 | A1 |
20090214034 | Mehrotra et al. | Aug 2009 | A1 |
20090265441 | Hirota et al. | Oct 2009 | A1 |
20100057720 | Kalyan et al. | Mar 2010 | A1 |
20100085593 | Peled et al. | Apr 2010 | A1 |
20100125891 | Baskaran | May 2010 | A1 |
20100138754 | Wilson et al. | Jun 2010 | A1 |
20100175136 | Frumer et al. | Jul 2010 | A1 |
20100198931 | Pocklington et al. | Aug 2010 | A1 |
20100306850 | Barile et al. | Dec 2010 | A1 |
20110083159 | Brown et al. | Apr 2011 | A1 |
20110138467 | Macwan et al. | Jun 2011 | A1 |
20110313757 | Hoover et al. | Dec 2011 | A1 |
20120016884 | Rowney et al. | Jan 2012 | A1 |
20120023182 | Pulfer et al. | Jan 2012 | A1 |
20120159649 | Roger et al. | Jun 2012 | A1 |
20120232996 | Scott | Sep 2012 | A1 |
Entry |
---|
http://service.meltwaternews.com/mnews/redirect.html?docid=7366915&userId=2982733&cld=128894&pld=11&agentId=178656&type=3&etype=USER—CREATED&t=and+The+US+Patent+Goes+To+%E2%80%A6+Kevin+Spacey&cdt=1463403000000&sn=Law360&cc=United+States&surl=&an=Clicked+from+Archive%2C+Newsfeed%2C+or+Newsletter&ue=ryan.elliott@uspto.gov&url=. |
Number | Date | Country | |
---|---|---|---|
20120011192 A1 | Jan 2012 | US |