Embodiments of the invention relate to the field of processing data, and more particularly, to identity consolidation for a plurality of electronic identities.
A modern organization typically maintains a data storage system to store and deliver records concerning various significant business aspects of the organization. Stored records may include data on customers (or patients), contracts, deliveries, supplies, employees, manufacturing, or the like. A data storage system of an organization usually utilizes a tabular storage mechanism, such as relational databases, client/server applications built on top of relational databases (e.g., Siebel, SAP, or the like), object-oriented databases, object-relational databases, document stores and file systems that store table formatted data (e.g., CSV files or Excel spreadsheet files), password systems, single-sign-on systems, or the like.
Existing security techniques typically monitor messages sent by employees of an organization to outside recipients to prevent loss of sensitive information. However, users may utilize a wide range of different ways to transfer information with other users, utilize network resources, store data and information, and control information technology assets. Each of these different ways of transferring information is usually accompanied by an address or username. The existing security techniques are unable to monitor each of these with reference to user-specific policies.
A method and apparatus for identity consolidation for a plurality of electronic identities is described. In one embodiment, the method includes receiving user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication. The method further includes determining a known identity for the sender using the user identification data extracted from the electronic communication and associating the known identity with the unknown identity of the sender of the electronic communication. In one embodiment, an association between the known identity and the unknown identity is maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers.
The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
A system and method for identity consolidation for a plurality of electronic identities is described is described. User identification data, such as an email address, instant message handle, etc., may be extracted from electronic communications. Because communications techniques, such as web email, are typically not connected with electronic directory systems, the extracted user identification data corresponds to an unknown identity of a sender of the electronic communication. In one embodiment, a known identity is determined for the sender using the user identification data extracted from the electronic communication. The known identity may then be associated with the unknown identity of the sender of the electronic communication. Furthermore, an association between the known identity and the unknown identity is maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers.
In the following description, numerous details are set forth. It will be apparent, however, to one of ordinary skill in the art having the benefit of this disclosure, that the present invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
Some portions of the detailed description that follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining”, “displaying” or the like, refer to the actions and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
The system 100 includes an identity management console 108, a consolidated user identities database 110, a data monitoring system (DMS) 104, a policy management system (PMS) 116 and a plurality of user endpoint devices (e.g., user endpoint device 112A, 112B, and 114). They may be coupled to a computer network that communicates any of the standard protocols for the exchange of information. They may run on one Local Area Network (LAN) and may be incorporated into the same physical or logical system, or different physical or logical systems.
Alternatively, the identity management console 108, consolidated user identities database 110, DMS 104, PMS 116 and user endpoint devices (e.g., user endpoint device 112A, 112B, and 114) may reside on different LANs that may be coupled together via the Internet but separated by firewalls, routers, and/or other network devices. In yet another configuration, the identity management console 108 and PMS 104 may reside on a server, or different servers, coupled to other devices via a public network (e.g., the Internet) or a private network (e.g., LAN). It should be noted that various other network configurations can be used including, for example, hosted configurations, distributed configurations, centralized configurations, etc.
The user endpoint devices (e.g., user endpoint device 112A, 112B, and 114) are responsible for sending and receiving messages. Messages may represent a transmitted document (e.g., an email message, a web mail message, an instant message, a short message service (SMS) message, a multimedia message service (MMS) message, etc.) or data stored in databases, caches, etc. In one embodiment, user endpoint devices 112A, 112B, and 114 are client devices, such as, for example, personal computers, laptop computers, cellular telephones, personal digital assistants (PDAs), etc.
In one embodiment, some user endpoint devices, such as user endpoint device 112B are devices known by data monitoring system 104 or identity management console 108. In one embodiment, a device is a “known” device when it is part of an electronic directory system, such as a Microsoft Active Directory system or Lightweight Data Access Protocol (LDAP) system. These directory systems hold corporate email addresses, system login information (e.g., username and password), as well as related information about individuals in the corporation such as a business unit each individual belongs to, employee identification number, etc. Thus, when a user logs into such a machine with an assigned username and password (e.g., an electronic identity), messages sent to and from user endpoint device 112B may be presumed to have been generated by the logged-in user.
In one embodiment, some user endpoint devices, such as user endpoint device 112A are devices that are not “known” by data monitoring system 104 or identity management console 108. Although user endpoint device 112A is connected to a network and is enabled to send and receive messages that can be intercepted by data monitoring system 104, user endpoint device 112A is not a device that is part of an electronic directory system. For example, such a device may be a user's personal laptop that is connected to a network, a PDA connected to the corporate network, etc. Thus, these devices may have access to sensitive information, and be able to send and receive such information, while little is known about these devices.
The PMS 116 is responsible for receiving parameters pertaining to data loss prevention (DLP) policies, such as pre-configured template policies or customized policies, and creating policies based on these parameters. In one embodiment, the PMS 116 receives the policy parameters via a policy definition graphical user interface (not shown). In another embodiment, the PMS 116 receives the policy parameters from an Application Programming Interface (API) or via a configuration file formatted in text or a defined data format (e.g., extensible markup language (XML) or binary format).
The PMS 116 may create policies based on regulations concerning handling of sensitive information maintained by an organization, or based on corporate data governance rules. The regulations may include, for example, the Health Insurance Portability and Accountability Act (HIPAA) ensuring the confidentiality of electronic protected health information, California Senate Bill 1 (SB1) or Senate Bill 1386 (SB1386) controlling customer information leaving the company and affiliates, the Gramm-Leach-Bliley Financial Services Modernization Act controlling customer information leaving a financial institution, the Cardholder Information Security Program (CISP) controlling handling of customer credit card information maintained by an organization, or the like. In one embodiment, the PMS 116 may use policy templates or customized policies pre-configured based on input provided by individuals familiar with the relevant regulations or corporate data governance rules.
A policy may include a set of rules that specify which information should be present in a message to trigger a violation. For example, a message may represent a transmitted document (e.g., an email message, a web mail message, etc.) or data stored in databases, caches, etc. The set of rules may provide specific conditions for triggering a violation (e.g., a sender or recipient of a message, inclusion in a message of a keyword(s) or regular expression pattern, etc.). The rules in the policy may be combined using logical connectives of first-order logic (e.g., AND, OR, NAND, NOR, NOT, equivalent, nonequivalent, or the like).
In one embodiment, a policy specifies source data that should be protected from unauthorized transmission, access or any other use. The source data may be stored in a tabular format (e.g., data in a relational database, data maintained by client/server applications built on top of relational databases, data in document and file systems that store table formatted data (e.g., CSV files or Excel spreadsheet files), etc.) or it may be stored in a non-tabular format but convertible to a tabular format (e.g., data stored as comma separated values in a flat file, a password database or a single-sign-on system, relational data in an object-oriented database, etc.). The policy may also specify which portions of the source data 102 should be included in a message to trigger a policy violation.
In one embodiment, the PMS 116 creates an index of the source data. In one embodiment, the index is in the form of an abstract data structure that includes signatures of data elements of the source data and placement information of each data element within the source data. The signature may be an encrypted or hashed copy of the data element or some other representation of the data element that would not allow a malicious user to recover the actual content of the data element. The placement information may include the number of a row storing the data element in the source data and/or the number of a column storing the data element in the source data. Optionally, the placement information may also include the data type of the column. The signatures and placement information may be stored in a tuple-storage structure derived from the source data. A tuple-storage structure provides a mechanism for storing multiple tuples associated with the elements of the source data. Examples of tuple-storage structures include a hash table, a vector, an array, a tree or a list. Each type of the tuple-storage structure is associated with a method for retrieving a set of tuples for any given content element (the set of tuples may be empty if no match is found in the tuple-storage structure). The abstract data structure may be created periodically and sent to the DMS 104, along with the policy that is to be implemented.
The DMS 104 is responsible for monitoring information content (e.g., sent email messages, instant messages, text messages, and/or other documents according to a configuration of the DMS 104) to detect policy violation incidents. In one embodiment, the DMS detects policy violation incidents using the policies supplied by the PMS 116 and the source data index created by the PMS 116. Once the DMS 104 has detected a policy violation, the DMS 108 reports the policy violation to an appropriate entity (e.g., a manager, database administrator, a reporting system, etc.) or performs some other action.
In one embodiment, user endpoint device 112B hosts identification (ID) agent 106A that is responsible for monitoring messages and extracting user identification data from the messages. For example, when user endpoint device 112B sends an email message from a corporate email address, ID agent 106A extracts a username, email address, etc. associated with the message. Furthermore, when non-corporate forms of communication are used (such as instant messaging, a web email, etc.), ID agent is responsible for extracting identification information, such as an IM handle, web email address, etc. associated with the message. In one embodiment, the extracted information is associated with an individual responsible for sending the message. Furthermore, because user endpoint device 112B is a “known” device (e.g., a device that is logged into an electronic directory system), both public identification information (e.g., information that is part of the electronic directory system) and private identification information (e.g., an IM handle, web email address, etc.) can be extracted from messages sent to and from user endpoint device 112B. The extracted identification information is then transmitted to Identity Management Console 108 to consolidate user identity data, as discussed in greater detail below.
In one embodiment, the DMS 104 hosts ID agent 106B that is also responsible for monitoring messages and extracting user identification data from the messages sent by any of user endpoint device 112A, 112B, or 114. However, unlike ID agent 106A, ID agent 106B cannot associate private identification information (e.g., an IM handle, web email address, etc.) extracted from the messages with public identification information (e.g., information that is part of the electronic directory system) of the same users. For example, ID agent 106B may extract identification information from electronic messages sent by user endpoint device 112A which may be a user's private laptop computer, not logged into an electronic directory system with a corporate assigned username and password. Rather user endpoint device 112A may have network access from which it sends and receives messages. ID agent 106B extracts identification information from messages transmitted by user endpoint device 112A and sends the extracted identification information to Identity Management Console 108 to consolidate user identity data, as discussed in greater detail below.
Identity management console 108 is responsible for consolidating user identification data in order to create a global identity for users of an electronic directory system. The consolidated user identity data is stored in consolidated user identities database (DB) 110. A consolidated, or global, user identity may be considered as composed of two types of user identity data: known user identity data and correlated identity data. For example, when a user logs into an electronic directory system with a given name and password, an identity known to the electronic directory system is used. However, when a user then sends email messages from his or her private email account (e.g., a YAHOO™, GOOGLE™, etc. email account), which is not affiliated with the electronic directory system, the sender's identity is unknown for policy enforcement purposes, data loss prevention, tracking, etc.
In one embodiment, identity management console 108 correlates a user's known identity (e.g., an assigned login and password, user endpoint device identification, etc.) with identification data extracted from various types of electronic communications. Once a known identity and unknown identification data are correlated, both identities can be consolidated into a data record representing a user's global identity. For example, when John Doe logs into his work computer, sends an instant message with the IM handle JD, and sends an email from JD@YAHOO, the IM handle and private email address are correlated with John Doe's known identity. Thus, DMS 104 and PMS 116 may enforce policies, with respect to messages transmitted via John Doe's personal accounts (e.g., JD@YAHOO and the IM handle). The identification data, and messaging types discussed above are merely exemplary, as any type of messaging system that uses a user's identity may be correlated with a user.
Therefore, identity information about multiple personal user communications accounts, such as webmail addresses (e.g., YAHOO! MAIL™, GMAIL™, HOTMAIL™, etc.), instant messaging address user names (e.g., YAHOO INSTANT MESSANGER™, AOL INSTANT MESSANGER™, MSN MESSENGER™, etc.), etc. may be linked to known identities, such as a corporate identity. Because a large portion of inadvertent and malicious data loss events often involve sending information to and from personal communications accounts, collecting and correlating different types and parameters for user's personal identities is highly beneficial. For example, personal communications accounts could be blocked altogether, but many organizations are not willing to take this step because of potential negative reactions from employees. By using correlated identities, as described herein, organizations are able to enforce security, data loss, and usage policies, with minimal impact to employees.
The communications monitoring engine 202 monitors the transmission of electronic communications (e.g., email messages, web email messages, instant messages, text messages, etc.). In one embodiment, communications monitoring engine 202 monitors outgoing messages. In another embodiment, communications monitoring engine 202 monitors incoming messages or both outgoing and incoming messages. Communications monitoring engine 202 notifies identification data extraction engine 204 when communications monitoring engine 202 detects an electronic communication. In one embodiment, the electronic communication may be any of a corporate email, web email, instant message, social networking message, SMS message, MMS message, etc.
The identification data extraction engine 204 is responsible for extracting identification data from an electronic communication in response to notification from communications monitoring engine 202. In one embodiment, identification data extraction engine 204 parses the electronic communication to locate and extract the identification data. For example, identification data extraction engine 204 may parse an instant message to determine an IM handle responsible for sending a message. In one embodiment, the identification data extraction engine 204 also extracts additional identity data corresponding to an electronic communication. For example, when user endpoint device 112B sends a web email message, identification data extraction engine 204 extracts information relating to the user endpoint device 112B (e.g., a user's login, password, internet protocol address, machine name, etc.) from which the message was sent.
Identification data extraction engine 204 forwards the extracted identification information to ID reporting engine 206.
ID reporting engine 206 is responsible for sending reports, containing the extracted identification data, to the identity management console. In one embodiment, the ID reporting engine 206 transmits reports each time ID information is extracted from an electronic communication. In another embodiment, ID reporting engine 206 stores ID data and periodically transmits batches of extracted identification information.
Identification data receipt engine 302 is responsible for receiving reports of identification data from ID agents, such as ID agents 106A, 106B, and 200. Identification data receipt engine 302 forwards received reports to identification correlation engine 304.
Identification correlation engine 304 is responsible for correlating known identities with unknown identities and consolidating the results in consolidated user identities DB 308. In one embodiment, where an ID report consists of both known identification data (e.g., an electronic directory system assigned user ID, IP address, machine name, etc.) and unknown identification data (e.g., an IM handle, web email address, social/professional networking user name, etc.), identification correlation engine 304 associates known identification data with the unknown identification data. For example, if an ID report specifies that an electronic communication in the form of a web email sent by ANONYMOUS@YAHOO was submitted from a machine j_doe (e.g., a username known to, and assigned by, a corporate directory system) is currently logged into, j_doe can thereafter be associated with the personal email address ANONYMOUS@YAHOO. Thus, applications such as policy enforcement systems, data loss prevention systems, network resource tracking, etc. may monitor and/or handle electronic communication sent by ANONYMOUS@YAHOO as having been sent by j_doe. Identification correlation engine 304 stores the correlation in consolidated user identities DB 308 thereby creating a consolidated identity for the user j_doe.
In one embodiment, where an ID report consists of unknown identification data (e.g., an IM handle, web email address, social/professional networking user name, etc.), identification correlation engine 304 queries consolidated user identities DB 308. When a record exists with the unknown identification data identification, correlation engine 304 updates the database with the new occurrence. In one embodiment, when there is no record with the unknown identification data in the database 308, correlation engine 304 stores a record with unknown identification data separately (e.g., in a separate “suspension” table). Subsequently, when correlation engine 304 adds new identification data to the consolidation user identities DB 308, correlation engine 304 checks the suspension table for a record with matching identification data. If such a record is found, correlation engine 304 adds any other identifiers from the same record in the suspension table to the consolidation user identities DB 308, and removes this record from the suspension table.
In one embodiment, an identity will not be available in consolidated user identities DB 308 for identification correlation engine 304 to correlate with known identification data. For example, a data thief could log onto a shared system that makes use of generic names/passwords (e.g., a shared research laboratory network, computer commons, unsecured Wi-Fi access point, etc.). Furthermore, a confidence level for a consolidated user identity may be relatively low. In these situations, a consolidated user identity may be established via physical and/or forensic evidence. For instance, if correlated internet identities cluster around list of known systems at known times, examining access logs from other systems or interviewing individuals may lead to establishment of a corporate identity. In one embodiment, identity management console 300 receives (e.g., via identity management console 108 of
In one embodiment, identification correlation engine 304 further correlates groupings of unknown user identities, which either cannot or have not yet been correlated with a known corporate identity. For example, identification correlation engine 304 may correlate three recurring unknown identities in consolidated user identities DB 308 that are responsible for data leakage. By correlating unknown identities, identification correlation engine 304 responses to reporting engine 306 may be generated without (yet) having a known corporate identity associated with the consolidated unknown identities. In one embodiment, unknown identities are correlated by identification correlation engine 304 to enable policy enforcement against the unknown identity(s).
Reporting engine 306 is responsible for responding to and sending reports concerning user identities. In one embodiment, when an ID agent (e.g., ID agent 106B of
Referring to
Referring to
Processing logic extracts identification (ID) data from the user endpoint device (processing block 504). In one embodiment, processing logic extracts the user name associated with a user currently logged into the endpoint device, the endpoint device's IP address (or other networking address), telephone number, etc. Processing logic also extracts ID data from the communications transmission (processing block 506). As discussed above, processing logic parses the electronic communication to determine identification data (e.g., an email address, IM handle, etc.) associated with the electronic communication.
Processing logic reports the ID data extracted from the electronic communication and the user endpoint device (processing block 508). In one embodiment, the report is directed to an identity management console, such as identity management console 108.
Referring to
Processing logic extracts identification data from the electronic communications transmission (processing block 554). In one embodiment, the electronic communication is parsed to determine identification data, such as the sender's name of an email, IM handle of an instant message, login name for a social/professional networking message, etc.
Processing logic reports the identification data extracted from the electronic communications transmission (processing block 556). In one embodiment, the report is directed to an identity management console, such as identity management console 108.
Referring to
Processing logic determines a user identity associated with the ID extracted from the user endpoint device (processing block 604), and determines whether a correlation exists between the user identity and the ID extracted from the electronic communication (processing block 606). If a correlation does exist, processing logic updates the correlation in an identity database with the new occurrence. If no correlation exists, processing logic creates a correlation between the user identity and the extracted identification data (processing block 608). In one embodiment, processing logic updates records in a consolidated user identities database, such as consolidated user identities database 110. For example, processing logic may receive a user's assigned login and an IM handle extracted from an instant message. Processing logic then either creates a correlation between the user's consolidated identity and the IM handle, or updates an existing correlation.
In one embodiment, processing logic updates a strength of the correlation in the identity database (processing logic 612). The strength may indicate such factors as how often a correlation between a user identity and the extracted identification data occurs, how many times the correlation has been detected, whether the correlation conditions are similar to other occurrences (e.g., a user name correlation is detected but from different IP addresses), etc. By updating a measure of strength, additional guarantees of trustworthiness are provided by the consolidated user identity. That is, a correlation that has been detected 100 times may be trusted more readily than a correlation that has only been detected twice. Thus, systems, such as policy enforcement systems, data loss prevention system, usage tracking systems, etc. may factor the strength of the correlation into their own actions.
Processing logic classifies the electronic communication ID as known (e.g., a correlation between a known identity and the communication's ID exists) (processing block 614), and reports the determined user identity, classification, and strength of correlation (processing block 616). In one embodiment, the report is transmitted to DMS responsible for monitoring electronic messages, a data loss prevention system responsible for preventing inadvertent loss of sensitive information, a risk management system, an IT usage tracking system, etc.
Referring to
Processing logic determines whether a correlation exists for the ID extracted from the electronic communication (processing block 704). If a correlation does exist (e.g., the extracted ID is associated with an existing user identity), processing logic updates the correlation and strength in an identity database with the new occurrence (processing blocks 708 and 710). Processing logic further classifies the identity for the electronic communication as known (processing block 712).
If no correlation exists, processing logic classifies the identity associated with the electronic communication as unknown (processing block 706). That is, since processing logic did not receive known identification data, and no correlations currently exist for the extracted ID, the extracted ID remains unknown. In one embodiment, as discussed above, unknown identities, as well as grouping of unknown identities and/or recurring unknown identities, are also correlated in identity database with the new occurrence and a strength of the correlation updated (processing blocks 716 and 718).
Processing logic reports the determined identity (if known), classification, and strength of correlation (processing block 714). In one embodiment, the report is transmitted to a DMS responsible for monitoring electronic messages, a data loss prevention system responsible for preventing inadvertent loss of sensitive information, a risk management system, an IT usage tracking system, etc.
Referring to
Processing logic determines whether the information content violates a policy (processing block 804). In one embodiment, the policy also specifies one or more rules regarding the identity of a party associated with the information content (e.g., whether a particular sender is allowed to send, or a particular recipient is allowed to receive, information content that includes sensitive data protected by the policy).
Processing logic requests an identity report for the electronic communication from an identity management console (processing block 806) and receives the identity report (processing block 808). In one embodiment, the report includes a user identity corresponding to the identification data extracted from the electronic communication and correlated with the user identity. In one embodiment, the identity report further includes a classification (e.g., whether the identity is known or unknown) and strength of the identity correlation.
Processing logic determines whether the parties associated with the information content from the electronic communication are authorized to handle (e.g., send, receive, copy, etc.) this information content in accordance with the relevant policy (processing block 810). Processing logic notifies a user, or other appropriate entity, when there is a policy violation (processing block 812).
Processing logic further captures data surrounding the policy violation (processing block 814). In one embodiment, processing logic captures a time when the policy violation occurred, the correlated identity for a user responsible for the policy violation, etc.
Accordingly, method 800 allows sensitive information to be protected from unauthorized use (e.g., transmission, access, etc.). Furthermore, because unknown identification data for electronic communications is extracted and correlated with a known identity, the policy may be enforced irrespective of how the electronic communication is transmitted, or from which computer an electronic communication was sent.
The exemplary computer system 900 includes a processing device (processor) 902, a main memory 904 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 906 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 918, which communicate with each other via a bus 930.
Processor 902 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, the processor 902 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets. The processor 902 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processor 902 is configured to execute the processing logic 926 for performing the operations and steps discussed herein.
The computer system 900 may further include a network interface device 908. The computer system 900 also may include a video display unit 910 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 912 (e.g., a keyboard), a cursor control device 914 (e.g., a mouse), and a signal generation device 916 (e.g., a speaker).
The data storage device 918 may include a machine-accessible storage medium 930 on which is stored one or more sets of instructions (e.g., software 922) embodying any one or more of the methodologies or functions described herein. The software 922 may also reside, completely or at least partially, within the main memory 904 and/or within the processor 902 during execution thereof by the computer system 900, the main memory 904 and the processor 902 also constituting machine-accessible storage media. The software 922 may further be transmitted or received over a network 920 via the network interface device 908.
While the machine-accessible storage medium 930 is shown in an exemplary embodiment to be a single medium, the term “machine-accessible storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-accessible storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. The term “machine-accessible storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Number | Name | Date | Kind |
---|---|---|---|
4858152 | Estes | Aug 1989 | A |
5212821 | Gorin et al. | May 1993 | A |
5379391 | Belsan et al. | Jan 1995 | A |
5384892 | Strong | Jan 1995 | A |
5577249 | Califano | Nov 1996 | A |
5615277 | Hoffman | Mar 1997 | A |
5739391 | Ruppel et al. | Apr 1998 | A |
5796948 | Cohen | Aug 1998 | A |
5832212 | Cragun et al. | Nov 1998 | A |
5835722 | Bradshaw et al. | Nov 1998 | A |
5883588 | Okamura | Mar 1999 | A |
5884033 | Duvall et al. | Mar 1999 | A |
5889958 | Willens | Mar 1999 | A |
5892905 | Brandt et al. | Apr 1999 | A |
5958015 | Dascalu | Sep 1999 | A |
5960080 | Fahlman et al. | Sep 1999 | A |
5996011 | Humes | Nov 1999 | A |
6004276 | Wright et al. | Dec 1999 | A |
6029144 | Barrett et al. | Feb 2000 | A |
6047283 | Braun | Apr 2000 | A |
6055538 | Kessenich et al. | Apr 2000 | A |
6065056 | Bradshaw et al. | May 2000 | A |
6073142 | Geiger et al. | Jun 2000 | A |
6094689 | Embry et al. | Jul 2000 | A |
6125371 | Bohannon et al. | Sep 2000 | A |
6138168 | Kelly et al. | Oct 2000 | A |
6233618 | Shannon | May 2001 | B1 |
6256631 | Malcolm | Jul 2001 | B1 |
6266775 | Kamba | Jul 2001 | B1 |
6289375 | Knight et al. | Sep 2001 | B1 |
6289462 | McNabb et al. | Sep 2001 | B1 |
6314190 | Zimmermann | Nov 2001 | B1 |
6321224 | Beall et al. | Nov 2001 | B1 |
6347087 | Ganesh et al. | Feb 2002 | B1 |
6347374 | Drake et al. | Feb 2002 | B1 |
6347376 | Attwood et al. | Feb 2002 | B1 |
6360215 | Judd et al. | Mar 2002 | B1 |
6374241 | Lamburt et al. | Apr 2002 | B1 |
6396513 | Helfman et al. | May 2002 | B1 |
6442607 | Korn et al. | Aug 2002 | B1 |
6442686 | McArdle et al. | Aug 2002 | B1 |
6453338 | Shiono | Sep 2002 | B1 |
6507846 | Consens | Jan 2003 | B1 |
6539430 | Humes | Mar 2003 | B1 |
6604141 | Ventura | Aug 2003 | B1 |
6618725 | Fukuda et al. | Sep 2003 | B1 |
6636838 | Perlman et al. | Oct 2003 | B1 |
6639615 | Majumdar et al. | Oct 2003 | B1 |
6701314 | Conover et al. | Mar 2004 | B1 |
6711579 | Balakrishnan | Mar 2004 | B2 |
6714936 | Nevin, III | Mar 2004 | B1 |
6732087 | Hughes et al. | May 2004 | B1 |
6738908 | Bonn et al. | May 2004 | B1 |
6754832 | Godwin et al. | Jun 2004 | B1 |
6768986 | Cras et al. | Jul 2004 | B2 |
6769032 | Katiyar et al. | Jul 2004 | B1 |
6778979 | Grefenstette et al. | Aug 2004 | B2 |
6779120 | Valente et al. | Aug 2004 | B1 |
6829613 | Liddy | Dec 2004 | B1 |
6829635 | Townshend | Dec 2004 | B1 |
6834286 | Srinivasan | Dec 2004 | B2 |
6871284 | Cooper et al. | Mar 2005 | B2 |
6941466 | Mastrianni et al. | Sep 2005 | B2 |
6947985 | Hegli et al. | Sep 2005 | B2 |
6965886 | Govrin et al. | Nov 2005 | B2 |
6983186 | Navani et al. | Jan 2006 | B2 |
6996788 | Akiba et al. | Feb 2006 | B2 |
7000154 | LeDuc | Feb 2006 | B1 |
7003562 | Mayer | Feb 2006 | B2 |
7010572 | Benjamin et al. | Mar 2006 | B1 |
7114185 | Moore et al. | Sep 2006 | B2 |
7130885 | Chandra et al. | Oct 2006 | B2 |
7146402 | Kucherawy | Dec 2006 | B2 |
7162738 | Dickinson, III et al. | Jan 2007 | B2 |
7191252 | Redlich et al. | Mar 2007 | B2 |
7203749 | Hiraga et al. | Apr 2007 | B2 |
7222158 | Wexelblat | May 2007 | B2 |
7237008 | Tarbotton et al. | Jun 2007 | B1 |
7237267 | Rayes et al. | Jun 2007 | B2 |
7249175 | Donaldson | Jul 2007 | B1 |
7320004 | DeLuca et al. | Jan 2008 | B1 |
7437304 | Barnard et al. | Oct 2008 | B2 |
7447718 | Orumchian et al. | Nov 2008 | B2 |
7464402 | Briscoe et al. | Dec 2008 | B2 |
7472114 | Rowney et al. | Dec 2008 | B1 |
7516492 | Nisbet | Apr 2009 | B1 |
7523498 | Fellenstein et al. | Apr 2009 | B2 |
7685626 | Malcolm | Mar 2010 | B2 |
7716217 | Marston et al. | May 2010 | B2 |
7716240 | Lim | May 2010 | B2 |
7725732 | Ballard | May 2010 | B1 |
7756843 | Palmer | Jul 2010 | B1 |
7774363 | Lim | Aug 2010 | B2 |
7788235 | Yeo | Aug 2010 | B1 |
7877409 | Lim | Jan 2011 | B2 |
7882560 | Kraemer | Feb 2011 | B2 |
7886359 | Jones et al. | Feb 2011 | B2 |
7950058 | Rockwood | May 2011 | B1 |
7996373 | Zoppas | Aug 2011 | B1 |
7996374 | Jones et al. | Aug 2011 | B1 |
7996385 | Rowney | Aug 2011 | B2 |
8011003 | Rowney | Aug 2011 | B2 |
8024431 | Hoffman | Sep 2011 | B2 |
8041719 | Rowney | Oct 2011 | B2 |
8051187 | Noy et al. | Nov 2011 | B2 |
8065739 | Bruening | Nov 2011 | B1 |
8131745 | Hoffman et al. | Mar 2012 | B1 |
8141148 | Thomas et al. | Mar 2012 | B2 |
8225371 | Jones et al. | Jul 2012 | B2 |
8255370 | Zoppas | Aug 2012 | B1 |
8312553 | Rowney | Nov 2012 | B2 |
8561179 | Durfee et al. | Oct 2013 | B2 |
8561181 | Hernacki et al. | Oct 2013 | B1 |
8566305 | Rowney | Oct 2013 | B2 |
8595849 | Jones | Nov 2013 | B2 |
20010027451 | Taguchi et al. | Oct 2001 | A1 |
20010037324 | Agrawal et al. | Nov 2001 | A1 |
20020010679 | Felsher | Jan 2002 | A1 |
20020069098 | Schmidt | Jun 2002 | A1 |
20020073313 | Brown et al. | Jun 2002 | A1 |
20020093676 | Parry | Jul 2002 | A1 |
20020120586 | Masaki et al. | Aug 2002 | A1 |
20020129140 | Peled et al. | Sep 2002 | A1 |
20020138579 | Goldberg | Sep 2002 | A1 |
20020178228 | Goldberg | Nov 2002 | A1 |
20020198766 | Magrino et al. | Dec 2002 | A1 |
20020199095 | Bandini et al. | Dec 2002 | A1 |
20030051026 | Carter et al. | Mar 2003 | A1 |
20030093518 | Hiraga | May 2003 | A1 |
20030167402 | Stolfo et al. | Sep 2003 | A1 |
20040015719 | Lee et al. | Jan 2004 | A1 |
20040039991 | Hopkins et al. | Feb 2004 | A1 |
20040064731 | Nguyen et al. | Apr 2004 | A1 |
20040088425 | Rubinstein et al. | May 2004 | A1 |
20040185885 | Kock | Sep 2004 | A1 |
20040187024 | Briscoe et al. | Sep 2004 | A1 |
20040193910 | Moles | Sep 2004 | A1 |
20040225645 | Rowney et al. | Nov 2004 | A1 |
20050027723 | Jones et al. | Feb 2005 | A1 |
20050039033 | Meyers et al. | Feb 2005 | A1 |
20050060537 | Stamos et al. | Mar 2005 | A1 |
20050081121 | Wedel et al. | Apr 2005 | A1 |
20050086252 | Jones et al. | Apr 2005 | A1 |
20050096048 | Clare et al. | May 2005 | A1 |
20050132206 | Palliyil et al. | Jun 2005 | A1 |
20050138110 | Redlich et al. | Jun 2005 | A1 |
20050182765 | Liddy | Aug 2005 | A1 |
20050193004 | Cafeo et al. | Sep 2005 | A1 |
20050216771 | Malcolm | Sep 2005 | A1 |
20050257267 | Williams et al. | Nov 2005 | A1 |
20060005035 | Coughlin | Jan 2006 | A1 |
20060005247 | Zhang et al. | Jan 2006 | A1 |
20060143459 | Villaron et al. | Jun 2006 | A1 |
20060184549 | Rowney et al. | Aug 2006 | A1 |
20060224426 | Goossens | Oct 2006 | A1 |
20060224589 | Rowney et al. | Oct 2006 | A1 |
20060253597 | Mujica | Nov 2006 | A1 |
20070011158 | Parikh | Jan 2007 | A1 |
20070130255 | Wolovitz et al. | Jun 2007 | A1 |
20070136788 | Monahan et al. | Jun 2007 | A1 |
20070156897 | Lim | Jul 2007 | A1 |
20070169182 | Wolfond et al. | Jul 2007 | A1 |
20070179945 | Marston et al. | Aug 2007 | A1 |
20070261099 | Broussard | Nov 2007 | A1 |
20070300306 | Hussain | Dec 2007 | A1 |
20080066150 | Lim et al. | Mar 2008 | A1 |
20080109870 | Sherlock et al. | May 2008 | A1 |
20080148357 | Chen et al. | Jun 2008 | A1 |
20080168135 | Redlich et al. | Jul 2008 | A1 |
20080235760 | Broussard | Sep 2008 | A1 |
20080263626 | Bainter et al. | Oct 2008 | A1 |
20080276319 | Rittermann | Nov 2008 | A1 |
20090013399 | Cottrell et al. | Jan 2009 | A1 |
20090037594 | Sever et al. | Feb 2009 | A1 |
20090048997 | Manickam et al. | Feb 2009 | A1 |
20090150721 | Kochar et al. | Jun 2009 | A1 |
20090164574 | Hoffman | Jun 2009 | A1 |
20100031312 | Dixit | Feb 2010 | A1 |
20100100963 | Mahaffey | Apr 2010 | A1 |
20100169970 | Stolfo et al. | Jul 2010 | A1 |
20100251363 | Todorovic | Sep 2010 | A1 |
20100332481 | Rowney | Dec 2010 | A1 |
Number | Date | Country |
---|---|---|
2 499 508 | Apr 2004 | CA |
2 597 083 | Aug 2006 | CA |
2 343 030 | Apr 2000 | GB |
2466367 | Jun 2010 | GB |
2002-189643 | May 2002 | JP |
2005-539334 | Dec 2005 | JP |
2008-171101 | Jul 2008 | JP |
2008-537195 | Sep 2008 | JP |
2012-150816 | Dec 2012 | JP |
2004027653 | Apr 2004 | WO |
2006088952 | Aug 2006 | WO |
Entry |
---|
Office Action for U.S. Appl. No. 12/490,258 mailed Mar. 31, 2011. |
Office Action for U.S. Appl. No. 12/490,258 mailed Dec. 6, 2011. |
USPTO Notice of Allowance for U.S. Appl. No. 12/490,258 mailed Jun. 26, 2011. |
Notice of Allowance Mailed Jan. 29, 2014. |
Office Action for U.S. Appl. No. 10/607,718 mailed Feb. 10, 2006. |
Office Action for U.S. Appl. No. 10/607,718 mailed Jun. 28, 2006. |
Office Action for U.S. Appl. No. 10/607,718 mailed Nov. 15, 2006. |
Office Action for U.S. Appl. No. 10/607,718 mailed Jul. 10, 2007. |
Office Action for U.S. Appl. No. 10/607,718 mailed Jan. 8, 2008. |
Office Action for U.S. Appl. No. 10/607,718 mailed Jul. 3, 2008. |
Office Action for U.S. Appl. No. 10/607,718 mailed Nov. 14, 2008. |
Office Action for U.S. Appl. No. 10/607,718 mailed May 1, 2009. |
Office Action for U.S. Appl. No. 10/607,718 mailed Nov. 9, 2009. |
Office Action for U.S. Appl. No. 10/607,718 mailed Apr. 12, 2010. |
Office Action for U.S. Appl. No. 10/607,718 mailed Aug. 17, 2010. |
Office Action for U.S. Appl. No. 10/607,718 mailed Feb. 3, 2011. |
Notice of Allowance for U.S. Appl. No. 10/607,718 mailed Jun. 17, 2011. |
USPTO Office Action for U.S. Appl. No. 13/246,774 mailed Dec. 7, 2012. |
USPTO Office Action for U.S. Appl. No. 13/246,774 mailed Sep. 11, 2013. |
USPTO Notice of Allowance for U.S. Appl. No. 13/246,774 mailed Jan. 29, 2014. |
Office Action for U.S. Appl. No. 10/833,538 mailed Oct. 31, 2006. |
Office Action for U.S. Appl. No. 10/833,538 mailed Jul. 23, 2007. |
Office Action for U.S. Appl. No. 10/833,538 mailed Feb. 14, 2008. |
Notice of Allowance for U.S. Appl. No. 10/833,538 mailed Aug. 6, 2008. |
Notice of Allowance for U.S. Appl. No. 12/266,545 mailed Mar. 25, 2011. |
Office Action for U.S. Appl. No. 12/632,620 mailed Dec. 7, 2011. |
Office Action for U.S. Appl. No. 12/632,620 mailed Apr. 24, 2012. |
USPTO Notice of Allowance for U.S. Appl. No. 12/632,620 mailed Jun. 10, 2013. |
Office Action for U.S. Appl. No. 10/892,982 mailed Jan. 23, 2007. |
Office Action for U.S. Appl. No. 10/892,982 mailed Sep. 17, 2007. |
Office Action for U.S. Appl. No. 10/892,982 mailed Apr. 8, 2008. |
Office Action for U.S. Appl. No. 10/892,982 mailed Oct. 27, 2008. |
Office Action for U.S. Appl. No. 10/892,982 mailed Feb. 12, 2009. |
Office Action for U.S. Appl. No. 10/892,982 mailed Jul. 20, 2009. |
Office Action for U.S. Appl. No. 10/892,982 mailed Jan. 6, 2010. |
USPTO Notice of Allowance for U.S. Appl. No. 10/892,982 mailed Dec. 6, 2010. |
Office Action for U.S. Appl. No. 12/982,750 mailed Apr. 11, 2011. |
Office Action for U.S. Appl. No. 12/982,750 mailed Sep. 7, 2011. |
Office Action for U.S. Appl. No. 12/982,750 mailed Dec. 30, 2011. |
USPTO Office Action for U.S. Appl. No. 12/982,750 mailed Dec. 30, 2011. |
USPTO Office Action for U.S. Appl. No. 12/982,750 mailed Jul. 11, 2012. |
USPTO Office Action for U.S. Appl. No. 12/982,750 mailed Apr. 2, 2012. |
USPTO Notice of Allowance for U.S. Appl. No. 12/982,750 mailed Jul. 22, 2013. |
Office Action for U.S. Appl. No. 10/892,615 mailed Apr. 27, 2007. |
Office Action for U.S. Appl. No. 10/892,615 mailed Dec. 12, 2007. |
Office Action for U.S. Appl. No. 10/892,615 mailed Apr. 21, 2008. |
Office Action for U.S. Appl. No. 10/892,615 mailed Dec. 5, 2008. |
Office Action for U.S. Appl. No. 10/892,615 mailed May 12, 2009. |
Office Action for U.S. Appl. No. 10/892,615 mailed Mar. 24, 2010. |
Advisory Action for U.S. Appl. No. 10/892,615 mailed Jul. 2, 2010. |
Office Action for U.S. Appl. No. 10/892,615 mailed Nov. 16, 2011. |
Notice of Allowance for U.S. Appl. No. 10/892,615 mailed Mar. 14, 2012. |
Office Action for U.S. Appl. No. 13/532,660 mailed Apr. 11, 2013. |
Office Action for U.S. Appl. No. 13/532,660 mailed Aug. 14, 2013. |
Office Action for U.S. Appl. No. 13/352,660 mailed Feb. 3, 2014. |
Notice of Allowance for U.S. Appl. No. 13/352,660 mailed Apr. 10, 2014. |
USPTO; Office Action for U.S. Appl. No. 13/532,660, mailed Aug. 14, 2013. |
Office Action for U.S. Appl. No. 11/057,988 mailed Aug. 18, 2008. |
Office Action for U.S. Appl. No. 11/057,988 mailed Jan. 28, 2009. |
Office Action for U.S. Appl. No. 11/057,988 mailed Jul. 10, 2009. |
Office Action for U.S. Appl. No. 11/057,988 mailed Mar. 18, 2010. |
Notice of Allowance for U.S. Appl. No. 11/057,988 mailed Mar. 18, 2010. |
Office Action for U.S. Appl. No. 11/058,551 mailed Sep. 9, 2008. |
Office Action for U.S. Appl. No. 11/058,551 mailed Mar. 20, 2009. |
Office Action for U.S. Appl. No. 11/058,551 mailed Sep. 11, 2009. |
Office Action for U.S. Appl. No. 11/058,551 mailed Mar. 8, 2010. |
Office Action for U.S. Appl. No. 11/058,551 mailed Aug. 2, 2010. |
Office Action for U.S. Appl. No. 11/058,551 mailed Apr. 11, 2011. |
Office Action for U.S. Appl. No. 12/079,719 mailed Jan. 21, 2011. |
Notice of Allowance for U.S. Appl. No. 12/079,719 mailed Jan. 21, 2011. |
Office Action for U.S. Appl. No. 12/079,630 mailed Aug. 31, 2010. |
Notice of Allowance Action for U.S. Appl. No. 12/079,630 mailed Mar. 24, 2011. |
Office Action for U.S. Appl. No. 13/168,926, mailed Nov. 8, 2011. |
Office Action for U.S. Appl. No. 13/168,926, mailed Jan. 25, 2012. |
Notice of Allowance for U.S. Appl. No. 13/168,926, mailed Apr. 16, 2012. |
Office Action for U.S. Appl. No. 12/079,660 mailed Aug. 19, 2010. |
Office Action for U.S. Appl. No. 12/079,660 mailed Dec. 22, 2010. |
Office Action for U.S. Appl. No. 12/079,660 mailed Mar. 31, 2011. |
USPTO Office Action for U.S. Appl. No. 13/174,718 mailed Mar. 19, 2013. |
USPTO Office Action for U.S. Appl. No. 13/174,718 mailed Jul. 22, 2013. |
USPTO Office Action for U.S. Appl. No. 13/174,718 mailed Dec. 24, 2013. |
Office Action for U.S. Appl. No. 12/409,449 mailed Mar. 12, 2012. |
USPTO Office Action for U.S. Appl. No. 12/409,449 mailed Aug. 14, 2012. |
Office Action for U.S. Appl. No. 12/409,449 mailed Apr. 18, 2014. |
Office Action for U.S. Appl. No. 12/346,606 mailed Jun. 8, 2012. |
Office Action for U.S. Appl. No. 12/346,606 mailed Dec. 14, 2012. |
Office Action for U.S. Appl. No. 12/346,606 mailed May 29, 2014. |
Office Action for U.S. Appl. No. 12/342,038 mailed May 3, 2011. |
Office Action for U.S. Appl. No. 12/342,038 mailed Oct. 26, 2011. |
Office Action for U.S. Appl. No. 12/342,038 mailed May 15, 2012. |
Office Action for U.S. Appl. No. 12/342,038 mailed May 8, 2013. |
USPTO; Notice of Allowance for U.S. Appl. No. 12/342,038, mailed Aug. 20, 2013. |
Office Action for U.S. Appl. No. 12/395,554 mailed Nov. 23, 2011. |
Office Action for U.S. Appl. No. 12/395,554 mailed Jan. 13, 2012. |
Office Action for U.S. Appl. No. 12/395,554 mailed Aug. 8, 2013. |
Office Action for U.S. Appl. No. 12/395,554 mailed Dec. 9, 2013. |
Notice of Allowance for U.S. Appl. No. 12/395,554 mailed Apr. 24, 2014. |
Office Action for U.S. Appl. No. 12/410,432 mailed Jul. 29, 2011. |
Office Action for U.S. Appl. No. 12/410,432 mailed Dec. 16, 2011. |
Alonso, Omar, et al, Oracle Secure Enterprise Search 10g, An Oracle Technical White Paper, Mar. 2006, 21 pages. |
Attenex, Attenex Patterns Suite, http://www.attenex.com/products—services/attenex—patterns—suite.aspx, Downloaded Feb. 20, 2008, 2 pages. |
Autonomy, Autonomy Group product overview, http://www.autonomy.com/content/products/index.en.html, Downloaded Feb. 20, 2008, 2 pages. |
Autonomy, Security, http://www.autonomy.com/content/Technology/Technology—Benefits/security, Feb. 20, 2008, 2 pages. |
Autonomy, Technology overview, http://www.autonomy.com/content/Technmology/index.en.html, Downloaded Feb. 20, 2008, 2 pages. |
Autonomy, Limitations of Other Approaches, http://www.autonomy.com/content/Technology/Limitations—Other—Approaches, Downloaded Feb. 20, 2008, 2 pages. |
Buchta, Stefan, Oracle Secure Enterprise Search Version 10.1.8.2, An Oracle Technical White Paper, Oct. 2007, 30 pages. |
(CISCO) A Report From Ironport Systems , “Data Loss Prevention Best Practices—Managing Sensitive Data in the Enterprise”, 2007, 21 pages. |
Clearwell Systems, The Clearwell E-Discovery Platform®, http://www.clearwellsystems.com/products/e-discovery-platform, Downloaded Feb. 20, 2008 2 pages. |
Clearwell Systems, The Clearwell E-Discovery Platform: Analysis, http://www.clearwellsystems.com/products/e-discovery-analysis.php, Downloaded Feb. 20, 2008, 1 page. |
Clearwell Systems, The Clearwell E-Discovery Platform: Case Management, http://www.clearwellsystems.com/products/e-discovery-case-management, Downloaded Feb. 20, 2008 2 pages. |
Clearwell Systems The Clearwell E-Discovery Platform: Processing, http://www.clearwellsystems.com/products/e-discovery-processing.php, Downloaded Feb. 20, 2008, 2 pages. |
Clearwell Systems The Clearwell E-Discovery Platform: Review, http://www.clearwellsystems.com/products/e-discovery-review.php, Downloaded Feb. 20, 2008 2 pages. |
Clearwell Systems The Clearwell E-Discovery Platform: Search &Cull-Down, http://www.clearwellsystems.com/products/e-discovery-search-cull.php, Downloaded Feb. 20, 2008 1 page. |
Dale, et al., “Programming and Problem Solving with C++,” 2002, Jones and Bartlett Publishers, 3rd Edition, pp. 653-662. |
Deitel, et al., “C++-How to Program,” 2001, Prentice Hall, 3rd Edition, pp. 273-279. |
fast, Fast ESP Revitalizing your search experience with intelligent, user-centric search, 2007, Fast Search & Transfer ASA. , 6 pages. |
Google, Google Search Appliance, http://www.google.com/enterprise/gsa/, Downloaded, Feb. 20, 2008, 2 pages. |
Guidance Software, EnCase® eDiscovery Suite, http://www.guidancesoftware.com/products/ediscovery—index.aspx, Downloaded Feb. 20, 2008, 2 pages. |
Kaufman, et al., “Network Security-Private Communication in a Public World,” 1995, Prentice, Hall PTR, p. 80. |
Koch, et al., “Oracle8—The Complete Reference,” 1997, Osborn McGraw-Hill, pp. 9-7 and 51-62. |
Krishnaprasad, Muralidhar, et al, Oracle Searching Enterprise Applications (Siebel 7.8 and E-Business Suite 11i) with Oracle Secure Enterprise Search 10.1.8, An Oracle White Paper, Jan. 2007, 25 pages. |
Lupu, Emil et al. A Policy Based Role Object Model, EDOC '97 Proceedings, Pub Date 1997. Imperial College, Deparment of Computing, Relevant pp. 36-37. |
Lymberopoulos, Leonidas et al., “An Adaptive Policy Based Management Framework for Differentiated Services Networks,” Third International Workshop on Policies for Distributed Systems, 2002, Relevant pp. 147-158, <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1011302>. |
Manes et al., “A Framework for Redacting Digital Information from Electronic Devices”, 2007, Retrieved from the internet <URL: ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04267542> pp. 1-5 as printed. |
Menezes, et al. “Handbook of Applied Cryptography”, 1997, p. 389. |
Oracle Secure Enterprise Search 10G, Mar. 2006, 8 pages. |
Oracle8TM Tuning, Release 8.0, Dec. 1997, Oracle®. |
GB0921722.5 Search Report dated Mar. 26, 2010, 1 page. |
PCT Search Report PCT/US03/30178 dated Mar. 11, 2004, 5 pages. |
PCT Search Report PCT/US06/5317 dated Jul. 24, 2006, 5 pages. |
Shapiro, William et al., “How to Manage Persistent State in DRM Systems,” Aug. 2001, 12 pages, InterTrust Technologies Corporation, Santa Clara, CA. |
White, Ron, “How Computers Work” Que Coporation, 6th Edition, 2002, pp. 12-15 and 304. |
Web-Harvest Overview, Nov. 2006, Retrieved from the internet <URL:web.archive.org/web/20061130081756/http://web-harvest.sourceforge.net/overview.php> pp. 1-15 as printed. |
Zantaz, Enterprise Archive Solution (EAS) Product family, Datasheet, 4 pages. |
Office Action for U.S. Appl. No. 10/247,002 mailed Mar. 3, 2006. |
Office Action for U.S. Appl. No. 10/247,002 mailed Aug. 21, 2006. |
Office Action for U.S. Appl. No. 10/247,002 mailed Jan. 23, 2007. |
Office Action for U.S. Appl. No. 10/247,002 mailed Sep. 17, 2007. |
Office Action for U.S. Appl. No. 10/247,002 mailed Dec. 12, 2007. |
Office Action for U.S. Appl. No. 10/247,002 mailed Jun. 18, 2008. |
Office Action for U.S. Appl. No. 10/247,002 mailed Nov. 25, 2008. |
Office Action for U.S. Appl. No. 10/247,002 mailed May 21, 2009. |
Office Action for U.S. Appl. No. 10/247,002 mailed Dec. 31, 2009. |
Notice of Allowance Action for U.S. Appl. No. 10/247,002 mailed Oct. 7, 2013. |
Office Action for U.S. Appl. No. 10/431,145 mailed Oct. 23, 2006. |
Office Action for U.S. Appl. No. 10/431,145 mailed Jul. 26, 2007. |
Office Action for U.S. Appl. No. 10/431,145 mailed Feb. 25, 2008. |
Notice of Allowance for U.S. Appl. No. 10/431,145 mailed Aug. 20, 2008. |
Notice of Allowance for U.S. Appl. No. 10/431,145 mailed Jun. 5, 2009. |