Technical Field
The present invention relates generally to information security and more particularly, but not by way of limitation, to systems and methods for reporting transfer events that occur in a peer-to-peer network.
History of Related Art
As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
As a result of advances in communications technology, peer-to-peer (P2P) communication between information handling systems is becoming easier and more prevalent. P2P communication can occur via numerous methods including, for example, Wi-Fi Direct, WiGig, and Bluetooth. This ease and prevalence, however, highlights audit compliance and reporting concerns. P2P communication is a quick way for sensitive data to slip out of a corporate environment without any record of its destination. This problem is exacerbated by the fact that P2P communication often occurs without any network link to the corporate environment. Consequently, safeguards are clearly needed.
In one embodiment, a method includes detecting a recordable transfer event on a source device. The recordable transfer event comprises a transfer of data between the source device and one or more destination devices in a peer-to-peer network. The method further includes generating, on the source device, a log of the recordable transfer event. In addition, the method includes, responsive to a determination that the source device lacks an infrastructure network connection, transmitting the log to at least one destination device so that the at least one destination device can report the log to a reporting node.
In one embodiment, an information handling system includes a network interface operable to enable peer-to-peer communication. The information handling system further includes a processing unit communicably coupled to the network interface. The processing unit is operable to detect a recordable transfer event. The recordable transfer event comprises a transfer of data between the information handling system and one or more destination devices in a peer-to-peer network. The processing unit is further operable to generate a log of the recordable transfer event. In addition, responsive to a determination that the information handling system lacks an infrastructure network connection, the processing unit is operable to transmit the log to at least one destination device so that the at least one destination device can report the log to a reporting node.
In one embodiment, a computer-program product includes a computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method. The method includes detecting a recordable transfer event on a source device. The recordable transfer event comprises a transfer of data between the source device and one or more destination devices in a peer-to-peer network. The method further includes generating a log of the recordable transfer event. In addition the method includes, responsive to a determination that the source device lacks an infrastructure network connection, transmitting the log to at least one destination device so that the at least one destination device can report the log to a reporting node.
A more complete understanding of the method and apparatus of the present invention may be obtained by reference to the following Detailed Description when taken in conjunction with the accompanying Drawings wherein:
In various embodiments, information security in peer-to-peer (P2P) communication can be more easily logged, reported, and audited via systems and methods described herein. In a typical embodiment, recordable transfer events can be logged and reported to a reporting node in dependence on which of a plurality of information handling systems first obtains an infrastructure network connection.
For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, calculate, determine, classify, process, transmit, receive, retrieve, originate, switch, store, display, communicate, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer (e.g., desktop or laptop), tablet computer, mobile device (e.g., personal digital assistant (PDA) or smart phone), server (e.g., blade server or rack server), a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, touchscreen and/or a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
A recordable transfer event, as used herein, is a communication that transfers data deemed sensitive by a transfer application from a source device to one or more destination devices. In various embodiments, what constitutes a recordable transfer event can be configurable, for example, by an administrator. An infrastructure network connection, as used herein, is a network connection sufficient to report a recordable transfer event, for example, to a reporting node. A transfer application, as used herein, is a software application that is operable to facilitate P2P communication and report recordable transfer events to a reporting node. A reporting node, as used herein, is a network location to which recordable transfer events can be reported. The network location can be represented, for example, by a reporting address. For example, the network location can be on a public network, a private corporate network, a virtual private network, or the like.
A source device, as used herein, is an information handling system from which data is transferred, for example, as part of a recordable transfer event. A destination device, as used herein, is an information handling system at which data is received, for example, as all or part of a recordable transfer event. A spectator device, as used herein, refers to an information handling system that is not a source device or a destination device relative to a given recordable transfer event but that is either connected or connectable to the source device. For purposes of this patent application, source devices and destination devices relative to a recordable transfer event are considered participants in the recordable transfer event. In addition, for purposes of this patent application, spectator devices are considered non-participants in the recordable transfer event.
In a typical embodiment, the transfer applications 104 manage establishment of and communication over a P2P link 108(1), a P2P link 108(2), and a P2P link 108(3) (collectively, P2P links 108). More particularly, the information handling system 102(1) and the information handling system 102(2) are connected by the P2P link 108(1), the information handling system 102(2) and the information handling system 102(3) are connected by the P2P link 108(2), and the information handling system 102(1) and the information handling system 102(3) are connected by the P2P link 108(3). In a typical embodiment, the P2P links 108 enable P2P communication between connected ones of the information handling systems 102. For example, in various embodiments, the P2P links 108 can represent connections established via WiFi direct. However, it should be appreciated that any other method of P2P communication can also be utilized.
The P2P network 116 is shown to be connected to the reporting node 106 via an infrastructure network connection 110. The infrastructure network connection 110 abstracts one or more individual network connections that may be established from the information handling systems 102 to the reporting node 106. The reporting node 106 enables such network connections via the reporting address 118. The infrastructure network connection 110 can be established via Internet connectivity as provided, for example, by cellular or WiFi service. Exemplary operation of the system 100 will be described in greater detail with respect to
In operation, the transfer applications 204 identify and facilitate a recordable transfer event 212. As shown, the recordable transfer event 212 is a transfer of data from the source device 202(1) to the one or more destination devices 202(2). The recordable transfer event can be, for example, a file transfer, a print operation (e.g., WiFi-direct printing), screen sharing (e.g., WiFi-display functionality), or the like. The transfer application 204(1) facilitates transfer of the data by the source device 202(1). In similar fashion, the transfer application 204(2) facilitates receipt of the data by the one or more destination devices 202(2). A report 214 of the recordable transfer event 212 is sent from a device of the P2P network 216 to the reporting node 206. In a typical embodiment, all transfers of the report 214 are as an encrypted communication that can only be decrypted by the reporting node 206. The report 214 can be, for example, a log as described with respect to
At step 302, the recordable transfer event occurs. The recordable transfer event can be, for example, a file transfer, a print operation (e.g., WiFi-direct printing), screen sharing, or the like. From step 302, the process 300 proceeds to step 304. At step 304, the transfer application on the source device generates a log. Table 1 below illustrates exemplary data that may be included in the log.
From step 304, the process 300 proceeds to step 306. At step 306, the transfer application on the source device determines whether the source device has an infrastructure network connection. If so, the process 300 proceeds to step 308. At step 308, the transfer application on the source device sends the log to the reporting node via the source device's infrastructure network connection. From step 308, the process 300 proceeds to step 310 where the process 300 ends.
If it is determined at step 306 that the source device does not have an infrastructure network connection, the process 300 proceeds to step 312. At step 312, the transfer application on the source device sends the log to all participants in the recordable transfer event. In a typical embodiment, the participants include, in addition to the source device, the one or more destination devices. Therefore, step 312 typically entails sending the log to the one or more destination devices. From step 312, the process 300 proceeds to step 314.
At step 314, the transfer application on the source device determines whether any participant has an infrastructure network connection. This is typically determined by communicating with the transfer application loaded and executing on each of the one or more destination devices. If it is determined that at least one participant has a network connection, the process 300 proceeds to step 316. At step 316, the at least one participant, via the transfer application loaded and executing thereon, sends the log to the reporting node. From step 316, the process 300 proceeds to step 318. At step 318, the process 300 ends.
If it is determined at step 314 that there is not at least one participant that has an infrastructure network connection, the process 300 proceeds to step 320. At step 320, the transfer application on the source device determines whether there is at least one spectator device that has an infrastructure network connection. If so, the process 300 proceeds to step 321. At step 321, the transfer application on the source device sends the log to the at least one spectator device. From step 321, the process 300 proceeds to step 322. At step 322, the at least one spectator device, via the transfer application loaded and executing thereon, sends the log to the reporting node. From step 322, the process 300 proceeds to step 324. At step 324, the process 300 ends.
If it is determined at step 320 that there is not at least one spectator device that has an infrastructure network connection, the process 300 proceeds to step 326. At step 326, all participants (i.e., the source device and the one or more destination device) retain the log and send to the reporting node when an infrastructure network connection is attained. From step 326, the process 300 proceeds to step 328. At step 328, the process 300 ends.
Although various embodiments of the method and apparatus of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth herein.
Number | Name | Date | Kind |
---|---|---|---|
6892210 | Erickson et al. | May 2005 | B1 |
7441153 | Chitre et al. | Oct 2008 | B1 |
7522591 | Kiyoto | Apr 2009 | B2 |
8316237 | Felsher | Nov 2012 | B1 |
8321494 | Ferguson et al. | Nov 2012 | B2 |
8341263 | Chambers et al. | Dec 2012 | B2 |
8364682 | Gershony et al. | Jan 2013 | B1 |
8874032 | Yang | Oct 2014 | B2 |
20030217135 | Chatani | Nov 2003 | A1 |
20040039781 | LaVallee et al. | Feb 2004 | A1 |
20040039829 | Bucher | Feb 2004 | A1 |
20040122865 | Stahl et al. | Jun 2004 | A1 |
20040246921 | Bates | Dec 2004 | A1 |
20060005026 | Song | Jan 2006 | A1 |
20060075106 | Hochmuth et al. | Apr 2006 | A1 |
20060136424 | Nuggehalli et al. | Jun 2006 | A1 |
20060159109 | Lamkin et al. | Jul 2006 | A1 |
20060167932 | Vertes | Jul 2006 | A1 |
20060212542 | Fang et al. | Sep 2006 | A1 |
20060230072 | Partovi | Oct 2006 | A1 |
20060248337 | Koodli | Nov 2006 | A1 |
20070053382 | Bevan | Mar 2007 | A1 |
20070174688 | Vertes | Jul 2007 | A1 |
20070220155 | Nalla | Sep 2007 | A1 |
20070255822 | Thiel et al. | Nov 2007 | A1 |
20080010372 | Khedouri | Jan 2008 | A1 |
20080195750 | Sadovsky | Aug 2008 | A1 |
20090024754 | Setton et al. | Jan 2009 | A1 |
20090264098 | Lo et al. | Oct 2009 | A1 |
20090285107 | Sakurai et al. | Nov 2009 | A1 |
20090287837 | Felsher | Nov 2009 | A1 |
20100042413 | Simpson et al. | Feb 2010 | A1 |
20100097969 | De Kimpe et al. | Apr 2010 | A1 |
20100153578 | Van Gassel | Jun 2010 | A1 |
20100208701 | Tinnakornsrisuphap et al. | Aug 2010 | A1 |
20100257593 | Avelo et al. | Oct 2010 | A1 |
20110047414 | Kudo | Feb 2011 | A1 |
20110060721 | Chalouhi | Mar 2011 | A1 |
20110145423 | Burns et al. | Jun 2011 | A1 |
20110223860 | Lo et al. | Sep 2011 | A1 |
20110231661 | Ramakrishnan | Sep 2011 | A1 |
20110246460 | Hsieh | Oct 2011 | A1 |
20110314138 | Kobayashi | Dec 2011 | A1 |
20110314153 | Bathiche | Dec 2011 | A1 |
20120023209 | Fletcher | Jan 2012 | A1 |
20120042197 | Peng | Feb 2012 | A1 |
20120244832 | Carlander | Sep 2012 | A1 |
20130061091 | Moore | Mar 2013 | A1 |
20130114596 | Clack | May 2013 | A1 |
Entry |
---|
http://www.imation.com/en, “Secure Managed USB Flash Drive / Imation Enterprise Powered by IronKey”, accessed on Jan. 30, 2013, 2 pages. |
Number | Date | Country | |
---|---|---|---|
20140215052 A1 | Jul 2014 | US |