Techniques and System to Deploy Policies Intelligently

Abstract
In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
Description

BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a diagram of distributed computing network connecting a server and clients.



FIG. 2 shows a more detailed diagram of a computer system which may be a client or server.



FIG. 3 shows a system block diagram of a computer system.



FIG. 4 shows a block diagram of a policy server that centrally manages policies that are used by workstations and servers according to a specific implementation of the invention.



FIG. 5 shows a block diagram of a number of workstations and document servers with policy enforcers installed and coexist within a system according to a specific implementation of the invention.



FIG. 6 shows a block diagram of minimal embodiments that utilize a number of workstations each with policy enforcers installed or a number of document servers each with policy enforcers installed according to a specific implementation of the invention.



FIG. 7 shows a block diagram of internal components of a policy server according to a specific implementation of the invention.



FIG. 8 shows a block diagram of the internal components of an intelligence server according to a specific implementation of the invention.



FIG. 9 shows a block diagram of an interceptor and a consequence applicator in a policy enforcement point (PEP) module according to a specific implementation of the invention.



FIG. 10 shows a block diagram of a policy enforcer that implements interception and enforcement functions using a PEP plug-in architecture according to a specific implementation of the invention.



FIG. 11 shows a block diagram of a policy enforcer installed on a workstation that controls access to files on the workstation according to the invention.



FIG. 12 shows a block diagram of a policy enforcer on a workstation enforcing access control to a nonfile system object according to the invention.



FIG. 13 shows a layer description of an implementation of a policy language system of the invention.



FIG. 14 shows the functional modes of an information system of the invention.



FIG. 15 shows an example of interactions between multiple policies and multiples policy abstractions and their interaction.



FIG. 16 shows an example of one policy and multiple policy abstractions, where one policy abstractions references other policy abstractions.



FIG. 17 shows accessing confidential document, seeking approval, with centralized decision.



FIG. 18 shows accessing confidential document, seeking approval, with distributed decision.



FIG. 19 shows blocking sending of a confidential document outside the company.



FIG. 20 shows encrypting a confidential document when copying to a removable device.



FIG. 21 shows sending of a confidential document between users who should observe separation of duties.



FIG. 22 shows an example of a deployment operation to a workstation of an information management system.



FIG. 23 shows an example of a deployment operation of rules associated with a user.



FIG. 24 shows an example of a push operation, pushing one set of rules to a workstation and another set of rules to a server.



FIGS. 25-50 show syntax diagrams for a specific implementation of a policy language, the Compliant Enterprise Active Control Policy Language (ACPL).



FIG. 51 provides a legend explaining the nodes used in FIGS. 25-50.


Claims
  • 1. A method comprising: providing a plurality of policies, wherein the policies are applicable to a plurality of target profiles, each having a set of target attributes;analyzing a policy to determine whether that policy is relevant to a specific target profile with a set of specific target attributes; anddetermining a policy is relevant when a value of at least one of the specific target attributes is used during an evaluation of the policy.
  • 2. The method of claim 1 wherein the at least one of the specific target attributes specifies a capability of a target having the specific target profile.
  • 3. The method of claim 1 wherein the at least one of the specific target attributes specifies the device type of a target having the specific target profile.
  • 4. The method of claim 1 wherein the at least one of the specific target attributes specifies the location of a target having the specific target profile.
  • 5. The method of claim 1 wherein the at least one of the specific target attributes specifies at least one user at a target having the specific target profile.
  • 6. The method of claim 1 wherein the at least one of the specific target attributes specifies at least one application program running at a target having the specific target profile.
  • 7. The method of claim 1 wherein the target attributes specify at least one of capability, device type or location, or user or application.
  • 8. The method of claim 1 wherein the plurality of policies comprises policy abstractions.
  • 9. A method comprising: providing a plurality of policies, wherein the policies are applicable to a plurality of target profiles, each having a set of target attributes;analyzing a policy to determine whether that policy is relevant or irrelevant to a specific target profile with a set of specific target attributes; andtransferring relevant policies to a specific target with the specific target profile and not transferring irrelevant policies to the specific target.
  • 10. The method of claim 9 further comprising: determining a policy is relevant when a value of at least one of the specific target attributes is used during an evaluation of the policy.
  • 11. The method of claim 9 further comprising: determining a policy is irrelevant when the policy has no event that can occur at the specific target.
  • 12. The method of claim 11 wherein the event is a send operation.
  • 13. The method of claim 11 wherein the event is an order submission operation.
  • 14. The method of claim 11 wherein the event is a print operation.
  • 15. The method of claim 11 where in the event is an HTTP request operation.
  • 16. The method of claim 9 further comprising: providing a specific policy that controls access to information at a specific target;determining the specific policy is irrelevant to the specific target because access to the information cannot occur at the specific target.
  • 17. The method of claim 16 wherein the information comprises files on a file server, and the specific target comprises a device without capability to access a file server.
  • 18. The method of claim 16 wherein the information comprises a spreadsheet file, and the specific target comprises a smart phone without a software program capable of displaying the spreadsheet file.
  • 19. The method of claim 9 further comprising: providing a specific policy that allows a specific action at a specific target;determining the specific policy is irrelevant to the specific target because the specific action cannot occur at the specific target.
  • 20. The method of claim 19 wherein the specific action is sending an e-mail.
  • 21. The method of claim 19 wherein the specific action is opening a document.
  • 22. The method of claim 19 wherein the specific action is a cut and paste.
  • 23. The method of claim 9 further comprising: providing a specific policy that denies access to information when a condition is met;determining the specific policy is irrelevant to the specific target because the condition cannot be met at the specific target.
  • 24. The method of claim 23 wherein the condition comprises forwarding an e-mail message, and the specific target comprises a file server without a capability to process e-mail messages.
  • 25. The method of claim 9 further comprising: when at least one of the specific target attributes of the specific target profile changes, reanalyzing the policy to determine whether that policy is relevant or irrelevant; andretransferring relevant policies to the specific target with the specific target profile with the changed specific target attributes.
  • 26. The method of claim 9 further comprising: when at least one of the specific target attributes of the specific target profile changes, reanalyzing the policy to determine whether that policy is relevant or irrelevant; andretransferring relevant policies changes to the specific target with the specific target profile with the changed specific target attributes.
  • 27. The method of claim 25 wherein a specific target attribute of the specific target profile that changes is related to a location change of the specific target.
  • 28. The method of claim 25 wherein a specific target attribute of the specific target profile that changes is related to a change in a user who is logged into the specific target.
  • 29. The method of claim 25 wherein a specific target attribute of the specific target profile that changes is related to a network address change of the specific target.
  • 30. The method of claim 9 further comprising: disconnecting the specific target from a system and then subsequently reconnecting the specific target to the system;after reconnecting the specific target to the system, reanalyzing the policy to determine whether the policy is relevant or irrelevant to the specific target; andafter reanalyzing the policy, retransferring relevant policies to the specific target with the specific target profile.
  • 31. The method of claim 9 wherein the plurality of policies comprises policy abstractions.
  • 32. A method comprising: providing a plurality of policies applicable to a plurality of targets, each target having a set of capabilities, wherein a policy comprises an expression and an event;determining whether a policy is relevant or irrelevant to a specific target; andtransferring relevant policies to the specific target and not transferring irrelevant policies to the specific target.
  • 33. The method of claim 32 wherein the expression comprises a variable defined in a policy abstraction.
  • 34. The method of claim 32 wherein the number of relevant policies is less than a total number of the plurality of policies applicable to a plurality of targets.
  • 35. The method of claim 32 wherein the relevant policies are stored at the target.
  • 36. The method of claim 32 wherein the irrelevant policies are not stored at the target.
  • 37. The method of claim 32 further comprising: evaluating the relevant polices at the target.
  • 38. The method of claim 32 further comprising: determining a policy is irrelevant to a specific target when the policy specifies an event requiring a capability not within the set of capabilities of the target.
  • 39. The method of claim 32 wherein the plurality of policies comprises policy abstractions.
Provisional Applications (5)
Number Date Country
60755019 Dec 2005 US
60766036 Dec 2005 US
60743121 Jan 2006 US
60821050 Aug 2006 US
60870195 Dec 2006 US
Continuation in Parts (3)
Number Date Country
Parent 11383159 May 2006 US
Child 11615764 US
Parent 11383161 May 2006 US
Child 11383159 US
Parent 11383164 May 2006 US
Child 11383161 US