Movatterモバイル変換


[0]ホーム

URL:


US20100186091A1 - Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system - Google Patents

Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system
Download PDF

Info

Publication number
US20100186091A1
US20100186091A1US12/454,094US45409409AUS2010186091A1US 20100186091 A1US20100186091 A1US 20100186091A1US 45409409 AUS45409409 AUS 45409409AUS 2010186091 A1US2010186091 A1US 2010186091A1
Authority
US
United States
Prior art keywords
document
classification
electronic
information
networks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/454,094
Inventor
James Luke Turner
Robert Edward Turner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US12/454,094priorityCriticalpatent/US20100186091A1/en
Publication of US20100186091A1publicationCriticalpatent/US20100186091A1/en
Priority to US13/986,899prioritypatent/US10346609B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The invention is an a document classification and marking engine/method that functions in a real-time compatible mode with off-the-shelf word processors, e-mail programs and presentation or other document development software applications. The software engine is used for the security classification of sensitive or national security classified information in electronic format and is enhanced by methods and processes that ensure that the software classification engine considers all document informational elements regardless of attributes assigned to the text that may hide text from the user. The software engine provides a complete and reliable document classification determination interface method based on user selections and uniquely codes the full text classification determination in a persistent manner within the electronic shell of the document in real-time and dynamically displays the text based full classification determination in the banner of the host document development application. The unique codes of the full classification embedded in the electronic shell of the document enable effective and reliable software processes and methods that establish controls for access, movement, storage etc. for electronic documents, as well as virtual electronic security perimeters, on a computer, networks of computers and/or among computer networks and domains of networks. The full or complete and persistent classification codes embedded in the document shell also enables reliable software processes and methods that immediately warn or alert security personnel of a beach of a physical security perimeter between or among computers networks or domains of networks established to protect the information contained in electronic document format.

Description

Claims (10)

4. The method and system ofclaim 3 further comprising a method and system to dynamically, in real-time, assess and display within the host document development software application the proper classification determination, or classification mark, in a text based format in accordance with the classification rules and regulations of an organization, for subset electronic, informational views or displays of an electronic document, and potentially printed hard copy subsets of the full informational content of an electronic document, within the current informational subset view or display of the document in the host application, while persistently maintaining the full classification determination for all of the information contained in the document in the banner of the document development software.
8. The method and system ofclaim 7 further comprising a system and method to monitor in real-time, and identify the removal of, or change to, the full classification code imbedded by the invention into the shell of an electronic document, by means outside of the authorized host document development software for the electronic document, and warning/alerting in real-time of the removal or change to the embedded full classification code, as well as subsequent, immediate re-posting to the electronic shell of the document the proper classification code for the document from a database and logging the event in local and/or network databases for the purpose of assuring the protection of the information contained in the electronic document and the reliability of security controls for the document effected and based on the embedded full classification code in the shell of an electronic document.
9. The method and system ofclaim 8 further comprising a system and method to establish and maintain virtual security perimeters in real-time within networks or domains of networks authorized to manage various levels of national security classified or sensitive information, by means of monitoring and assessing the full or complete classification code imbedded into the electronic shell of a document or within storage media for electronic documents, against a controlling database of matrixes of preset conditions, precipitated by an operating system event or call (copy, move, print, send, rename, delete, etc), or a similar software application activity event within a computer, network of computers, or domains of networks, within the physical security perimeter of such networks, for the purpose of determining if the full classification code for the document's information allows the operating system or application event to occur, as well as the logging and recording of successful event activity or attempted/denied event activity in a local and/or network databases for security system oversight and management.
10. The method and system ofclaim 9 further comprising a system and method to continuously monitor in real-time computers outside of the physical security perimeter of a certain sensitivity or classification level of a computer, network of computers or domain of networks or otherwise unauthorized to receive or store predetermined levels of classified or sensitive information, for full classification codes embedded into the shells of electronic, or on storage media for electronic documents, for the purpose of positive and immediate identification of breaches of physical security perimeters and the real-time notification of such security perimeter breaches to predetermined security or management personnel and/or the real-time initiation of computer, network or domain active measures to prevent the further dissemination of the information in accordance with preset matrixes in a controlling database, without jeopardizing or providing undue insight to the sensitivity or classification of the organization's classification criteria used to assign classifications to documents and information.
US12/454,0942008-05-132009-05-12Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert systemAbandonedUS20100186091A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US12/454,094US20100186091A1 (en)2008-05-132009-05-12Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system
US13/986,899US10346609B2 (en)2008-05-132013-06-17Method to establish virtual security perimeters

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US12738508P2008-05-132008-05-13
US12/454,094US20100186091A1 (en)2008-05-132009-05-12Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/986,899ContinuationUS10346609B2 (en)2008-05-132013-06-17Method to establish virtual security perimeters

Publications (1)

Publication NumberPublication Date
US20100186091A1true US20100186091A1 (en)2010-07-22

Family

ID=42338022

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US12/454,094AbandonedUS20100186091A1 (en)2008-05-132009-05-12Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system
US13/986,899Active2032-02-09US10346609B2 (en)2008-05-132013-06-17Method to establish virtual security perimeters

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US13/986,899Active2032-02-09US10346609B2 (en)2008-05-132013-06-17Method to establish virtual security perimeters

Country Status (1)

CountryLink
US (2)US20100186091A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090279143A1 (en)*2008-05-122009-11-12Xerox CorporationSecuring printed output
US20120131508A1 (en)*2010-11-182012-05-24Samsung Electronics Co., Ltd.Information display method and apparatus of mobile terminal
US20120151581A1 (en)*2010-12-092012-06-14Electronics And Telecommunications Research InstituteMethod and system for information property management
US20140115099A1 (en)*2012-07-172014-04-24Nowshade KabirMethod and System for Integrating Information from Mobile Devices to a Semantic Knowledge Repository
US20140149442A1 (en)*2012-11-282014-05-29Wellpoint, Inc.Method and System for Encoding Integration of Coded Logical Information Systems
US8751424B1 (en)*2011-12-152014-06-10The Boeing CompanySecure information classification
US10068100B2 (en)*2016-01-202018-09-04Microsoft Technology Licensing, LlcPainting content classifications onto document portions
CN108846128A (en)*2018-06-302018-11-20合肥工业大学A kind of cross-domain texts classification method based on adaptive noise encoder
US10230587B2 (en)*2005-07-072019-03-12Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system with specification defining trust domain membership and/or privileges and data management computing component
CN110110087A (en)*2019-05-152019-08-09济南浪潮高新科技投资发展有限公司A kind of Feature Engineering method for Law Text classification based on two classifiers
US11074354B2 (en)*2018-09-192021-07-27International Business Machines CorporationSegmenting, redacting, and transporting secure documents in a mixed security environment
US20210295116A1 (en)*2017-06-152021-09-23Palantir Technologies Inc.Systems and methods for managing data spills
US11196892B2 (en)*2019-05-302021-12-07Microsoft Technology Licensing, LlcUse of client compute for document processing
US11341271B2 (en)2019-05-302022-05-24Microsoft Technology Licensing, LlcInformation barriers for sensitive information
US11353039B2 (en)*2018-09-042022-06-07Hyland Uk Operations LimitedSystem and method for handling digital content governance in an organization
US20220365972A1 (en)*2019-06-172022-11-17Nippon Telegraph And Telephone CorporationClassification device, classification method, and classification program
US20230035274A1 (en)*2021-08-012023-02-02Authomize Ltd.Methods and Systems for Classification of Sensitive Electronic Resources
US11930841B2 (en)2014-05-122024-03-19AF Development Holding LimitedElectrically-powered hookah apparatus, capsule of combustible material for use therewith and method for control thereof
US11998042B2 (en)2018-06-152024-06-04Air IP Holdings LimitedWater pipe with accurate fit for a capsule
US12114692B2 (en)2018-06-152024-10-15Air IP Holdings LimitedWater pipe having a mechanism for releasing spent capsules
US12127583B2 (en)2018-08-292024-10-29Air IP Holdings LimitedVariable-use capsule for a hookah

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP5929369B2 (en)*2012-03-162016-06-01日本電気株式会社 Information processing apparatus including electronic document database, illegally stored document detection method, and program
US9641593B2 (en)*2015-03-312017-05-02Dell Products, LpContent sharing and storage of a plurality of remotely connected computing devices in physical or virtualized space
US10713368B2 (en)*2017-02-022020-07-14Alfresco Software, Inc.Application of security parameters for content
WO2019164678A1 (en)2018-02-212019-08-293M Innovative Properties CompanyCore-sheath filaments and methods of printing an adhesive

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5960080A (en)*1997-11-071999-09-28Justsystem Pittsburgh Research CenterMethod for transforming message containing sensitive information
US5991709A (en)*1994-07-081999-11-23Schoen; Neil CharlesDocument automated classification/declassification system
US5996011A (en)*1997-03-251999-11-30Unified Research Laboratories, Inc.System and method for filtering data received by a computer system
US6216228B1 (en)*1997-04-232001-04-10International Business Machines CorporationControlling video or image presentation according to encoded content classification information within the video or image data
US20060031923A1 (en)*2004-08-042006-02-09Yoichi KanaiAccess control list attaching system, original content creator terminal, policy server, original content data management server, program and computer readable information recording medium
US7103915B2 (en)*2000-11-132006-09-05Digital Doors, Inc.Data security system and method
US7305415B2 (en)*1998-10-062007-12-04Crystal Reference Systems LimitedApparatus for classifying or disambiguating data
US20080104118A1 (en)*2006-10-262008-05-01Pulfer Charles EDocument classification toolbar
US20090178144A1 (en)*2000-11-132009-07-09Redlich Ron MData Security System and with territorial, geographic and triggering event protocol

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6453345B2 (en)*1996-11-062002-09-17Datadirect Networks, Inc.Network security and surveillance system
US6088796A (en)*1998-08-062000-07-11Cianfrocca; FrancisSecure middleware and server control system for querying through a network firewall
US6396400B1 (en)*1999-07-262002-05-28Epstein, Iii Edwin A.Security system and enclosure to protect data contained therein
US7134141B2 (en)*2000-06-122006-11-07Hewlett-Packard Development Company, L.P.System and method for host and network based intrusion detection and response
US20030188189A1 (en)*2002-03-272003-10-02Desai Anish P.Multi-level and multi-platform intrusion detection and response system
WO2003083626A1 (en)*2002-03-282003-10-09British Telecommunications Public Limited CompanyMethod and apparatus for network security
JP2005197823A (en)*2003-12-262005-07-21Fujitsu Ltd Unauthorized access control device between firewall and router
US7779463B2 (en)*2004-05-112010-08-17The Trustees Of Columbia University In The City Of New YorkSystems and methods for correlating and distributing intrusion alert information among collaborating computer systems
US8140664B2 (en)*2005-05-092012-03-20Trend Micro IncorporatedGraphical user interface based sensitive information and internal information vulnerability management system
US11270267B2 (en)*2007-12-122022-03-08Avaya Inc.Sensitive information management
US20100251369A1 (en)*2009-03-252010-09-30Grant Calum A MMethod and system for preventing data leakage from a computer facilty

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5991709A (en)*1994-07-081999-11-23Schoen; Neil CharlesDocument automated classification/declassification system
US5996011A (en)*1997-03-251999-11-30Unified Research Laboratories, Inc.System and method for filtering data received by a computer system
US6216228B1 (en)*1997-04-232001-04-10International Business Machines CorporationControlling video or image presentation according to encoded content classification information within the video or image data
US5960080A (en)*1997-11-071999-09-28Justsystem Pittsburgh Research CenterMethod for transforming message containing sensitive information
US7305415B2 (en)*1998-10-062007-12-04Crystal Reference Systems LimitedApparatus for classifying or disambiguating data
US7103915B2 (en)*2000-11-132006-09-05Digital Doors, Inc.Data security system and method
US20090178144A1 (en)*2000-11-132009-07-09Redlich Ron MData Security System and with territorial, geographic and triggering event protocol
US20060031923A1 (en)*2004-08-042006-02-09Yoichi KanaiAccess control list attaching system, original content creator terminal, policy server, original content data management server, program and computer readable information recording medium
US20080104118A1 (en)*2006-10-262008-05-01Pulfer Charles EDocument classification toolbar

Cited By (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10230587B2 (en)*2005-07-072019-03-12Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system with specification defining trust domain membership and/or privileges and data management computing component
US8156416B2 (en)*2008-05-122012-04-10Xerox CorporationSecuring printed output
US20090279143A1 (en)*2008-05-122009-11-12Xerox CorporationSecuring printed output
US8839149B2 (en)*2010-11-182014-09-16Samsung Electronics Co., Ltd.Information display method and apparatus of mobile terminal
US20120131508A1 (en)*2010-11-182012-05-24Samsung Electronics Co., Ltd.Information display method and apparatus of mobile terminal
US10162482B2 (en)2010-11-182018-12-25Samsung Electronics Co., Ltd.Information display method and apparatus of mobile terminal
US20120151581A1 (en)*2010-12-092012-06-14Electronics And Telecommunications Research InstituteMethod and system for information property management
US8751424B1 (en)*2011-12-152014-06-10The Boeing CompanySecure information classification
US20140115099A1 (en)*2012-07-172014-04-24Nowshade KabirMethod and System for Integrating Information from Mobile Devices to a Semantic Knowledge Repository
US20170293643A1 (en)*2012-11-282017-10-12Anthem, Inc.Method and system for encoding integration of coded logical information systems
US20140149442A1 (en)*2012-11-282014-05-29Wellpoint, Inc.Method and System for Encoding Integration of Coded Logical Information Systems
US11930841B2 (en)2014-05-122024-03-19AF Development Holding LimitedElectrically-powered hookah apparatus, capsule of combustible material for use therewith and method for control thereof
US10068100B2 (en)*2016-01-202018-09-04Microsoft Technology Licensing, LlcPainting content classifications onto document portions
US20210295116A1 (en)*2017-06-152021-09-23Palantir Technologies Inc.Systems and methods for managing data spills
US12114692B2 (en)2018-06-152024-10-15Air IP Holdings LimitedWater pipe having a mechanism for releasing spent capsules
US11998042B2 (en)2018-06-152024-06-04Air IP Holdings LimitedWater pipe with accurate fit for a capsule
CN108846128A (en)*2018-06-302018-11-20合肥工业大学A kind of cross-domain texts classification method based on adaptive noise encoder
US12127583B2 (en)2018-08-292024-10-29Air IP Holdings LimitedVariable-use capsule for a hookah
US12247577B2 (en)2018-09-042025-03-11Hyland Uk Operations LimitedSystem and method for handling digital content governance in an organization
US11674525B2 (en)*2018-09-042023-06-13Hyland Uk Operations LimitedSystem and method for handling digital content governance in an organization
US11353039B2 (en)*2018-09-042022-06-07Hyland Uk Operations LimitedSystem and method for handling digital content governance in an organization
US20220275808A1 (en)*2018-09-042022-09-01Hyland Uk Operations LimitedSystem and method for handling digital content governance in an organization
US11074354B2 (en)*2018-09-192021-07-27International Business Machines CorporationSegmenting, redacting, and transporting secure documents in a mixed security environment
CN110110087A (en)*2019-05-152019-08-09济南浪潮高新科技投资发展有限公司A kind of Feature Engineering method for Law Text classification based on two classifiers
US11341271B2 (en)2019-05-302022-05-24Microsoft Technology Licensing, LlcInformation barriers for sensitive information
US11196892B2 (en)*2019-05-302021-12-07Microsoft Technology Licensing, LlcUse of client compute for document processing
US11928160B2 (en)*2019-06-172024-03-12Nippon Telegraph And Telephone CorporationClassification device, classification method, and classification program
US20220365972A1 (en)*2019-06-172022-11-17Nippon Telegraph And Telephone CorporationClassification device, classification method, and classification program
US20230035274A1 (en)*2021-08-012023-02-02Authomize Ltd.Methods and Systems for Classification of Sensitive Electronic Resources

Also Published As

Publication numberPublication date
US20140013433A1 (en)2014-01-09
US10346609B2 (en)2019-07-09

Similar Documents

PublicationPublication DateTitle
US10346609B2 (en)Method to establish virtual security perimeters
US7958147B1 (en)Method for providing customized and automated security assistance, a document marking regime, and central tracking and control for sensitive or classified documents in electronic format
CA2504680C (en)A method and system for managing confidential information
US7774421B2 (en)Mitigating address book weaknesses that permit the sending of e-mail to wrong addresses
US20030182583A1 (en)Electronic document classification and monitoring
US20100064342A1 (en)Security measure status self-checking system
US20050027980A1 (en)Apparatus and method for ensuring compliance with a distribution policy
JP2004227056A (en)Device and method for inspecting character string and program making computer perform its method
US20200065498A1 (en)System and method for security analysis
US7636947B2 (en)Apparatus and method for electronic mail filtering
US11765171B2 (en)Monitoring security configurations of cloud-based services
CN112163198A (en)Host login security detection method, system, device and storage medium
CN114117513A (en) Share data with specific audiences
US9251376B2 (en)Method and system to warn the user in the event of potential confidential document security violations
US20080134289A1 (en)System And Method For Automation Of Information Or Data Classification For Implementation Of Controls
KR101160719B1 (en)Method and system for sending electronic mail over a network
JP2008269445A (en)Unjust browsing prevention method, unjust browsing prevention system and unjust browsing prevention program for manager
US20160210468A1 (en)Method to customize and automate a classification block for information contained in an electronic document
JP2008204433A (en)Management system, management server, and management program
US20150348053A1 (en)Monitoring User Activities on Client Devices by Imaging Device Drivers
US20170366510A1 (en)Cognitive confidentiality guardian
KR101631316B1 (en)File management method using icon badge and recoding medium recorded program thereof
DavisApp Aims To Protect Personal Electronic Devices Against Cyberattacks: WhiteHaX CyberSafe by HSB, a Munich Re company, identifies vulnerabilities and blocks viruses.
CN113630395B (en)Anti-phishing method, client and system for communication content
AU2003202436A1 (en)Electronic document classification and monitoring

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp