Information management system

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S162000, C713S189000

Reexamination Certificate

active

07669227

ABSTRACT:
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyzer may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.

REFERENCES:
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5701484 (1997-12-01), Artsy
patent: 5740355 (1998-04-01), Watanabe et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5903882 (1999-05-01), Asay et al.
patent: 5917489 (1999-06-01), Thurlow et al.
patent: 5944787 (1999-08-01), Zoken
patent: 5964839 (1999-10-01), Johnson et al.
patent: 5974149 (1999-10-01), Leppek
patent: 5987611 (1999-11-01), Freund
patent: 6006333 (1999-12-01), Nielsen
patent: 6009173 (1999-12-01), Sumner
patent: 6009526 (1999-12-01), Choi
patent: 6073142 (2000-06-01), Geiger et al.
patent: 6085224 (2000-07-01), Wagner
patent: 6141686 (2000-10-01), Jackowski et al.
patent: 6359557 (2002-03-01), Bilder
patent: 7017187 (2006-03-01), Marshall et al.
patent: 2002/0087645 (2002-07-01), Ertugrul et al.
patent: 2003/0140282 (2003-07-01), Kaler et al.
patent: 0736827 (1996-10-01), None
patent: 0817099 (1998-01-01), None
patent: 0959419 (1999-11-01), None
patent: 2247549 (1992-03-01), None
patent: 2295299 (1996-05-01), None
patent: 2 339 938 (2000-02-01), None
patent: 07-154615 (1995-06-01), None
patent: 2000-235540 (2000-08-01), None
patent: 2000-278260 (2000-10-01), None
patent: 2007072526 (2007-03-01), None
patent: WO-99/67931 (1999-12-01), None
patent: WO-00/68811 (2000-11-01), None
patent: WO-01/27813 (2001-04-01), None
patent: WO-01/39023 (2001-05-01), None
Abrams, M. et al. “A Higher Level of Computer Security through Active Policies,” Computers & Security, 14 (1995) pp. 147-157.
Boone, G., “Concept Features in Re: Agent, and Intelligent Email Agent,” Proceedings of the 2nd International Conference of the 2nd International Conference on Autonomous Agents/St. Paul, MN, May 1998, pp. 141-148.
Esposito, D. (Jan. 1999) “Browser Helper Objects: The Browser the Way You Want It” Microsoft Corporation, retrieved from http://msdn.Microsoft.com/library/techart/bho.htm.
Grimm, R. et al. (1996) Security Policies in OSI-Management Experiences from the.
Hurwitz Group, “Managing Exchange 2000 Migration with Bindview,” www.Hurwitz.com, Oct. 2000, pp. 1-15.
Lloyd, S., (1998) “Microsoft Outlook and Exchange Client Extensions”.
Rothman, M., (2000) “Email Security: the PKI Way,” www.comnews.com, p. 1.
Satchell, S., “Keeping E-Mail Secure,” www.106.ibm., Oct. 2000, pp. 1-4.
Schlosser, M., “IBM Application Framework for E-business: Security,” www.4.ibm.com, Nov. 1999, pp. 1-8.
Takkinen, J., et al., (1998) “Cafe: A Conceptual Model for Managing Information in Electronic Mail,” Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 44-53.
Hamilton, “Visual Basic Shell Programming,” Jul. 2000, O'Reilly & Associates, Inc., Sebastopol, CA, 1st Edition, Chapter 12.
Muller, “Desktop Encyclopedia of the Internet,” 1999, Artech House, Inc., Norwood, MA, all pages.
Examiners Report No. 4 issued for corresponding Australian Patent Application No. 2002212549 mailed Feb. 25, 2009.
Norio Miya, “Network solution course. How to use practically mail filtering,” Nikkei Communications, Japan, Nikkei Business Publication, Inc., Jul. 3, 2000, No. 321, pp. 148- 153.
Miwa, “Two piece of security software preventing intrusion from outside,” Monthly ASCII, Japan, ASCII Corporation, vol. 24, No. 10, pp. 266-267 (translator's note: this reference ws published on Oct. 1, 2000 according the last page of the copy of this reference.
White, R., “How Computers Work,” Millennium Ed., Que Corporation, Indianapolis, IN, 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Information management system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Information management system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information management system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4171548

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.