Information security – Policy
Reexamination Certificate
2007-03-09
2009-11-24
Zand, Kambiz (Department: 2434)
Information security
Policy
C705S001100
Reexamination Certificate
active
07624427
ABSTRACT:
Methods and apparatus, including computer program products, implementing and using techniques for causing an application program containing personal information to operate on an operating system. It is detected whether the application program outputs, transfers or generates data to the outside of a storage region of the application program. A real-time determination is made as to whether or not the data is subject to personal information management. Processing of the application program is continued, interrupted or corrected based the determination. Personal information is detected by scanning contents of the data when the data is subject to personal information management. Detected personal information is displayed to a user. A result of the determination is input according to a level of risk against the data for the user. Contents of the determination result is stored as a history. A risk indicator for the data is computed and displayed to the user.
REFERENCES:
patent: 3860870 (1975-01-01), Furuya
patent: 4013962 (1977-03-01), Beseke et al.
patent: 7161465 (2007-01-01), Wood et al.
patent: 7234065 (2007-06-01), Breslin et al.
patent: 2005/0080716 (2005-04-01), Belyi et al.
patent: 2005/0080717 (2005-04-01), Belyi et al.
patent: 2006/0102717 (2006-05-01), Wood et al.
patent: 2007/0143145 (2007-06-01), DeLusignan et al.
patent: H11-338778 (1999-10-01), None
patent: 2002-330220 (2002-11-01), None
patent: 2004-192601 (2004-07-01), None
patent: 2005-190066 (2005-07-01), None
patent: 2005-190135 (2005-07-01), None
patent: 2005-196699 (2005-07-01), None
patent: 2005-202488 (2005-07-01), None
patent: 2005190066 (2005-07-01), None
patent: 2006-92149 (2006-06-01), None
patent: 02/03215 (2002-10-01), None
Furuichi, S. “The Design and Implementation of Real-Time Program Monitoring . . . ”. 2006 Symposium on Cryptography and Information Security. Hiroshima, Japan, Jan. 17-20, 2006.
K. Kanda et. al., “The implementation scheme of a reference monitor on Windows”, IPSJ SIG Technical Report, vol. 2003 No. 80, p. 41-46, Information Processing Society of Japan, Aug. 4, 2003.
K. Suzuki et. al., “An Adaptive Data Protection Method based on Contexts of Data Access in Privacy-Aware Operating System Salvia”, Domestic Paper, vol. 47 No. SIG3 (ACS13) , p. 1-15, Information Processing Society of Japan, May 15, 2006.
Furuichi Sanehiro
Kudo Michiharu
Harriman Dant B Shaifer
International Business Machines - Corporation
Mollborn Fredrik
Shimokaji & Associates P.C.
Zand Kambiz
LandOfFree
Method and apparatus for supporting personal information... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for supporting personal information..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for supporting personal information... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4061435