Intelligent policy deployment
    2.
    发明授权
    Intelligent policy deployment 有权
    智能策略部署

    公开(公告)号:US09531595B2

    公开(公告)日:2016-12-27

    申请号:US13477958

    申请日:2012-05-22

    申请人: Keng Lim

    发明人: Keng Lim

    摘要: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.

    摘要翻译: 在信息管理系统中,相关政策部署到目标,而不相关的政策不是。 通过部署相关策略,可以减少存储策略的目标空间需求量和需要发送到目标的数据量。 此外,目标的执行速度可能会增加,因为目标不需要评估不相关的策略。

    Detecting behavioral patterns and anomalies using activity data
    3.
    发明授权
    Detecting behavioral patterns and anomalies using activity data 有权
    使用活动数据检测行为模式和异常

    公开(公告)号:US08862551B2

    公开(公告)日:2014-10-14

    申请号:US11615657

    申请日:2006-12-22

    申请人: Keng Lim

    发明人: Keng Lim

    IPC分类号: G06F17/30 G06F21/62

    摘要: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.

    摘要翻译: 分析或评估活动数据以检测行为模式和异常。 当检测到特定模式或异常时,系统可以发送通知或执行特定任务。 该活动数据可以被收集在可以是基于策略的信息管理系统中。 通知可能是电子邮件,报告,弹出消息或系统消息。 在检测时执行的一些任务可以包括在信息管理系统中实施策略,不允许用户连接到系统,并限制用户被允许执行某些动作。 为了检测模式,可以将活动数据与先前定义或生成的活动简档进行比较。

    Techniques and system to deploy policies intelligently
    7.
    发明授权
    Techniques and system to deploy policies intelligently 有权
    技术和系统智能部署策略

    公开(公告)号:US07716240B2

    公开(公告)日:2010-05-11

    申请号:US11615764

    申请日:2006-12-22

    申请人: Keng Lim

    发明人: Keng Lim

    IPC分类号: G06F17/30 G06F17/00

    摘要: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.

    摘要翻译: 在信息管理系统中,相关政策部署到目标,而不相关的政策不是。 通过部署相关策略,可以减少存储策略的目标空间需求量和需要发送到目标的数据量。 此外,目标的执行速度可能会增加,因为目标不需要评估不相关的策略。

    Enforcing Access Control Policies on Servers in an Information Management System
    10.
    发明申请
    Enforcing Access Control Policies on Servers in an Information Management System 有权
    在信息管理系统中对服务器实施访问控制策略

    公开(公告)号:US20080060080A1

    公开(公告)日:2008-03-06

    申请号:US11928370

    申请日:2007-10-30

    申请人: Keng Lim

    发明人: Keng Lim

    IPC分类号: H04L9/00

    摘要: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

    摘要翻译: 一种使用集中管理的规则来控制文档访问和应用程序使用的方法和装置。 规则通过规则服务器存储和操纵在中央规则数据库中。 策略执行者安装在客户端系统和/或服务器上,并通过评估发送到策略执行者的规则,对直接用户文档访问和应用程序使用以及应用程序文档访问执行文档访问和应用程序使用控制。 规则服务器决定每个策略执行者需要哪些规则。 作为规则评估的一部分,政策执行者也可以履行义务和补救行动。 客户端系统和服务器上的策略执行器可以自主运行,评估当通过规则服务器停止通信时已收到的策略。