Method and system for tracking an operating performed on an information asset with metadata associated therewith
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/24
G06F-017/00
H04L-029/06
H04L-009/00
출원번호
UP-0733153
(2007-04-09)
등록번호
US-7673324
(2010-04-21)
발명자
/ 주소
Tirosh, Oren
Werner, Eran
Green, Ishay
Agmon, Liad
출원인 / 주소
McAfee, Inc.
대리인 / 주소
Zilka-Kotab, PC
인용정보
피인용 횟수 :
24인용 특허 :
18
초록
A system and method are provided for tracking an operation performed on an information asset. The information asset has metadata associated therewith. In use, the metadata is preserved during the at least one operation.
대표청구항▼
We claim: 1. A computer-implemented method, comprising: tracking at least one operation performed on an information asset, the information asset having metadata associated therewith, the at least one operation including a transformation of the information asset to a different representation; genera
We claim: 1. A computer-implemented method, comprising: tracking at least one operation performed on an information asset, the information asset having metadata associated therewith, the at least one operation including a transformation of the information asset to a different representation; generating descriptions of events each representing at least one of a transmission of the information asset and the transformation; and enforcing a reaction prescribed by the plurality of rules of a policy in response to the events, including storing the descriptions of the events in a logging server and analyzing the descriptions of the events utilizing the management console; wherein the metadata is preserved during the at least one operation; wherein an agent is installed on a computer for performing the tracking, the generating of the descriptions of the events, and the enforcing of the reaction. 2. The method as recited in claim 1, wherein the information asset includes a file. 3. The method as recited in claim 1, wherein the operation includes a change made to the information asset. 4. The method as recited in claim 3, wherein the change includes encrypting the information asset. 5. The method as recited in claim 1, wherein the operation includes the transmission of the information asset, the transmission being between a plurality of computers. 6. The method as recited in claim 1, wherein the operation includes the transmission of the information asset, the transmission being between a plurality of information containers. 7. The method as recited in claim 1, and further comprising generating the events associated with the operation. 8. The method as recited in claim 7, wherein the events describe the operation. 9. The method as recited in claim 7, and further comprising applying the policy to the generated events. 10. The method as recited in claim 9, and further comprising initiating an action if at least one of the generated events violates the policy. 11. The method as recited in claim 1, wherein the metadata is associated with at least a portion of contents of the information asset. 12. The method as recited in claim 1, wherein a plurality of instances of metadata are each associated with a different portion of contents of the information asset. 13. The method as recited in claim 1, wherein the metadata represents a confidentiality status of the information asset. 14. The method as recited in claim 1, wherein the metadata represents at least one attribute of the information asset. 15. The method as recited in claim 1, wherein the metadata is stored as at least one of an extended attribute of the information asset, an alternate data stream of the information asset, data in a database indexed by a name of the information asset, data in a database indexed by a hash function of contents of the information asset, data embedded within the information asset, and a header of the information asset. 16. The method as recited in claim 1, wherein the metadata is automatically associated with the information asset. 17. The method as recited in claim 16, wherein the metadata is automatically associated with the information asset based on a creation of the information asset. 18. The method as recited in claim 1, wherein the metadata associated with the information asset is based on at least one of a source of the information asset and an application that created the information asset. 19. A computer program product embodied on a tangible computer readable medium, comprising: computer code for tracking at least one operation performed on an information asset, the information asset having metadata associated therewith, the at least one operation including a transformation of the information asset to a different representation; computer code for generating descriptions of events each representing at least one of a transmission of the information asset and the transformation; and computer code for enforcing a reaction prescribed by the plurality of rules of a policy in response to the events, including storing the descriptions of the events in a logging server and analyzing the descriptions of the events utilizing the management console; wherein the computer program product is operable such that the metadata is preserved during the at least one operation; wherein the computer program product is operable such that an agent is installed on a computer for performing the tracking, the generating of the descriptions of the events, and the enforcing of the reaction. 20. A data structure embodied on a computer readable medium, Comprising: metadata associated with an information asset that is preserved during at least one of a change and a transmission of the information asset, the change including a transformation of the information asset to a different representation; wherein the data structure is utilized such that descriptions of events each representing at least one of a transmission of the information asset and the transformation are generated; wherein the data structure is utilized such that a reaction prescribed by the plurality of rules of a policy is enforced in response to the events, including storing the descriptions of the events in a logging server and analyzing the descriptions of the events utilizing the management console; wherein the data structure is utilized such that an agent is installed on a computer for performing the tracking, the generating of the descriptions of the events, and the enforcing of the reaction. 21. A method for implementing a rule-based policy for security of information assets in an enterprise system comprising a plurality of computers, comprising: tracking transmission of an information asset between a plurality of computers, the information asset stored as an information container and having a tag in the form of metadata attached thereto; tracking transmission of the information asset between a plurality of information containers; tracking modification of the information asset to a different representation; tracking transformation of the information asset to different a representation; preserving attachment of the tag to the information asset during the transmission and the transformation; generating descriptions of events each representing at least one of the transmission and the transformation; applying a policy including a plurality of rules to the descriptions of the events for determining whether the events comply with the policy, where the policy is configured by a management console; and enforcing a reaction prescribed by the plurality of rules of the policy in response to the events, including storing the descriptions of the events in a logging server and analyzing the descriptions of the events utilizing the management console; wherein an agent is installed on each of the plurality of computers for performing the tracking, the generating of the descriptions of the events, the applying the policy to the descriptions of the events, and the enforcing of the reaction.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (18)
Gargi,Ullas, Automated propagation of document metadata.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Hattrup,Glen; Lay,Jeou Rong; Chambliss,David Darden; Martin,Howard Newton, Method and apparatus for managing and formatting metadata in an autonomous operation conducted by a third party.
Brodersen, Robert A.; Chatterjee, Prashant; Cohen, Jeffrey I.; Lim III, Peter Siam Sy, Method, apparatus, system, and program product for attaching files and other objects to a partially replicated database.
Cabrera, Luis Felipe; Jones, Deborah C.; Pudipeddi, Ravisankar; Steiner, Stefan R., Partial migration of an object to another storage location in a computer system.
Zhu, Garrick; Bu, Zheng, System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic.
Zhu, Ge; Bu, Zheng, System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic.
Zhu, Ge; Bu, Zheng, System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.