Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points

ABSTRACT

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/383,164, filed May 12, 2006, which claims the benefit of U.S.provisional patent applications 60/755,019, filed Dec. 29, 2005;60/766,036, filed Dec. 29, 2005; and 60/743,121, filed Jan. 11, 2006.These applications along with all other cited references in thisapplication are incorporated by reference.

BACKGROUND OF THE INVENTION

The present invention generally relates to the access and usage controland management of information stored in a computer environment. Theinvention relates more specifically to a method and apparatus forcontrolling access to and usage of electronic information usingcentrally managed rules in a computer environment.

The approaches described in this section could be pursued, but are notnecessarily approaches that have been previously conceived or pursued.Therefore, unless otherwise indicated in this application, theapproaches described in this section are not prior art to the claims inthis application and are not admitted to be prior art by inclusion inthis section.

Networked computer systems have evolved over the years from simpleserially connected computer systems to massively networked computersystems connected via large intranets and the Internet. During thisevolution, many different concepts were developed to manage how usersare granted access to electronic files stored in the computer systems.How a computer system determines if a user permission to access a filehas been a complex problem to solve.

Some operating systems use a simple approach to determining whether auser has permission to access a file. For example the Unix operatingsystem gives a system administrator or file owner the ability to attachaccess permissions to directories and files. There are three types ofaccess permissions that the system administrator or file owner canselect from. The permissions are: read, write, and execute. Thesepermissions can then be limited to three types of users: the owner ofthe file; the group that the owner belongs to; and other users. Eachpermission and user type has two states: allowed or denied.

Whenever a user accesses a file, the Unix operating system first checksthe permissions set for a file against the user's type. The operatingsystem checks if the user falls into any of the three user types. If theuser is a member of any of the user types and the user type has beenspecified as allowed, then the operating system checks which of thepermissions are set as allowed. The user is then allowed to perform anyaccess that falls under an allowed permission.

This approach does not offer much flexibility to the systemadministrator. The system administrator cannot specify particular usersother than the owner or particular groups. The permissions are limitedto directories and files within the file system and do not cover nonfilesystem objects such as e-mails and Web pages. Further, the operatingsystem checks permissions for file accesses based only on user and itdoes not restrict file accesses based on application programs.

A more advanced approach that is commonly used is called Access ControlLists (ACL). ACL uses a language that allows the system administrator orfile owner to set read, write, and execute permissions for specificusers and groups of users for accesses to files. In some approaches,each set of ACLs for a particular directory reside in a file stored inthat directory. The ACLs apply to files that are contained within thatdirectory. When a user attempts to access a file in a directory, theoperating system loads the ACL file and reads the ACL rules that werecreated by the system administrator or user. The operating systemdetermines if the user is allowed to access the file by parsing the ACLrule. In other approaches, a set of ACLs associated with a file isstored as one or more extended file system attributes of the file. Inanother implementation, access control and auditing ACLs are stored in asecurity descriptor associated with a file or a directory.

There are many drawbacks to the ACL approach. ACL only applies to fileswithin a file system and does not apply to nonfile system objects. TheACL support is built into the operating system kernel and cannot beextended. ACL is not very portable because it is file system specificand is therefore not universal which means that not all file systemssupport the same ACL and not all operating systems have the sameinterpretation of an ACL. When a file is copied from one file system toanother (or from one operating system to another), some of the controlinformation may be lost due to compatibility issues. Further, ACL isdifficult to apply to users outside of a company's file system (e.g., acustomer). Finally, as with the operating system example above, ACL iscapable of controlling file accesses by a user but is not capable ofcontrolling file accesses by a particular application program or at aparticular time or location.

Applications such as document management systems require a user to checka document in and out of a library system. Once the document has beenchecked out, it can be distributed and modified in any manner. Thismeans that there is no control over how a document is used once thedocument leaves the document management system.

BRIEF SUMMARY OF THE INVENTION

A method and apparatus for controlling document access and applicationusage using centrally managed rules. The rules are stored andmanipulated in a central rule database via a rule server. Policyenforcers are installed on client systems and/or on servers and performdocument access and application usage control for both direct userdocument accesses and application usage, and application programdocument accesses by evaluating the rules sent to the policy enforcer.The rule server decides which rules are required by each policyenforcer. A policy enforcer can also perform obligation and remediationoperations as a part of rule evaluation. Policy enforcers on clientsystems and servers can operate autonomously, evaluating policies thathave been received, when communications have been discontinued with therule server.

In an embodiment, the invention is a method of controlling applicationusage in a number of computers. The method includes: evaluating anapplication program operation on a first computer, where the evaluatingstep evaluates at least one rule pertaining to the application programoperation, the at least one rule is among a number of rules stored onthe first computer, and the at least one rule contains at least oneexpression used by the evaluating step to control application programoperation. Further, the steps include communicating with a secondcomputer as indicated by the at least one rule; and confirming on thefirst computer that the second computer has an ability to interact withthe evaluating step.

In another embodiment, the invention is a method including: evaluating adocument access operation on a first computer, where the evaluating stepevaluates at least one rule pertaining to the document access operation,the at least one rule is among a number of rules stored on the firstcomputer, where and the at least one rule contains at least oneexpression used by the evaluating step to control document accessoperation. Further, the steps include communicating with a secondcomputer as indicated by the at least one rule; and confirming on thefirst computer that the second computer has an ability to interact withthe evaluating step.

In another embodiment, the invention is a method of controllingapplication usage and document access in a number of computers, themethod including: evaluating at least one rule pertaining to anoccurrence of an event, the at least one rule is among a number of rulesstored on a first computer, and the at least one rule contains at leastone expression used by the evaluating step to decide whether to performan action. Further, the steps include communicating with a number ofcomputers as indicated by the at least one rule; and instructing thenumber of computers to perform an action as indicated by the at leastone rule.

In another embodiment, the invention is a method of controllingapplication usage and document access in a number of computers, themethod including: evaluating at least one rule pertaining to anoccurrence of an event, where the at least one rule is among a number ofrules stored on a first computer, and the at least one rule contains atleast one expression used by the evaluating step to decide whether toperform an action. Further, the steps include communicating with anumber of computers as indicated by the at least one rule; andinstructing the number of computers to evaluate at least one rule.

In another embodiment, the invention is an apparatus for controllingapplication usage in a number of computers including: a module forevaluating an application program operation on a first computer, wherethe evaluating module evaluates at least one rule pertaining to theapplication program operation, the at least one rule is among a numberof rules stored on the first computer, and the at least one rulecontains at least one expression used by the evaluating module tocontrol application program operation. Further, the apparatus includes amodule for communicating with a second computer as indicated by the atleast one rule; and a module for confirming on the first computer thatthe second computer has an ability to interact with the evaluatingmodule.

In another embodiment, the invention is an apparatus for controllingapplication usage and document access in a number of computersincluding: a module for evaluating at least one rule pertaining to anoccurrence of an event, where the at least one rule is among a number ofrules stored on a first computer, and the at least one rule contains atleast one expression used by the evaluating module to decide whether toperform an action. Further, the apparatus includes a module forcommunicating with a number of computers as indicated by the at leastone rule; and a module for instructing the number of computers toperform an action as indicated by the at least one rule.

In another embodiment, the invention is an apparatus for controllingapplication usage and document access in a number of computersincluding: a module for evaluating at least one rule pertaining to anoccurrence of an event, where the at least one rule is among a number ofrules stored on a first computer, and the at least one rule contains atleast one expression used by the evaluating module to decide whether toperform an action. Further, the apparatus includes a module forcommunicating with a number of computers as indicated by the at leastone rule; and a module for instructing the number of computers toevaluate at least one rule.

Other objects, features, and advantages of the present invention willbecome apparent upon consideration of the following detailed descriptionand the accompanying drawings, in which like reference designationsrepresent like features throughout the figures.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example, and not by wayof limitation, in the figures of the accompanying drawings and in whichlike reference numerals refer to similar elements and in which:

FIG. 1 is a block diagram that illustrates a policy server thatcentrally manages policies that are used by workstations and serversaccording to the invention;

FIG. 2 is a block diagram that illustrates minimal embodiments thatutilize a number of workstations each with policy enforcers installed ora number of document servers each with policy enforcers installedaccording to the invention;

FIG. 3 is a block diagram that illustrates a number of workstations anddocument servers with policy enforcers installed and coexist within asystem according to the invention;

FIG. 4 is a block diagram that illustrates internal components of apolicy server according to the invention;

FIG. 5 is a block diagram that illustrates internal components of anintelligence server according to the invention;

FIG. 6 a is a block diagram that illustrates an interceptor and aconsequence applicator in a Policy Enforcement Point (PEP) moduleaccording to the invention;

FIG. 6 b is a block diagram that illustrates a policy enforcer thatimplements interception and enforcement functions using a PEP plug-inarchitecture according to the invention;

FIG. 6 c is a block diagram that illustrates a policy engine running ina process separate from a policy enforcer according to the invention;

FIG. 7 is a block diagram that illustrates a policy engine module'spolicy input and evaluation output according to the invention;

FIG. 8 is a block diagram that illustrates a policy enforcer installedon a workstation that controls access to files on the workstationaccording to the invention;

FIG. 9 is a block diagram that illustrates a policy enforcer on a clientcomputer that controls the client computer's access to files on a fileserver according to the invention;

FIG. 10 a is a block diagram that illustrates a policy enforcer on afile server implemented in operating system kernel that controls accessto files on the file server according to the invention;

FIG. 10 b is a block diagram that illustrates a policy enforcer on afile server that controls access to files on the file server accordingto the invention;

FIG. 10 c is a block diagram that illustrates a policy enforcer on afile server with a policy engine running on a separate computer thatcontrols access to files on the file server according to the invention;

FIG. 11 is a block diagram that illustrates a policy enforcer on aworkstation enforcing access control to a nonfile system objectaccording to the invention;

FIG. 12 is a block diagram that illustrates a policy enforcer on aworkstation applying an obligation action for a file access operationaccording to the invention;

FIG. 13 is a block diagram that illustrates a policy enforcer on aworkstation applying a remediation action for a file access operationaccording to the invention;

FIG. 14 is a diagram that illustrates a policy enforcer on a virtualfile server that controls a client computer's access to files on a fileserver or a network attached storage device behind a virtual file serveraccording to the invention;

FIG. 15 is a diagram that illustrates a policy enforcer on a filegateway that controls the client computer's access to files on a fileserver or a network attached storage device across the wide area networkaccording to the invention;

FIG. 16 is a block diagram that illustrates a policy enforcer on aworkstation that controls application usage on the workstation accordingto the invention;

FIG. 17 is a block diagram that illustrates a policy enforcer on aworkstation that controls application usage on the workstation accordingto the invention;

FIG. 18 is a block diagram that illustrates a policy enforcer on aworkstation that controls application usage on nonfile system objects atthe workstation according to the invention;

FIG. 19 is a block diagram that illustrates a policy enforcer on aworkstation that combines application usage and document access controlon files at the workstation according to the invention;

FIG. 20 is a block diagram that illustrates a policy enforcer on aworkstation that uses an obligation to implement a regulatory compliancerequirement according to the invention;

FIG. 21 is a block diagram that illustrates a policy enforcer on aworkstation that controls application usage on nonfile system objects atthe workstation according to the invention;

FIG. 22 a is a block diagram that illustrates a document server policyspecifying information to be obtained from a point-of-use policyenforcer during policy evaluation according to the invention;

FIG. 22 b is a block diagram that illustrates a workstation policyenforcer transmitting information obtained at a point-of-use to adocument server policy enforcer according to the invention;

FIG. 23 is a block diagram that illustrates a file server policyenforcer allows access to a file only if a workstation policy enforceris detected on a client computer that requested the file according tothe invention;

FIG. 24 is a block diagram that illustrates an embodiment where a copyoperation is performed from a file server to a destination file serverand the destination file server does not have a policy enforcer whichresults in a denial of the operation according to the invention;

FIG. 25 is a block diagram that illustrates a workstation policy engineneeding information about a recipient of a message that is unavailableat its location and the workstation policy engine delegating evaluationof the policy to a policy decision server according to the invention;

FIG. 26 is a block diagram that illustrates a document server policythat requires copies of a file on all workstations be deleted when themaster copy on a document server is deleted according to the invention;and

FIG. 27 is a block diagram that illustrates a computer system upon whichan embodiment may be implemented.

DETAILED DESCRIPTION OF THE INVENTION

A method and apparatus for an information management system with two ormore interactive enforcement points is described. In the followingdescription, for the purposes of explanation, numerous specific detailsare set forth in order to provide a thorough understanding of thepresent invention. It will be apparent, however, to one skilled in theart that the present invention may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to avoid unnecessarily obscuring thepresent invention.

Embodiments are described in this application according to the followingoutline:

1.0 General Overview

2.0 Structural and Functional Description

2.1 A Centrally Managed Policy System

2.2 Policy Creation and Management

2.21 Policy Server

2.22 Intelligence Server

2.3 Policy Enforcers

2.4 Example Scenarios

3.0 Implementation Mechanisms-Hardware Overview

4.0 Extensions and Alternatives

1.0 General Overview

Based on the foregoing, there is a clear need for a system that providesfor the control of access to files at both the user and applicationprogram levels. Additionally, the system would allow a systemadministrator to centrally manage access policies for files inworkstations and file servers. There is a further need for a system thatprovides for the control of access to nonfile system objects.

An embodiment of the invention centrally manages policies (or rules)pertaining to the control of access to documents and usage ofapplication data and functions. The policies are stored and manipulatedby a policy administrator or user in the policy database via a policyserver. The policy server is an intelligent system that has the abilityto decide if a single or multiple policies or subset of policies arerequired by each policy enforcer. The policy server distributes thepolicies to each policy enforcer.

Policy enforcers are installed on client systems at the operating systemlevel or in application programs (e.g., application programs such asMicrosoft Word, Microsoft Excel, SAP Frontend, enterprise resourceplanning client applications, customer relationship management clientapplications, Internet Explorer, Mozilla Firefox, Windows Explorer,Notepad, Windows Messenger, Yahoo Messenger, Microsoft Outlook, WindowsMedia Player, Remote Assistance, FTP client, Java JVM, DOS commandshell, DOS programs, and other third party system utilities) on theclient system to provide document access and application usage controlat the point-of-use. They can also be installed on servers at theoperating system level or in an application program on the server toprovide protection to the documents on the server.

Policy enforcers are able to perform document access and applicationusage control for both direct user document accesses and applicationusage, and application program document accesses and data usage. Adocument includes any of: a file, a Web page, an e-mail message, adiscussion thread, an on-line report, results of a database query, anon-line form, a bitmap, a file system object, a data object managed by adocument management system, a data object managed by a contentmanagement server, a data object in a product life cycle managementsystem, a source code file or a code fragment managed by a source codemanagement system, a data object managed by a configuration managementsystem, a data object managed by a project management system, a dataobject in an enterprise resource planning system, a data object in acustomer relationship management system, a data object managed and/orserved by a portal server, a data object served by a Web server, a dataobject managed and/or served by any application server, or any unit ofinformation content stored on volatile or nonvolatile memory.

The client systems and servers can operate autonomously, evaluatingpolicies that have been previously received, when communications havebeen discontinued with the policy server. For example, a policy enforcerinstalled on a laptop computer continues to enforce policies installedon or distributed to the laptop computer while the laptop computer isnot connected to a network, or the laptop computer is connected to anetwork but cannot communicate with a policy server. In another example,a policy enforcer installed on a document server continues to enforcepolicies installed on or distributed to the document server whilecommunication to a policy server is interrupted.

A client system can be a desktop computer, laptop computer, personaldigital assistant (PDA), smart phone, thin clients (e.g., HPConsolidated Client Infrastructure clients and Wyse terminals), aninstance of client operating environment running on a terminal server(e.g., Microsoft Terminal Server or Citrix MetaFrame), a guest operatingsystem running on a virtual machine (e.g., VMWare Workstation orMicrosoft Virtual Server), a server making document access orapplication usage request (acting as a client in the context of therequest), information kiosk, Internet kiosk, and any computing deviceand computing environment from which a document access or applicationusage request originates, etc. A server can be a file server, networkattached storage (NAS), virtual NAS device (e.g., a NAS switch such asAcopia Adaptive Resource Switch, NeoPath File Director, or RainfinityRainStorage), edge file gateway (e.g., a wide area file service (WAFS)device such as Cisco File Engine series appliances, Tacit ISharedproducts, or Riverbed Steelhead appliances), Web server, e-mail server,document management system, content management system, portal server,database server, or any other document repository.

In addition to providing control or protection, a policy enforcer canalso perform obligation and remediation operations as a result of adocument access or application usage attempt (whether successful or not)as dictated by the active policy.

The policies are evaluated when an action is taken by a user or anapplication to access a document, invoke a function in an applicationprogram, or operate on application data object or fragment. The actionis intercepted (or detected) and relevant policies are applied beforethe action is allowed to be carried out. The policies that a policyenforcer can handle can be defined based on the type of action, user,user group, user attribute (e.g., department, role, project orstatus—full-time, part-time, or consultant, user's business function),computer, type of computer (e.g., a laptop or smart phone), group ofcomputers (e.g., “finance department computers”), application program(e.g., Word or Outlook), type of application program (e.g.,spreadsheet), application module (e.g., SAP CRM module or Oracle Financeaccounting module), location (e.g., New York office vs. London office),connectivity (including access mechanism and bandwidth; e.g., LAN, WLAN,VPN, Bluetooth, Internet, DSL, ISDN, dialup, Remote Desktop Protocol(RDP), Virtual Network Computing (VNC) protocol, latency, securepoint-to-point, 56 k, broadband, 100 Mb and 1 Gb), time of day, day ofthe week, file path, file name, file size, file timestamp, file owner,file properties, document type (e.g., file or e-mail), document format(e.g., xls file or pdf file), document identifier, documentclassification, document characteristics (e.g., a document contains awatermark), document content, database query, database query result set,database query result set properties, metadata, and more. A policyenforcer can interpret any combination of parameters.

In other aspects, the invention encompasses a computer apparatus and acomputer-readable medium configured to carry out the foregoing steps.

2.0 Structural and Functional Description

2.1 A Centrally Managed Policy System

An embodiment of the invention centrally manages policies (or rules)pertaining to the controlling of access to documents and usage ofapplication data and functions. Documents can be file system or nonfilesystem objects. For example, a file system object may be an Excelspreadsheet. A nonfile system object may be an e-mail message or datadelivered to an SAP Frontend client application (e.g., information aboutan employee) by an SAP human resource module running on a server. Adocument encompasses objects such as a file, an e-mail message, a Webpage, an on-line report, an on-line form, a discussion thread, a resultset generated by a database query, a bitmap, a file system object, adata object managed by a document management system, a data objectmanaged by a content management server, a data object in a product lifecycle management system, a source code file or a code fragment managedby a source code management system, a data object managed by aconfiguration management system, a data object managed by a projectmanagement system, a data object in a enterprise resource planningsystem, a data object in a customer relationship management system, adata object managed and/or served by a portal server, a data objectserved by a Web server, a data object managed and/or served by anyapplication server, or any unit of information content stored onvolatile or nonvolatile memory. The policies allow policy enforcers(also referred to as agents) to make decisions on whether to allow ordeny access to a particular document, execute a particular applicationfunction, or operate on a particular application data object orfragment. The policy enforcers perform document access and applicationusage control for operations performed in response to direct user actionand execution of application program logic.

Referring to FIG. 1, policies are created and managed by a policy server101. As discussed below, a policy may define to whom and under whatcondition(s) access to a document is granted or denied. The policies arestored and manipulated by the policy author and policy administrator inthe policy repository 102. Policies and/or subsets of policies aretransmitted to workstations 103 and document servers 105 to controllocal and remote document accesses and application usage. A workstationcan be a desktop computer, laptop computer, personal digital assistant(PDA), smart phone, thin clients (e.g., HP Consolidated ClientInfrastructure clients and Wyse terminals), an instance of clientoperating environment running on a terminal server (e.g., MicrosoftTerminal Server or Citrix MetaFrame), a guest operating system runningon a virtual machine (e.g., VMWare Workstation or Microsoft VirtualServer), a server making document access or application usage requests(acting as a client in the context of the request), information kiosk,Internet kiosk, and any computing device and computing environment fromwhich a document access or application usage request originates. Adocument server can be a file server, network attached storage (NAS),virtual NAS device (e.g., a NAS switch device such as Acopia AdaptiveResource Switch, NeoPath File Director, or Rainfinity RainStorage), edgefile gateway (e.g., a wide area file service (WAFS) device such as CiscoFile Engine series appliances, Tacit IShared products, or RiverbedSteelhead appliances), Web server, e-mail server, document managementsystem, content management server, portal server, database server, orany other document repository.

A policy enforcer can be installed on a workstation 103 to providedocument access and application usage control at the point-of-use. Thepolicies can be stored locally on the workstation. Point-of-use controlprevents unauthorized access to documents anywhere on the network andprevents unauthorized application usage and operations on applicationdata or usage of application functions. One may think of point-of-useaccess control as building a firewall around a user.

Similarly, a policy enforcer can be installed on a document server 105(e.g., a file server or e-mail server) to provide protection to thedocuments on (accessible by or managed by) the document server.Server-based protection prevents unauthorized access to documents in aparticular repository (or on a server) from any computer on a network,in other words, building a firewall around a server. Besides, anapplication server policy enforcer such as Microsoft Exchange policyenforcer can also control usage of application data and applicationfunctions (e.g., copying an e-mail message, deleting a contact ormodifying a calendar entry).

The control and protection functions can be achieved either through onepolicy or multiple policies defined centrally. The policy server 101 isan intelligent system that has the ability to decide if a single,multiple policies, or a subset of policies are applicable to each policyenforcer. At least a subset of all policies defined is distributed toeach policy enforcer.

Controlling document access can have different meanings when operatingon different document types. For example, if a document type is a file,then document accesses are file accesses that includes: opening/readinga file, reading a file when connected using VPN, opening a file at aparticular time of a day, writing/saving a file, deleting a file,reading a file's permission (or security setting), changing a file'spermission, reading a file's attribute, or changing a file's attribute.Another example is when a document type is an e-mail message on a mailserver then document access refers to application program internaloperations that can include: opening an e-mail, deleting an e-mail,reading an e-mail's attribute, or changing an e-mail's attribute.

Controlling application usage can have different meanings when appliedto different applications. For example, if an application is a wordprocessor, then application usage includes: creating a file, opening afile, saving a file, saving a document as a different file, exporting orconverting a file to a different format, printing a file, sending a fileto a recipient via e-mail, publishing a file in a shared folder, cuttingdata to a clipboard, pasting data from a clipboard, performing adrag-and-drop operation, adding a macro or a script to a document, ormodifying a macro or a script in a document. In another example, if anapplication is a mail client, then application usage includes: creatingan e-mail, opening an e-mail, copying an e-mail, moving an e-mail,archiving an e-mail, saving an e-mail to a file, deleting an e-mail,sending an e-mail, forwarding an e-mail, attaching a file to an e-mail,cutting data to a clipboard, pasting data from a clipboard, performing adrag-and-drop operation, or changing e-mail attributes.

In yet another example, if an application is an enterprise resourceplanning (ERP) application, application usage includes: creating aquote, converting a quote to an order, viewing customer information,viewing an order, viewing product pricing and discounts, viewing salesdata, viewing reports, or viewing employee information.

To control application usage and document access, a policy enforcer mayexert control on a computer system at two functional levels. At a firstfunctional level, a policy enforcer detects and controls applicationoperations thereby effecting application usage control. For example,when application usage control is opening a file in Microsoft Word, apolicy enforcer detects and controls application operation “File|Open”menu operation in Microsoft Word. At a second functional level, a policyenforcer detects and controls document access operations therebyeffecting document access control. For example, when document accesscontrol is applied to the same file open action in Microsoft Word, apolicy enforcer detects and controls operating system library operationsfopen( ), open( ) and FileOpen( ) where these operations are typicallyrequired to open a file on local file system or on a file server.

Among the application operations that a policy enforcer may exertcontrol, some application operations may translate into one or moredocument access operations while other application operations may notperform any document access operation. For example, a user action ofopening a file typically translates into an application operation and adocument access operation. In an other example, a user action of sendingan e-mail message in Microsoft Outlook typically translates into anapplication operation (e.g., “File|Send”) an document access operation(e.g. a send function in messaging application programming interface(MAPI)). In yet another example, a user action of pasting data from aclipboard to a document typically generates an application operation butno document access operation.

To control document access and application usage, a policy enforcer maycontrol user interface elements such as visual and input elements of anapplication program, commands and functionalities of an applicationprogram, and information presented to a user. For example, a visualelement of an application program includes any of: a menu, a menu item,a button, a list box, a list item, a check box, a tab, a scroll bar, aslider, an icon, an image or a hypertext link. An input element of anapplication program includes any of: a key event handler, a mouse eventhandler, or any event handler associated with a visual element.

An application program may support a large number of commands. A commandcan be invoked by selecting a menu item, pressing a button (shown on ascreen), pressing one or more keys, or pressing one or more mousebuttons. A command can also be invoked by a macro or script, or invokedby a code module that calls a function (or method) in an applicationprogram interface (API) library. For example, a command can perform atask such as opening a file, sending an e-mail message, editing a cellin a spreadsheet, editing a macro, changing text format, or more.

A function of an application program generally maps to a function ormethod in a high level programming language. For example, a function inan application program may correspond to a command such as saving afile, sending an e-mail message, or editing a cell formula in aspreadsheet. A function may also represent an internal applicationprogram operation such as a call to operating system library functionfopen( ).

If information to be displayed contains personal information such as asocial security number, personal identification number (PIN) or accountbalance, then controlling application usage includes: filtering out orobscuring the personal information.

If information to be displayed contains actionable data or objects suchas a button, a hypertext link, or a clickable image, then controllingapplication usage includes: disabling the button, removing the hypertextlink, or removing the link associated with the image.

In addition to providing control or protection, a policy enforcer canalso perform obligation and remediation operations (described below) asa result of a document access or application usage attempt (whethersuccessful or not) as dictated by the active policy, or policies.

Different levels of control and protection are achieved by distributingpolicy enforcers to workstations and/or document servers. For example,by using workstation policy enforcers only, such as on workstation 103,one can achieve document access and application usage control thatcovers access to documents on local disks 104 (i.e., local files),access to documents on a protected document server 105 (i.e., protectedby a document server policy enforcer), access to documents on anunprotected document server 106, and application program functions forapplications running on the workstation 103.

When only document server policy enforcers are used, such as on documentserver 105, one can achieve document access protection and applicationusage control for documents on protected servers when the documents areaccessed from workstations with a workstation policy enforcer installed103 and workstations without a workstation policy enforcer installed107.

When both workstation policy enforcers and document server policyenforcers are installed, the combined benefit of both installations asdescribed above is achieved.

The policy server 101 allows policies to be centrally managed andautomatically distributed and updated to policy enforcers. Distributionis achieved through pushing policies to policy enforcers and/or pullingpolicies from the policy server 101 by policy enforcers. Policies arenot tied to (or stored with) documents. The policies are evaluated whenan action is taken by a user (or an application) to access a document oroperate on application data. The action is intercepted and relevantpolicies are applied before the action is allowed to be carried out.

The policies that a policy enforcer can handle can be defined based onthe type of action, user, user group, user attribute (e.g., department,role, project or status (e.g., full-time, part-time, or consultant),user's business function), host, group of computers (e.g., “financedepartment computers”), type of computer (e.g., laptop or smart phone),application program (e.g., Word or Outlook), type of application program(e.g., word processor or spreadsheet), application module (e.g., SAP CRMmodule or Oracle Finance accounting module), location (e.g., New Yorkoffice vs. London office), connectivity (including access mechanism andbandwidth; e.g., LAN, WLAN, VPN, Bluetooth, Internet, DSL, ISDN, dialup,Remote Desktop Protocol (RDP), Virtual Network Computing (VNC) protocol,latency, secure point-to-point, 56 k, broadband, 100 Mb and 1 Gb), timeof day, day of the week, file path, file name, document size, documenttimestamp, document owner, document properties, document type (e.g.,file and e-mail), document format (e.g., XLS, PDF, or HTML format),document identifier, document classification (e.g., a confidentialdocument or a financial report), document characteristics (e.g., adocument contains a watermark), document content (e.g., a documentcontains a social security number), database query, database queryresult set, database query result set properties, metadata, and more.Not all of these parameters are required. A policy enforcer caninterpret almost any combination.

2.2 Policy Creation and Management

Referring to FIG. 2, minimal embodiments are shown that utilize a numberof workstations 204 each with policy enforcers 205 installed or a numberof document servers 206 each with policy enforcers installed 207. Theauthoring and administration module 201 is a client application runningon a workstation. It provides the user interface to create, test,publish, modify, delete, and deploy policies, manage systemconfiguration, monitor system health, and view document access activity,application usage activity and policy enforcement activity. Theauthoring and administration module 201 is connected to the controlcenter 202 which is responsible for policy life cycle management, systemmanagement, log data management and maintaining a central policy and logrepository 203.

The policy builder 208 acts as an interface to the policy server 211 andmakes it simple for the policy author and policy administrator tocreate, test, publish, and deploy policy rule statements. The main tasksthat can be performed with policy builder 208 are policy authoring andpolicy administration. Policy authoring functions include creating apolicy, modifying a policy, testing a policy, publishing a policy (i.e.,making a new policy available for deployment and modifications on anexisting policy available for redeployment), and retiring a policy.Policy administration functions include maintaining policy relatedconfigurations and deploying policies to policy enforcers.

The management console 209 acts as an interface to management server 212and is a user interface for managing system configuration and monitoringthe health of the system.

The policy server 211 transfers policies to the policy enforcers 205,207 through a push and/or pull mechanism. The policy server 211determines what policies are to be delivered to the policy enforcers205, 207 and when policies are to be updated on the policy enforcers205, 207. The policy enforcers 205, 207 report status logs to the logserver 213 such as what documents were accessed or application programfunctions were used and by whom (described below) and what enforcementactions have been taken.

The reporting module 210 is a user interface element that interacts withthe log server 213 to provide report generation and data analysisfunctions. The policy author and policy administrator can use thereporting module to view document access activity, application usageactivity and policy enforcement activity and investigate cases ofpotential information misuse or effectiveness of a policy.

Referring to FIG. 3, a more complex embodiment is shown where a numberof workstations 204 and document servers 206 have policy enforcers 205,207 installed and coexist within the system. The interaction between thepolicy builder 208, the policy server 211, and the policy repository 303have been described above.

The reporting and analysis module 307 acts as a user interface to theintelligence server 308 for displaying reports and results from dataanalysis functions. The reporting module 210 allows the policy authorand policy administrator to query and view document access activity,application usage activity and policy enforcement activity. The analysistool 312 interacts with the intelligence server 308 to perform dataanalysis which includes event correlation and trend analysis. The policyauthor and policy administrator can use the capabilities offered by thereporting and analysis module 307 to analyze effectiveness of a policy,document access and application usage activity on a document or on aserver, policy enforcement activity, and investigate cases of potentialinformation misuse. The intelligence server 308 provides threefunctions: log services, integration with external data sources, anddata analysis.

The log and intelligence repository 309 is used by the intelligenceserver 308 to store log data coming from the policy enforcers 205, 207,data from external sources that support event correlation, and datagenerated by the data analysis services. The log and intelligencerepository 309 is normally implemented as one or more relationaldatabases or sets of log files.

The Light Weight Directory Access Protocol (LDAP) server 305 and LDAPrepository 306 provide user, user group and host information to thepolicy server 211 to assist in composing policy and assembling policysubsets and provide information to intelligence server 308 to supportreport generation and data analysis. Note that LDAP servers are normallydeployed in organizations to provide authentication service and are notcritical for the operation of the embodiment.

A management server 212 is responsible for system configuration (notpolicy configuration), system health monitoring, and system control. Itprovides centralized management of all the components in the system. Themanagement server 212 provides a single location to view system status,modify system configurations, and manage policy author and policyadministrator user accounts. The management console 209 is a userinterface for system management via the management server 212.

The management server 212 provides services such as: monitoring allother system components including policy servers, intelligence servers,communication servers and policy enforcers; displaying the status ofeach component; registering new policy enforcers; maintaining a registryof all policy enforcers; managing the configuration for all servers; andmanaging configuration profiles for policy enforcers.

The communication server 304 is responsible for directing traffic amongthe policy server 211, intelligence server 308, management server 212and all policy enforcers 205, 207. The communication server 304 brokerscommunications between policy enforcers 205, 207, and other servers,including distribution of configuration profiles, policy deployments,and the transfer of log data to the intelligence server 308. Thecommunication server 304 provides a scalable communication service suchthat the system can support a large number of workstations 204 anddocument servers 206.

2.21 Policy Server

Referring to FIG. 4, the internal components of the policy server 401are shown. The policy server 401 is responsible for policy management,including policy authoring, life cycle, and deployment. The policyserver 401 maintains a policy repository 203, 303 for storing policies.A system typically has at least one policy server 401 and can containmultiple policy servers in order to support a large number of policybuilders 208 and policy enforcers 205, 207. The policy server 401provides the following functions: policy authoring; policy accesscontrol; policy life cycle management; policy management; and policydeployment.

Policy authors and policy administrators access the policy server 401through the policy builder application 208 which provides a graphicaluser interface to author policies and manage the policy life cycle fromcreation through retirement. Authored policies are stored in a centralpolicy repository 203, 303.

The policy life cycle module 402 provides policy life cycle support thatcovers policy development, deployment and management. For example,policy development uses information about users, user groups, roles ofusers, user's business functions, actions, hosts, applications, anddocument resources being supported to compose or update a policy. Anenvironment is also provided to support editing (composition), staging(testing) and deployment of policies.

The policy engine 403 is responsible for policy evaluation (orexecution). It helps validate a policy and it is part of the stagingenvironment. Additionally, the policy engine 403 can be set up tosupport proxy policy evaluation. A proxy policy evaluation request maybe generated by a policy enforcer under two situations:

(1) A workstation policy enforcer 205 (or document server policyenforcer 207) does not have a policy engine. A policy engine proxy inthe policy enforcer relays policy evaluation requests from policyenforcers to a remote policy engine 403 in a policy server 401 or policydecision server (dedicated to make policy decisions) that offers policyevaluation services.

(2) A workstation policy enforcer 205 (or document server policyenforcer 207) does have a policy engine, but the local policy enginedecides that the local policy subset is not sufficient to make a policydecision and should delegate policy evaluation to a policy engine thathas access to a wider policy scope, or access to relevant data. A proxypolicy evaluation request is made by a local policy engine to a remotepolicy engine 403 in the policy server 401 or a policy decision serverto complete the policy evaluation.

A policy optimizer 404 is responsible for optimizing the run-timeperformance of policies. It can be used to optimize policies prior todeploying to a policy enforcer 205, 207. The policy optimizer 404 is notrequired for a minimal system to operate.

The policy deployment module 405 handles deployment of policies topolicy enforcers 205, 207, policy decision servers (not shown) and thelocation where a policy engine resides. During policy deployment, thepolicy deployment module may invoke a policy optimizer 404 to optimize aset of polices (the set of policies can be a full set or subset ofpolicies on the policy server). The deployment function may be initiatedby a policy server (e.g., via a push operation) or a policy enforcer ortarget (e.g., via a pull operation). In either operational mode, a fullset or a subset of policies is transmitted to a target.

In a policy system architecture that distributes full sets of policiesto all policy enforcers, the policy deployment module 405 takes acomplete set of policies and sends it to a policy enforcer 205, 207.

In a policy system architecture that organizes policies based on thepolicy enforcer 205, 207 that the policies target, the policy deploymentmodule 405 receives or locates a policy enforcer's information anddelivers the set of policies defined for that policy enforcer 205, 207.

The deployment module can deploy policies in different forms dependingon the capability of a policy engine at a target. For example, the setof policies that are transmitted from a policy server to a policyenforcer (or target) may comprise of combinations of the followingforms:

(1) ASCII text.

(2) Binary (e.g., code or data).

(3) XML (e.g., in Extensible Access Control Markup Language—XACMLformat).

(4) Translated and/or compiled form including policies represented inbinary form, polices translated into tables (in binary or text form) orpolicies translated into programming language (such as XML, Java, C#,Perl or Python in source code format or compiled binaries).

2.22 Intelligence Server

Referring to FIG. 5, the internal components of the intelligence server501 are shown. The intelligence server 501 provides summary, trend, anddetailed analysis of document access activity, application usageactivity and policy enforcement activity. The intelligence server isaccessed using the reporting and analysis 307 software tool that allowsbusiness users to create graphical reports to demonstrate compliance,understand application usage, and investigate cases of informationmisuse. The intelligence server 501 analyzes comprehensive log datacaptured in a centralized repository, thereby providing insight andaccountability for information handling. Policy authors can use datacaptured by the intelligence server 501 to analyze the effectiveness ofa policy. Policy enforcers can utilize the log data and informationderived from the log data to support policy evaluation.

The log services module 502 is responsible for collecting and managinglog data coming from policy enforcers 205, 207. Log data is normallygenerated or collected by a policy enforcer or explicitly by a policyvia a log handler (an obligation handler) in a policy enforcer 205, 207.

The integration services module 503 is responsible for capturing eventsthat occur outside of the system and providing access to an externaldata sources when needed. It may collect data produced by otherapplication programs outside of the system or import data stored outsidethe system into a log and intelligence repository 309. The integrationservices module can also export log and analysis data to applicationprogram or repository outside of the system. It allows the data analysismodule 505 to correlate document access activities, application usageactivities and policy enforcement activities with events that occurexternally to the system.

The reporting module 504 is responsible for providing support to thereporting and analysis tool 307. Its main function is report generation.

The data analysis module 505 provides data analysis functions such asevent (or log) correlation. For example, one of the functions of theevent correlation engine in the data analysis module 505 is to correlateseparate events that occur within a policy enforcer 205, 207 or acrossmultiple policy enforcers 205, 207 to identify trends, repetitions,frauds, hacking attempts and other attacks, bad policy designs, and badpractices by users. The data analysis module 505 can provide severaltypes of analyses:

(1) Summary Analysis—document access activity, application usageactivity or policy enforcement activity summarized by user, document,host, policy, location, time (e.g., day or week), organization, andmore.

(2) Trend Analysis—document access activity, application usage activityor policy enforcement activity for a given period of time.

(3) Detailed Event Forensics—detailed listing of activities for specificuser actions or policy enforcement actions. Detailed reports showingevent-level details for document access activity, application usageactivity or policy enforcement activity. Compliance officers can useevent forensics to investigate specific incidents of information misuse.

2.3 Policy Enforcers

A policy enforcer provides three key functions: interception (ordetection), decision, and enforcement.

Interception refers to a function of detecting certain operations (e.g.,carried out through altering normal code execution that implements theoperation) in an existing application program or operating system toallow the operations to be examined by a policy enforcer before theoperation is carried out. Alternatively, interception may refer to afunction in an application program or operating system (e.g., the logicis implemented at development time) where the function affectsexamination of an operation by a policy enforcer before the operation iscarried out. For example, the function in an application program is aprocedure call to a policy enforcer application program interface (API)library.

Decision refers to a process of evaluating zero or more policies (orrules) relevant to an intercepted (or detected) operation and determineif the operation should be carried out, and if additional action(s) needto be performed.

The enforcement function is responsible for implementing the outcome(sometimes called a policy effect) produced by the decision function.For example, if a policy effect is DENY, an operation is blocked.

Interception and enforcement are normally functions of a PolicyEnforcement Point (PEP) and decision is a function of a policy engine(described below). Both the PEP and policy engine are components of apolicy enforcer. In addition, a policy enforcer can carry out audit (orlog) functions, and obligation and remediation tasks (described below).

There can be at least two types of policy enforcers that can exist in asystem to provide a multilayer approach to information control andcompliance enforcement, such as: document server policy enforcers andworkstation policy enforcers. Document server policy enforcers aredesigned to control access to and usage of documents on documentservers. While workstation policy enforcers are designed to controlend-user access to and usage of documents on workstations and documentservers and application usage by end-users at a workstation. Combiningboth types of policy enforcers in an embodiment provides control overdocument accesses from a workstation controlled by a policy enforcer,from a workstation not controlled by a policy enforcer, to a documentserver controlled by a policy enforcer, to a document server notcontrolled by a policy enforcer, and control the usage of information byorganization personnel.

Policy enforcers are responsible for both enforcing policy andcollecting audit information (document access activities, applicationusage activities and policy enforcement activities) for their respectivehost systems. The policy enforcers intercept end-user or system events(or actions) or application usage (e.g., invoking a function in anapplication program and operating on data in an application) that may besubject to document access or application usage control policies. Thecontext of each of these events is provided by a PEP to a policy enginethat is responsible for evaluating policies relevant to the context ofan event. The consequence determined by a policy evaluation iscommunicated back to the PEP which contains application-specific orsystem-specific logic to carry out the enforcement function. If thepolicy evaluation results in the requested event being denied, the PEPtypically terminates the request and returns an error status thatindicates access is denied or the requested action cannot be performed.

Since policy enforcers have access to information regarding documentaccess and application usage, such activity information (or auditinformation) can be logged by a policy enforcer to a local or centraldatabase. The activity data collected by one or more policy enforcerscan be correlated, analyzed, and applied to many applicationsincluding: 1) auditing or compliance; 2) investigation; 3) detectinginformation fraud; 4) detecting information misuse; 5) detectinganomalies; 6) understanding and optimizing resource utilization; and 7)understanding and improving workforce productivity.

The data that is collected by a policy enforcer typically includes acombination of: event(s) (or action(s)), attributes associated with theevent, resources associated with the event, identification of theapplication in which the event occurred (or operation being invoked),under which user account the activity is being carried out, the hostcomputer this event occurred on, and so forth.

Policy Enforcers for Document Servers

Document server policy enforcers are server (e.g., a file server) orserver application program (e.g., a mail server) specific policyenforcers. For example, a file server policy enforcer (discussed below)is designed to protect file resources on (or managed by) the fileserver. In another example, an e-mail server policy enforcer, such as aMicrosoft Exchange Server policy enforcer, controls access to and usageof e-mail and other Microsoft Exchange Server application objects on theserver. In yet another example, a Document Management System (DMS)policy enforcer controls access to and usage of documents stored in aDMS repository and other DMS-specific application objects.

A document server policy enforcer is installed on a server computer(e.g., a file server) or on the computer where a server applicationprogram (e.g., a mail server) is installed. Alternatively, some policyenforcer functions including the policy engine can be distributed to aseparate computer. The interception function carried out by a PEP isserver and server application program specific and can occur inside aserver application program or at the operating system level.

Policy Enforcers for File Servers

A file server policy enforcer is a type of document server policyenforcer. The file server policy enforcer controls access to and usageof (e.g., copy and print) files on file servers. It is installed on afile server machine and enforces document access and/or applicationusage policies as organization personnel interact with the file server.Document access policies control whether users or application programsare allowed to access files and folders on (or managed by) a file serverincluding: create, read, write, delete, copy, move, and rename files;create, open, delete, and rename folders; access and change file orfolder attributes; and create, access, change, rename, and delete linksor shortcuts associate with files or folders. The policy enforcers alsolog accesses to files and folders, and information about eachenforcement event.

The file server policy enforcer monitors network requests for files andalso monitors file system requests. This architecture allows the policyenforcer to evaluate policies based on the greatest amount of contextfor each request, since it can use both network-level and filesystem-level information. Certain file access operations can also beintercepted inside a server application program (e.g., a NFS server) andat the operating system level.

In a specific file system implementation, both a file server policyenforcer and a workstation policy enforcer (described below) aretypically needed to provide thorough protection to the resources managedby the file system. For example, Andrew File System (AFS) uses a clientapplication program to cache file system objects on a workstation. Withonly an AFS server policy enforcer, file system objects cached on aworkstation are not protected. In that case, a workstation policyenforcer can be combined with an AFS server policy enforcer to providecomplete file system resource protection.

The file server policy enforcer is self-monitoring and self-protecting.When it is running, no user or process can modify, delete, or access thepolicy enforcer system files including the binaries, configurationfiles, log files, and policy files. If the policy enforcer is stoppedunexpectedly, it is automatically restarted.

Policy enforcers can be installed on some or all file servers within anenterprise, depending on which file servers contain documents that theorganization wants to enforce document access and/or application usagepolicies on. A file server policy enforcer affects only the file serverwhere it is installed. Alternatively, the policy engine in a policyenforcer can run on a computer different from the server being managed.

The file server policy enforcer is responsible for controlling accessesto and usage of files stored on (or managed by) a file server. It cancontrol accesses to and usage of files on a file server by workstationsthat are controlled or not controlled by policy enforcers.

Policy Enforcers for Workstations

The workstation policy enforcer controls end-user usage of documents onworkstations. The policy enforcer is installed on a workstation andcontrols access to and usage of documents, whether those documents arestored on the workstation or remotely. The policy enforcer detects (orintercept) document access and application usage activity for eachapplication running on the workstation. Detection can occur inside anapplication program or at the operating system level.

Usage policies control whether users of that workstation are allowed toperform various actions such as sending, printing, or copying documents.Usage policies can also apply to application data to controlcut-and-paste, drag-and-drop, allowing only a particular group of usersto modify a particular spreadsheet formula, restricting edits to macrosor scripts by a user, restricting edits to a specific region in adocument by a user, restricting certain application functions based onthe type of connectivity (such as VPN), restricting a particular type ofedit to a document based on time, and restricting screen capturefunctions to control any misappropriation of data in a document.

Policy enforcers also collect information about each enforcement eventfor an activity journal or report. The policy enforcer isself-monitoring and self-protecting. When it is running, no user orprocess can modify, delete, or access the policy enforcer's systemfiles, including the binaries, configuration files, log files, andpolicy files.

Policy enforcers can be installed on any number of workstations withinan enterprise. Each policy enforcer affects only the workstation whereit is installed. Policy enforcers may be embedded into a computingdevice like PDA or smart phone. The policy enforcer can also beinstalled on a terminal server (e.g., Microsoft Terminal Server orCitrix MetaFrame Server) to control document access and applicationusage in each client session.

The workstation policy enforcer is responsible for document access andapplication usage control at the point-of-use. It has the ability tocontrol application usage and access to documents stored locally on theworkstation and remotely on document servers. The document servers mayor may not be controlled by policy enforcers. The workstation policyenforcer can also control usage of information at a workstation.

Information Exchange

Policy enforcers have the ability to interact with one another andexchange information in order to perform document access and applicationusage control at their local levels. Information exchange refers to afirst policy enforcer obtaining or collecting information gathered by asecond policy enforcer to assist the first policy enforcer in performinga policy evaluation.

Collaborative policy evaluation through information exchange is a wayfor a policy enforcer to expand the pool of information available to itbeyond its execution environment when it evaluates policies. Without theability to exchange information with a second policy enforcer (ormultiple policy enforcers), a first policy enforcer can only evaluatepolicies based on information available at the first policy enforcer'sexecution environment. Normally, the information at the executionenvironment is information collected at the time of interception,configuration parameters, and external information within the immediateoperating environment (i.e., information obtainable from the operatingsystem and other application programs).

For example, a server policy enforcer typically has no visibility toapplication usage information that is available at a client computer.The server policy enforcer may request the client policy enforcer toprovide specific application usage information so the server policyenforcer can make its decision using that information.

A policy enforcer may have to implement a policy based on informationavailable at another policy enforcer that is normally not available tothe policy enforcer itself. With the information exchange capability, apolicy enforcer can evaluate policies based on information available atother policy enforcers.

A policy enforcer's capabilities can be expanded significantly byworking with other policy enforcers that can provide the informationthat the policy enforcer needs to complete a particular policyevaluation.

The following is a more detailed example illustrating how a file serverpolicy enforcer implements point-of-use policies.

(1) A file server policy enforcer intercepts a file open operation on afile on the file server:

-   -   a) PROBLEM: The file server policy enforcer normally sees only        low level file operations such as open, read, and write. It        cannot derive from the intercepted data what a user intends to        do with the file. In this case, the file server policy enforcer        intercepts a network file operation. The file server policy        enforcer identifies a request to open a file but has no idea        whether a user opened the file for viewing, printing, editing,        copying, or archiving.    -   (b) SOLUTION A: During policy evaluation, if a user's intended        action is communicated to the file server policy enforcer, the        file server policy enforcer can process policies specifying        point-of-use actions such as COPY and PRINT. The ability to        enforce point-of-use action-specific policies enables a document        server policy enforcer to guarantee universal protection of its        managed resources.    -   (c) SOLUTION B: A point-of-use policy enforcer provides a user's        intended action to the file server policy enforcer prior to        policy evaluation at the file server. With the information        provided, the file server policy enforcer can evaluate policies        that specify a point-of-use action such as COPY or PRINT. If a        point-of-use action is not available at the file server during        policy evaluation (e.g., the point-of-use has no policy        enforcer), the file server policy enforcer may take a default        action such as blocking the file open operation or evaluating a        different set of policies to determine a policy effect.

For example, a document server may enforce an application usage policysuch as “no printing of highly sensitive documents” by using a policyexecuted on the document server. The document server policy enforcer,during policy evaluation, can obtain application usage information fromthe workstation policy enforcer that initiated the operation that thedocument server intercepted. Alternatively, application usageinformation can be attached to a request that is intercepted by thedocument server policy enforcer so that application usage information isavailable to the document server policy enforcer during policyevaluation. Note that application usage information is normallyunavailable to a document server policy enforcer because it is typicallyphysically separate from the point-of-use. The application usageinformation is available only at the point-of-use.

In one implementation of information exchange, a document server policyenforcer requests application usage information from another policyenforcer located at the workstation that initiated the operation thatwas intercepted by the document server policy enforcer. In the casewhere a policy enforcer is installed on the workstation, the workstationpolicy enforcer responds with the application usage information relatedto the operation. In the case where a policy enforcer is not installedon the workstation or the document server policy enforcer fails tocommunicate with a policy enforcer on the workstation, policy evaluationat the document server policy enforcer may produce one of: a defaulteffect, evaluating additional policy or policies, or evaluating adifferent set of policies.

In an implementation of information exchange, a policy enforcer storesinformation regarding whether another computer has a policy enforcerinstalled.

In another implementation of information exchange, a policy enforcerqueries a server to determine if another computer has a policy enforcerinstalled.

In yet another implementation of information exchange, a point-of-usepolicy enforcer attaches application usage information associated withan operation to one or more messages (or network packets) destined to adocument server that implements the operation. For example, the messagecan be a network protocol message (e.g., TCP or UDP).

In another example, the message is a network file share protocol message(e.g., CIFS or NFS). In yet another example, the message is anapplication protocol message or is encapsulated in an applicationprogramming interface (e.g., HTTP, SOAP, Microsoft Windows Messaging API(MAPI) or Java Messaging Service (JMS)). When a document server policyenforcer detects the existence of the application usage informationattached to the one or more messages, it extracts the application usageinformation and applies it to a policy evaluation when appropriate.

The application usage information can be:

(1) attached to a message as one or more message headers;

(2) attached to the end of a message;

(3) stored in one or more custom fields (or custom record or customentry) in a message; or

(4) stored in the data as one or more comments in a message.

Transfer of Control

When a user copies a document from a document server to a locationoutside the document server, the source document server loses control ofthe “copy” of a document. To avoid losing control of important documentcontent after a document is copied a document server policy can blockall copy operations unless a policy enforcer at the destination can bedetected. What this means is that a document server allows the copyingof a controlled document only if it is sure the control can bemaintained after the document is copied to another location. A documentserver policy enforcer can further require that a destination policyenforcer provide certain types of protection and enforce certain set(s)and/or version of policies before the document server policy enforcertransfers control of a document.

Transfer of control refers to a policy enforcer in charge of protectingcertain information does not relinquish control of the information (or acopy of it) until the policy enforcer is sure that there is a policyenforcer at the receiving end and that the receiving policy enforcer hassufficient capabilities to continue to protect such information.

To implement transfer of control policies, the following should be inplace:

(1) One or more directives or expressions in a policy to indicate that apolicy enforcer will need to successfully implement the directives orexpressions to satisfy the policy condition.

(2) At least one policy enforcer that is capable of implementing such atransfer of control directives.

(3) Facilities for policy enforcers to communicate so that a policyenforcer can detect the existence of another policy enforcer andexchange information when needed.

In order to implement such policy, a document server policy enforcermust be able to detect if a policy enforcer is running on thedestination workstation (or document server). Note that the destinationof a copy operation does not need to be the workstation that issues thecommand, it can be another computer including a workstation and documentserver. Communication between a policy enforcer at the source and apolicy enforcer at the destination can be direct or indirect through acommunication server.

For example, a user attempts to copy a sensitive document from his/hercompany's protected server to a laptop computer. Without a collaborativepolicy enforcer on the laptop computer, a document server policyenforcer that implements a transfer of control policy will have to blockall copy operations to the laptop computer under all circumstances.

One approach used by document management systems allows any user who hasaccess to a protected document to copy (or checkout) a document knowingthat the system will lose control of the information once the documentis checked out. It is important to note that at the point that adocument is released from a document management system, document controlno longer exists.

In this example, the server policy enforcer will not allow a file to becopied to a laptop unless there is a workstation policy enforcer runningon the laptop. In a more elaborate implementation, the server policyenforcer may ask the workstation policy enforcer for its capability listand policy version number to make sure the workstation policy enforcerhas the right capabilities to protect the information.

A similar example can be applied to the viewing of documents. Forexample, once a document is opened in a word processing software on alaptop, a user may be able to save it to another file, cut-and-pastepart of the document, or make a screen capture of the document. A policyenforcer can disable such functions if they are not desirable.

Delegation

Delegation can occur in three ways:

(1) A decision point delegates policy evaluation to one or more decisionpoints at different locations.

(2) A decision point instructs one or more policy enforcers at otherlocations to carry out a consequence produced by its current policyevaluation.

(3) A decision point posts an event to one or more decision points thatcauses a policy evaluation at the target locations.

The decision point is a location where a policy engine is installed. Forexample, a policy engine can be located in a policy enforcer, a policyserver, or a policy decision server (dedicated to making policydecisions). The delegation of a policy evaluation is initiated from apolicy engine and the target may be the same policy engine (i.e., localdelegation) or another policy engine (i.e., remote delegation). However,the delegation of a consequence application is carried out by a policyenforcer.

There are situations where the information required to support theevaluation of a certain policy is not available to a decision point at aparticular location or a consequence produced by a policy evaluationneeds to be carried out at one or more locations different from wherethe decision point is located.

For example, a decision point can delegate a policy evaluation to adecision point that has access to the proper information required tocomplete the policy evaluation so it can address the informationavailability issue. Note that in some situations, informationavailability issues can also be addressed using the information exchangetechnique described above.

When a policy consequence needs to be carried out at differentlocation(s), it can be handled using the policy consequence delegationtechnique (2). Alternatively, the post event technique (3) can be usedto implement the delegation of a policy consequence.

Delegation is a way for one decision point to ask another decision pointto execute a policy on its behalf—one policy engine asks another policyengine to execute a set of policies. A policy engine does not need to berunning inside a policy enforcer. It may be one of the policy engines ina policy decision server.

(1) Policy evaluation: In the case where information that is availableto other decision point(s) is required to complete a policy evaluation,there are two approaches that can be used: 1) use the informationexchange technique to obtain the needed information to complete thepolicy evaluation; or 2) delegate the policy evaluation (complete orpartial) to a decision point that has access to the information neededto complete the policy evaluation.

(2) Consequence application: In the case that a consequence of a policyneeds to be applied at one or more locations different from where thedecision point is located, a decision point can complete the evaluationof a policy and delegate the consequence application to one or morepolicy enforcers. Delegation of a consequence application can be madesynchronously (waiting from the helper policy enforcer to complete theconsequence application) or asynchronously.

(3) Posting an event: A decision point can post an event to one or moretarget decision point. A posted event is similar to an interceptedoperation except the action specified is often an internal event ratherthan an intercepted action. For example, an intercepted action may beOPEN, SEND and COPY. An internal event may be user defined and caninclude: APPLY-DELETE, FLUSH-BROWSER-CACHE, orDISABLE-INSTANT-MESSENGER. The posted event becomes an action for thetarget decision point and the parameters submitted with the event becomethe resource, subject, and context attributes of the event (or request).The consequence application function discussed throughout can also becarried out using the event posting technique. In addition to theconsequence application function, event posting can be used to trigger apolicy evaluation at any number of decision points. The event postingoperation can be made synchronous or asynchronous. An event to be postedis normally specified in the consequence portion of a policy. Whenposted, such an event will trigger a policy evaluation at the targetlocation. Additional data is normally posted along with the event andmay include: source action, context, resource, and subject information.

For example, in the case of delegating a policy evaluation, when aworkstation policy enforcer does not have the information needed tocomplete the evaluation of a policy, it can delegate the policyevaluation to a server policy enforcer that has access to theinformation required to complete the policy evaluation. The consequenceof a policy evaluation produced by the server policy enforcer isreturned to the workstation policy enforcer so the policy consequencecan be applied at the workstation.

In another example of delegated policy evaluation, a master decisionpoint can delegate the evaluation of policies to more than one helperdecision point. A master decision point can be a policy engine in theworkstation policy enforcers or document server policy enforcers or apolicy engine in a policy decision server (a centralize cluster ofpolicy engines dedicated to perform policy evaluation). A helperdecision point can be any one of the policy engines listed above otherthan the master policy engine. The master decision point can combine theconsequences collected from the helper decision points and apply thecombined consequences.

A master decision point (especially a policy enforcer) may not have thevisibility to certain information that is required to evaluate aparticular policy. By delegating the evaluation of that particularpolicy at a location where the required information is available oraccessible, the master decision point and helper decision point(s) canoperate collaboratively to process complex policies. The master decisionpoint queries helper decision points to find out if the helper decisionpoint exists and also whether the helper decision point has the abilityto evaluate and/or enforce the policy.

A master decision point (especially a policy decision server) can act asa coordinator that coordinates policy evaluation at multiple locations.This type of function is often found in maintenance policies where amaster policy executed at a central location distributes policyevaluation tasks to decision points at remote locations. For example, amaster decision point may instruct policy enforcers on all mobiledevices to implement a set of policies that clean up sensitiveinformation on such devices.

In an example of delegating a consequence application, a document serverpolicy enforcer evaluates a policy that controls deletion of a documentby a manager on a document server. The policy requires that when themaster copy of a document (i.e., the one that sits on a document server)is deleted, all copies of the same document distributed (or copied) toworkstations must also be deleted. This document server policy requiresdistributed consequence application support to carry out documentdeletion at the workstations.

Policy Enforcer Software Architecture

Referring to FIGS. 6 a-c, policy enforcers 601 for document servers andworkstations have a similar architecture. An interceptor 610 isresponsible for intercepting (or detecting) application usage anddocument access operations (or actions), collecting information about anintercepted operation (e.g., type of action, document(s) associated withthe action, and information about the application or module whereinterception occurred), and forwarding the data collected to a policyengine 603 for performing policy evaluation. The consequence of a policyevaluation is returned by a policy engine 603 to a consequenceapplicator 611. A consequence applicator 611 is responsible for applyingany consequences of a policy evaluation that includes a policy effectand additional tasks.

FIG. 6 a illustrates an embodiment where an interceptor 610 and aconsequence applicator 611 are components of a Policy Enforcement Point(PEP) 602 module and the policy enforcer 601 consists of at least onePEP 602 and one policy engine 603.

FIG. 6 b illustrates an embodiment where a policy enforcer 601implements interception and enforcement functions using a PEP plug-inarchitecture. The policy enforcer consists of one PEP 602 and at leastone PEP Plug-in module 613. Both interceptor 610 and consequenceapplicator 611 are components of a PEP Plug-in module 613.

FIG. 6 c illustrates an embodiment where a policy engine 603 runs in aprocess separate from a policy enforcer 601. The policy decision process614 and policy enforcer 601 can run on the same computer or on separatecomputers.

The interceptor 610 and consequence applicators 611 are functionalentities where the implementation of the two functions varies fromoperating system to operating system and application to application. Insome cases, the interceptor 610 and consequence applicator 611functionalities are combined into one code module. In other cases, theinterceptor 610 and consequence applicator 611 reside in separate codemodules.

The interceptors 610 and consequence applicators 611 may function at theapplication program level or the operating system level in order tocarry out the interception and consequence applicator functions.Application program level interceptors and consequence applicators areapplication program specific code modules which can be implemented asadd-ins, plug-ins, scripts, macros, libraries and extension programs.Operating system level interceptors and consequence applicators areoperating system specific code modules that can be implemented aslibraries, filters and device drivers.

To control application usage, a policy enforcer effects control onapplication program operations (e.g., blocking an application programoperation) and/or filters results generated by the application programoperations (e.g., remove text or disable actionable object in theresult). Using interceptors and consequence applicators, an applicationprogram operation is intercepted (or detected) and information about theapplication program operation is provided to a policy engine to make apolicy decision, and if the policy decision specifies an enforcementaction, the enforcement action is carried out effecting control on theapplication program operation or filtering of results generated by theapplication program operation.

A policy enforcer may use one or more methods to implement applicationusage control. The methods include: (a) blocking or altering anapplication program operating after it is invoked directly or indirectlyby a user but before the application program operation is carried out;(b) disabling or hiding a user interface element responsible forinvoking an application program operation so that a user cannot invokethe application program operation through the user interface element;and (c) removing, altering or obscuring a part or all of the resultgenerated by an application program operation making certain informationnot available to a user. Note that the user interface element describedin (b) may be an element of an application program (e.g., a menu item ora button) or an element of the result generated by an applicationprogram operation (e.g., a hypertext link, a check box or a list box).

In a graphical user interface environment, an application programoperation may correspond to an operation associated with a userinterface element. If a user interface element is a menu item, acorresponding application program operation is an operation that will becarried out when the menu item is selected (e.g., printing a document).If a user interface element is a hypertext link (such as a clickableword or phrase on a Web page), a corresponding application programoperation is an operation that will be carried out when the hypertextlink is clicked (e.g., loading a new Web page or jumping to anotherposition on a Web page). Other common user interface elements include a:menu, button, list box, list item, check box, scroll bar, key (on thekeyboard), and mouse button. An application program operation may alsocorrespond to a command or function that is invoked by a user indirectly(e.g., through a macro or script) or by another application program.

To filter results generated by an application program operation, aconsequence applicator may alter, substitute, remove, hide or obscureone or more portions (or all) of the result to be presented to a user.The consequence applicator may also alter, substitute, remove, hide,disable or obscure one or more actionable objects or fragments of text(e.g., menu, tab, buttons, check boxes, list boxes, or hypertext links).

To control document access, a policy enforcer effects control ondocument access operations. Common document access operations include:read (or open), write (or save), execute (for binary file or script),delete, read permission (or security setting), and change permission.Many document repositories (especially document management systems)support additional document access operations.

Typically, interceptors and consequence applicators intercept (ordetect) a document access operation and information about the documentaccess operation is provided to a policy engine to make a policydecision, and if the policy decision specifies an enforcement action,the enforcement action is carried out effecting control on the documentaccess operation. Alternatively, the interceptors and consequenceapplicators may also integrate with an existing access control systemprovided by a document repository (e.g., document management system).

Interceptors and consequence applicators that control document accessare document repository dependent. They may be installed in a documentserver application program (e.g., HTTP server, IBM Lotus Notes Server,Microsoft Exchange Server, or Microsoft Sharepoint Portal Server), at anapplication program interface (e.g., MAPI, JMS, ODBC, JDBC and OracleSQL*NET), at an application protocol interface, or act as a applicationprotocol proxy between a client and a server (e.g., HTTP, FTP or SOAP),at file system libraries, at network file share protocol driver (e.g.,CIFS or NFS), or at file system device driver.

Some common document repositories include: file servers, mail servers,document management server, content management server, HTTP or Webservers, FTP servers, WebDAV servers, and database servers.

In one implementation of a policy enforcer, interceptors and consequenceapplications are installed in an existing application program oroperating system to implement interception (or detection) andenforcement functions. The interceptors and consequence applicators arenot native elements of the application program or operating system.

In another implementation of a policy enforcer, interceptors andconsequence applicators are native elements of an application program oroperating system. Interception and enforcement may be implementedthrough one or more calls to a policy enforcer application programinterface (API). For example, a policy enforcer API is provided in theform of a software development kit (SDK).

A workstation policy enforcer installs a number of application programinterceptors 610 and consequence applicators 611 to monitor documentaccess and application usage operations (or actions) inside individualapplication programs and to apply enforcement actions. In addition, aworkstation policy enforcer also installs operating system interceptors610 and consequence applicators 611 to monitor file accesses fromapplication programs and to apply enforcement actions. The operatingsystem interceptors 610 can intercept operations from applicationprograms that are or are not monitored by application programinterceptors on the workstation.

Interceptors 610 and consequence applicators 611 can be setup duringprogram installation time or anytime during a program's life cycle. Onemethod that can be used to setup an interceptor is to perform codeanalysis on an application program or library module and then modify thestored program code. Another method that can be used to setup aninterceptor is through code injection at program startup time. Yetanother method that can be used to setup an interceptor is to performcode injection after the program has been started. Code injectionincludes any method that modifies existing program code and/or insertsnew code into an existing program code to implement an additionalfunction. The existing program code can reside in volatile ornonvolatile memory.

The consequence applicator 611 implements the consequence (or outcome)called for by the policy engine 603. The consequence includes an effectof policy evaluation and optionally obligation and remediation tasks(described below) to be carried out. An effect includes whether anoperation should be allowed or denied; querying a user for input;evaluating another set(s) of policies; and calling a custom effecthandler (described below).

The local policy repository 604 holds a copy of policies applicable to apolicy enforcer. Depending on the policy system architecture selected,the set of policies in the local policy repository 604 may be a full setof policies from the policy server or a subset. The local policy may bestored locally in a relational database, in one or more files, or in anyform that convenient to the policy enforcer. By storing policies for apolicy enforcer locally, a workstation policy enforcer can continue tofunction while the workstation is off-line and the policy server cannotbe reached.

The custom effect handler 612 is a code module that implements customeffects and is optional in the policy enforcer 601.

An obligation handler 605 is a code module that carries out obligationssupported by the policy system architecture. An obligation is a taskthat is related to the intercepted action that a policy enforcer isobligated to take. The tasks may include logging an action beingintercepted, sending a notification to an administrator regarding theintercepted action, and archiving or encrypting the document associatedwith the intercepted action. For example, if a policy says “any e-mailsent to a patient should be maintained in the patient record database;and the obligation action is to send (or ‘bcc’) a copy of the e-mail tothe record management system”. In this case, a policy enforcerautomatically applies the obligation action (i.e., archive) and sends acopy of an e-mail to a record management system.

In a second example, the obligation can be used to implement regulatorycompliance requirements such as “all e-mail communications from anexecutive must be archived”. A policy can be written to capture all sendand forward actions on e-mail messages and to apply an archiveobligation action automatically.

Some obligation handlers are executed inside a policy enforcer 601process (e.g., the log handler) while others are implemented as PEP 602components executing inside an application program (e.g., an e-maildelete handler) or an operating system. The obligation handler 605 isoptional in the policy enforcer 601.

The remediation handler 606 is very similar in function to theobligation handler 605 except it performs different functions.Remediation means additional actions taken that are different from whatis being intercepted. Such actions are introduced solely by policiesdefined to “remediate.”

The tamper resistance module 609 is responsible for preventing,blocking, monitoring, and recovering from attempts to disable or alterthe function of a policy enforcer. Many techniques can be used toprotect program files and configurations from modifications andcorruption. For example:

(1) Multiple copies of files can be maintained and a missing orcorrupted file can be restored from the backup copies.

(2) Checksums or signatures can be generated on important files andstored in nonvolatile memory to enable detection of corrupted programand data files.

(3) Access to policy enforcer program files and configurations can berestricted.

(4) Changes to a policy enforcer's Windows registry entries can also bemonitored, blocked and automatically restored.

The communication and synchronization module 608 is responsible formaintaining connection(s) to the policy server 211 and intelligenceserver 308, handling policy updates, and transferring log data to thelog and intelligence repository 309.

The policy scheduler 615 implements maintenance policies set by theadministrator or user. A maintenance policy tells the policy schedulerwhen to perform an action and what the action is. For example, thepolicy scheduler 615 can be given a maintenance policy that instructs itto perform a nightly scan of all e-mail messages and to delete anye-mail messages older than 90 days.

A maintenance policy uses the same format as a normal policy, but ratherthan being evaluated in response to an action by a user or applicationprogram, the maintenance policy is evaluated at a certain specified dateand/or time. The policy scheduler 615 implements any specifiedobligation or remediation action specified in the maintenance policy.

Variations of implementations of a policy enforcer can take the form of:

(1) The policy enforcer includes a policy engine 603, a local policyrepository 604 and one or more policy enforcement points 602. The localpolicy repository may reside in volatile or nonvolatile memory of a hostcomputer. The policy enforcer may optionally include any combination of:an auditor 607, a policy scheduler 615, obligation handlers 605,remediation handlers 606, or a tamper resistance module 609.

(2) The policy enforcer includes a policy engine 603, a local policyrepository 604, a policy enforcement point 602 and one or more PEPPlug-ins 613. The local policy repository may reside in volatile ornonvolatile memory of a host computer. The policy enforcer mayoptionally include any combination of: an auditor 607, a policyscheduler 615, obligation handlers 605, remediation handlers 606, or atamper resistance module 609.

(3) The policy enforcer includes a policy engine 603, a local policyrepository 604 and an interface to policy enforcement points. The localpolicy repository may reside in volatile or nonvolatile memory of a hostcomputer. The policy enforcement point interface provides a means tosupport additional policy enforcement points (e.g., policy enforcementpoints provided by a third-party). The policy enforcer may optionallyinclude any combination of an auditor 607, a policy scheduler 615,obligation handlers 605, remediation handlers 606, or a tamperresistance module 609.

(4) The policy enforcer implements a policy enforcement point plug-inarchitecture illustrated in FIG. 6 b and the additional policyenforcement points are provided as PEP Plug-ins 613.

(5) The policy enforcer is installed on a host computer without anypolicies (or rules). Upon startup of the policy enforcer, the policyenforcer communicates with a policy server and the policy servertransmits a set of policies to the host computer. On successfultransmission of the set of policies, the policy enforcer enforces theset of policies at the host computer.

(6) The policy enforcer provides information (e.g., host name, IPaddress, type of computer or operating system) to the policy server tohelp determine the set of policies to be transmitted. The set ofpolicies may be a subset of policies managed by the policy server.

(7) The policy enforcer is installed on a host computer with a set ofdefault policies (or rules). The set of default policies is enforced bythe policy enforcer until a second set of policies is received by thehost computer.

(8) A set of policies on the host computer (e.g., the set of defaultpolicies) is replaced by the second set of policies and the policyenforcer enforces the second set of policies at the host computer.

(9) A set of policies on the host computer (e.g., the set of defaultpolicies) is combined with the second set of policies and the policyenforcer enforces the combined set of policies at the host computer.

(10) The policy enforcer is installed on a host computer with a set ofpreinstalled policies (or rules). The set of preinstalled policies isenforced by the policy enforcer until a second set of policies isreceived by the host computer. Upon successful reception of the secondset of policies, the policy enforcer enforces both the set ofpreinstalled policies and the second set of policies at the hostcomputer.

(11) A policy enforcer is installed on a host computer with a set ofconfigurable policies (or rules) and a default policy configuration. Theconfigurable policies are enforced by the policy enforcer at the hostcomputer according to the default configuration until a second policyconfiguration is received by the host computer.

(12) A policy configuration on the host computer (e.g., the defaultpolicy configuration) is replaced by the second policy configuration andthe policy enforcer enforces the configurable policies at the hostcomputer according to the second policy configuration.

(13) A policy configuration on the host computer (e.g., the defaultpolicy configuration) is combined with the second policy configurationand the policy enforcer enforces the configurable policies at the hostcomputer according to the combined policy configuration.

Policy Engine

A policy engine 603 is an execution unit that processes and executesrules (or policies). The policy engine 603 takes the data collected byan interceptor 610 (and any other pertinent data such as historical datafrom prior interceptions and configuration and environment data) andapplies the policy rules supplied by the policy server to the data toproduce a consequence. A consequence may include an effect (e.g., ALLOW,DENY, evaluate another policy or set(s) of policies, query user, or calla custom effect handler) and optionally one or more obligation andremediation tasks. The use of historical data in a policy evaluation isoptional. As part of the policy evaluation process, a policy engine maydecide that it needs to obtain input form a user before it can proceedwith (or complete) policy evaluation. At that time, a policy engine caninvoke user interface elements to query the user for input. For example,such input is related to classifying a document (which produces documentattribute values) that is required to complete policy evaluation.

Also, as part of the policy evaluation process, a policy engine maydecide that it needs to obtain document classification information inorder to complete policy evaluation. The process of obtaining documentclassification information may involve retrieving stored documentclassification data or dynamically invoking a document classificationengine to classify a document.

The policy engine 603 optionally performs a list of obligation andremediation tasks and/or invokes a custom effect handler if one isdefined in a policy. An implementation of the policy engine is policysystem architecture specific. Depending on what policy systemarchitecture is selected, the implementation of the policy engine canvary significantly. The policy deployment module 405 described in thisapplication can support different types of policy engine design,allowing the appropriate policy engine design to be selected for anindividual device. For example, a smart phone policy enforcer may belimited by the device's computing power and memory available. A policyengine inside the smart phone policy enforcer can be designed to executeprecompiled and preoptimized polices that exist in binary form. Thepolicy optimization and compilation steps are performed on the policyserver prior to transmitting (the subset of policies) to the smart phonepolicy enforcer. In this case, the smart phone policy enforcer receivesand evaluates policies that exist in binary form which are a semanticequivalent of the original policies that reside on the policy server.

A number of design options are available in the design of the policyengine 603, the options include:

(1) Support distribution of full sets of policies to policy enforcers.

(2) Support preoptimized policies at the policy enforcer.

(3) Support policies transmitted to a policy enforcer in XACML format.

(4) Support policies transmitted to a policy enforcer in Blue Jungle'sOpen Policy Language (OPAL) format.

(5) Support policies compiled into ASCII or binary format.

(6) Support policies translated into programming language (e.g., XML,Java, C#, Perl, and Python—in source code or binary format).

(7) Support policies translated into lookup tables.

(8) Support preinstalled, configurable policies and alter preinstalledpolicies' behavior through configuration changes.

(9) Support built-in, configurable policies and alter built-in policies'behavior through configuration changes.

In an implementation of a policy engine, a policy evaluation process canbe invoked by an interceptor 610, a policy scheduler 615, an internalevent generated by a policy enforcer or policy server, or an externalevent generated by another application program.

An internal event is similar to an intercepted user or applicationprogram action except that it is generated by a policy engine or othercomponents of a policy enforcement system. An internal event can provideadditional information relevant to the event similar to that ofintercepted action. In fact, an internal event often includes theinformation provided by an intercepted action which results in thegeneration of the internal event. An internal event may be generated asa result of a policy evaluation request or a result of an activity dataanalysis operation.

An external event is an event generated by another application programoutside of a policy enforcement system. This type of application programis typically a third party application integrated with a policyenforcement system (e.g., through a software development kit).Third-party application integration can be extremely useful because in aspecific implementation where policy enforcers are deployedcompany-wide, managing all types of information, the management systemhas access to information in a distributed environment without having togo through additional authentication and authorization processes. Forexample, a customer relationship management (CRM) application mayinstruct a policy enforcement system through an external event toarchive all documents related to a customer on the closing of anaccount. The handling of such an external event may include rolling up:files on file servers and desktop and laptop computers, e-mail messageson mail servers and all mail clients, and documents in documentmanagement systems.

Referring to FIG. 7, the policy engine 701 can evaluate policiesreceived 702 from the policy server using the following steps:

Step 1: Receive data collected by an interceptor 703 or provided by anintegrated application program module. The data collected by aninterceptor may include an action (or operation) being intercepted,information on the document(s) that is associated with the action (thisis optional because some actions like cut-and-paste do not involve adocument), information on the thread, process, and application withinwhich the action was taken, and other information which may be useful inpolicy evaluation.

Step 2: Inspect data provided by the interceptor or the integratedapplication program module and select policies that are applicable. Theselection may be based on the type of action, who is the user, what isthe application, and so on. In some policy system architectures, thispolicy selection step may not be necessary. In that case, all policiesor a predefined set of policies will be evaluated.

Step 3: Based on the policies selected and data provided by aninterceptor or an integrated application program module, obtainadditional information that is needed to complete policy evaluation. Theadditional information may include configuration setting and environmentdata 704.

Step 4: Pass the selected policies and data collected through policyevaluation logic to produce a consequence 705 (or outcome). Theconsequence includes one of the valid policy effects (e.g., ALLOW, DENY,evaluate another set(s) of policies, query user, and call a customeffect handler), and perform any obligation and remediation tasks.

Step 5: If the policy evaluation consequence 705 includes any obligationor remediation tasks, call the corresponding obligation or remediationhandlers to carry out the obligations and/or remediation tasks.

Step 6: If the policy evaluation consequence 705 includes a customeffect, call the corresponding custom effect handler to generate orapply an effect.

The policy engine 701 can reside in a policy enforcer 205, 207, a policyserver 211, a dedicated policy decision server, or any process or serverthat is assigned the policy decision function. Note that the policyengine 603 is an optional module in the policy enforcer 601 (refer toFIG. 6 c).

In an embodiment of the invention, the policy engine 701 can evaluatepolicies received 702 from the policy server, data provided by ascheduler 615 associated with a scheduled event, data associated with aninternal event generated by a policy enforcer or a policy server, ordata accompanying an external event generated by a different applicationprogram.

2.4 Example Scenarios

In the following scenarios, a pseudo language is used to define theparameters of a policy rule. The basic language structure is:Policy=premise+consequence. Any language that support the abovestructure can be used, e.g., the OASIS eXtensible Access Control MarkupLanguage (XACML) and Blue Jungle's Open Policy Language (OPAL).

The policy rule format used in the text below is:

policy := FOR <resource expression>  ON <event expression>  BY <subjectexpression>  WHERE <context expression>  DO <positive consequence>OTHERS <negative consequence> positive consequence := effect AND<obligation tasks> AND <remediation tasks> negative consequence :=effect AND <obligation tasks> AND <remediation tasks>

The policy rule format includes a number of elements. The FOR element(or resource element) in the policy rule format specifies a logicalexpression that describes one or more document attributes andcorresponding matching patterns (e.g., ‘document.category=“Confidential”AND document.name=“//server1/user/**”’, or ‘message.from=NOT Employee ORmessage.to < >“*@partner-company.com”’).

The ON element (or action element) specifies a list of document accessand/or application usage actions that this policy applies to (e.g.,OPEN, SAVE, SEND, and ATTACH).

The BY element (or subject element) specifies a logical expression thatdescribes one or more: users, user groups, the role of a user, a user'sbusiness function, computers (or hosts), groups of computers (e.g.,“file server” or “finance department”), types of computers (e.g., laptopor PDA), application programs (e.g., “Microsoft Word”), groups ofapplication programs (e.g., “Microsoft Office”), types of applicationprograms (e.g., spreadsheet), and more.

The WHERE element (or context element) is a logical expression (orcontext expression) that describes the context this policy applies to.The context expression can compose of any logical combination of:resource elements, action elements, subject elements, time (e.g., pointin time, time of day, or day in the week), location (e.g., “MainOffice”, “London Office”, “Building H” or “Home”), connectivity(including access mechanism and bandwidth; e.g., WLAN, LAN, VPN, ISDN,Internet, DSL, Bluetooth, dialup, Remote Desktop Protocol (RDP), VirtualNetwork Computing (VNC) protocol, latency, 56 k, broadband, 100 Mb, and1 Gb), policy directive (e.g., POLICY-ENFORCER-AT-POU orMSEXCHANGE-5.5), historical data, statistical data, data produced byanalyzing events, data provided by an external data source, and more.

A context element describes a circumstance that a policy is intended for(or a positive policy consequence (described below) should apply). Itworks in conjunction with a resource element, action element, andsubject element to define a policy premise (or condition). For example,a context element may describe a time period in which a policy should beapplied (i.e., adopting a positive policy consequence when other logicalpolicy elements are evaluated to true). In another example, a contextelement describes a policy that should be applied only if a workstationaccesses a server through a virtual private network (VPN).

In a more complex example, a context element describes the logicalcombination of: (1) a user who is an employee; (2) a workstationconnected to a network at a branch office; (3) the user is using abrowser to access a secure server via secure sockets layer (SSL) VPN;(4) the access occurs during office hours; (5) the access occurs withina silent period before his (or her) company's quarterly financialresults are published; and (6) there is at most three users connected tothe secure server. This example illustrates that a context element canbe used to describe a complicated circumstance. In some cases, a contextelement may specify one or more policy engine directives includingPOLICY-ENFORCER-AT-DESTINATION.

A positive consequence element (or DO element) consists of a positiveconsequence statement. A positive consequence statement contains apolicy effect (e.g., ALLOW, DENY, query user, custom effect handler, orDELEGATE), optionally one or more obligation tasks, and optionally oneor more remediation tasks. A positive consequence is adopted duringpolicy evaluation when a policy's premise is satisfied.

A negative consequence element (or OTHERS element) consists of anegative consequence statement. A negative consequence element has thesame structure as the positive consequence statement. A negativeconsequence is adopted during a policy evaluation when a policy'spremise is not satisfied. A negative consequence is optional in apolicy. When a negative consequence is not specified, a default negativeconsequence is used which contains a policy effect that is the negationof the positive policy effect found in the policy.

In addition, a policy rule can also contain directives that provideinstructions to a policy engine (e.g., a policy engine in a policyenforcer or a policy engine in a policy decision server) to assist inpolicy evaluation, and provide instructions to policy deployment module(typically a part of a policy server) to assist in policy deployment.Policy directives can appear in any one of the policy elements describedabove. For example, a policy can contain one or more collaborativedirectives (e.g., POU:<action> which describes action informationavailable at a point-of-use policy enforcer associated with a policyevaluation request, or POLICY-ENFORCER-AT-DESTINATION).

For the purpose of illustration, the following examples show theevaluation of only one policy in the policy evaluation step (by a policyengine). In practice, a policy engine can select one or more policiesrelevant to an intercepted action or integrated application programmodule and the policy evaluation may involve more than one policy. Whenmore than one policy is evaluated by a policy engine in response to anintercepted action or integrated application program module, the policyconsequences in the evaluated policies must be combined to form onefinal policy consequence using one or more combining algorithms (e.g.,deny override or permit override). The final policy consequence is thenreturned to an interceptor and consequence applicator or anauthorization process that invokes policy evaluation. This final policyconsequence normally contains a policy effect and optionally one or moreobligation tasks and remediation tasks.

The policy evaluation steps outlined in this application are providedfor illustrative purposes only. Different policy evaluation techniquesmay be applied to achieve the same or other results.

FIG. 8 illustrates an example embodiment of a policy enforcer 815 isinstalled on a workstation 801 where a user's (or application's) OPENaction triggers a file operation (e.g., open( )) on a local disk file.Note that file system objects are handled differently from otherdocuments that are nonfile system objects which are illustrated below.

The policy definition is:

FOR document.name = “*.doc” ON OPEN BY user = NOT Employees DO DENY

The following describes a normal (i.e., ALLOW) execution path when auser accesses a file and the policy engine 802 interprets, and theinterceptor and consequence applicator 809 implements the above rule.Note that, as shown in FIG. 6, the policy enforcer 815 is comprised ofseveral components. For the ease of explanation, the policy enforcer isnot illustrated in full in the following examples. In this example, thepolicy engine 802 and the interceptor and consequence applicator 809components of the policy enforcer 815 are described.

Step 1 (804): A user or application program 803 performs an action. Anaction can include opening a file, saving a file, moving a file,deleting a file, renaming a file and so forth. In this case, the actionis OPEN.

Step 2 (805): The user or application action causes some applicationcode to be executed which results in calls to operating system librariesto manipulate a file. For action OPEN, the system call that applicationcode makes includes open( ), fopen( ), FileOpen( ), OpenFile( ) andCreateFile( ).

Step 3 (807): The workstation policy enforcer 815 is capable ofintercepting calls to operating system libraries. The file operationcalls (e.g., open( ), fopen( ), etc.) are intercepted. The interceptorand consequence applicator 809 that intercepts a system call collectsinformation about the file operation, calling application, and user, andforwards that information to the policy engine 802 for furtherprocessing. The information collection may include the file name,directory, file path, application's process id, and program name.

Step 4 (808): The policy engine 802 takes the information received fromthe interceptor and consequence applicator 809 and other configurationand environment data, and applies relevant rules distributed to it by apolicy server. Note that depending on what policy language is used, oneor more rules can be relevant to a current action. The policy evaluationcan result in an ALLOW, DENY, or DELEGATE policy effect and it may alsointroduce obligation and/or remediation actions. Delegation is when thepolicy engine 802 evaluates another policy or another set of policieslocally or remotely.

(a) An obligation action refers to additional action(s) that is relatedto the intercepted action that a workstation policy enforcer 815 isobliged to perform when certain condition(s) is met. For example, anobligation action includes logging an action or sending a notificationmessage to an administrator. An obligation can depend (or not depend) onthe ALLOW and DENY state.

(b) A remediation action refers to additional action(s) that isunrelated to the intercepted action that a workstation policy enforcer815 must take when certain condition(s) is met. Remediation actions mayinclude deleting a copy of a backup file because only one copy of aparticular file is allowed or cleaning up a user's home directorybecause the user's assigned privilege has changed due to a recent jobchange.

Step 5 (810): The policy evaluation decision (i.e., effect) is returnedto the interceptor and consequence applicator 809 (in this case, theinterceptor is also acting as a consequence applicator). The interceptorand consequence applicator 809 takes appropriate enforcement action. Insome cases, the interceptor and the consequence applicator can beseparate code modules (e.g., when communication between the PolicyEngine and PEP is asynchronous). FIG. 8 shows the execution path of anALLOW effect. In the case where the policy evaluation effect is DENY,then steps 6-8 should be eliminated. For the action OPEN, if the effectis DENY, then the interceptor and consequence applicator 809 terminatesthe open( ) call immediately with an error status.

Step 6 (811): The interceptor and consequence applicator 809 forwardsthe system call made by the application code to an appropriate operatingsystem library and the normal operation is carried out.

Steps 7-8 (812, 813): Depending on what system called is made it mayinvolve a file system device driver and access to physical disk 814.

FIG. 9 illustrates an embodiment where a policy enforcer on a clientcomputer controls access to files on a file server. The policydefinition is:

FOR document.name = “//server1/docs/**” ON OPEN BY user = EmployeesWHERE (CURRENT_TIME > “8:00 AM” AND CURRENT_TIME < “6:00 PM”)DO ALLOW

This scenario demonstrates the situation where a user (or application)action in workstation 901 triggers an operation on a file residing on afile server 904. FIG. 9 shows a normal (i.e., ALLOW) execution path whena workstation policy enforcer is installed.

Processing for this scenario is very similar to the scenario of FIG. 8.Additional processing in this case is attributed to the policy engine902 evaluating the time constraints attached to the rule. Sinceapplication programs use the same system call to open a file on localdisk and a file on a file server, the same system call interceptor andconsequence applicator 809 described above works in the same manner asthe interceptor and consequence applicator 903. Workstation policyengine 902, while processing the intercepted data from interceptor andconsequence applicator 903, detects a file being accessed is on a server904 and performs path normalization to avoid control being bypassed whenmore than one path exists to the same file. The policy rules distributedto a workstation policy enforcer can control access from the workstationto any file server. The control function is applied regardless ofwhether a file server is protected by a file server policy enforcer.

FIGS. 10 a-c illustrate an embodiment where a policy enforcer on a fileserver protects files on a file server.

The policy definition is:

FOR document.owner = ProjectA-Team OR document.name =“//server1/share1/docs/projectA/**” ON OPEN, EDIT, CREATE, RENAMEBY user= ProjectA-Team WHERE NOT (device = LAPTOP AND location = BOSTON-OFFICEAND connection < > VPN) DO ALLOW

This scenario demonstrates the situation where a user (or application)action triggers an operation on a file residing on a file server. Theuser or application action can be performed on any workstation includingone that is controlled by a workstation policy enforcer or one that isnot. FIGS. 10 a-c show a normal (i.e., ALLOW) execution path when a fileserver policy enforcer is installed.

Step 1 (1001, 1002): User or application initiates an action. The actiontriggers a file operation on a file resided on a file server 1033. Theworkstation 1031, 1032 where the action is initiated can be controlledby a workstation policy enforcer 1031 or not controlled by a workstationpolicy enforcer 1032.

Step 2 (1003, 1004): Since the file of interest resides on a remoteserver, a file operation normally makes its way to a file share protocolclient such as Common Internet File System (CIFS) or Network File System(NFS) client before reaching a network device driver on a workstation. Anetwork device driver sends a file operation to the target file server.A network file share protocol client may be implemented as a devicedriver (e.g., CIFS) or an application program or combination of both.

Step 3 (1005): The network device driver (not shown) on the target fileserver 1033 receives a file operation request and forwards it to thenetwork file share protocol server 1017, 1018, 1019. A network fileshare protocol server may be implemented as a device driver 1017 (e.g.,CIFS) or server application program 1018 (e.g., NFS) or combination ofthe two (e.g., Andrew File System—AFS). An interceptor and consequenceapplicator 1015 is installed on a network file share protocol server1017, 1018, 1019 to intercept function calls (or messages) to thenetwork file share protocol server 1017, 1018, 1019. In the case of aNetwork Attached Storage (NAS) device, installing an interceptor andconsequence applicator 1015 may involve the installation of one or morecallback handlers. The interceptor and consequence applicator 1015collects information about the function call (or message) beingintercepted and forwards that information to a policy engine 1016running on the file server (or in the case of a NAS, the policy engineruns on a separate computer).

Step 4 (1006): Using the rules distributed by a policy server,information collected by an interceptor and consequence applicator 1015,and other environment and configuration data, the policy engine 1016determines if the function call (or message) should be allowed ordenied. The file server policy engine 1016 will also carry out anyobligation and remediation operations deemed necessary. The file serverpolicy engine may also decide to store information to help processfuture function calls (or messages).

Step 5 (1007): The interceptor and consequence applicator 1015 receivesa return status (i.e., effect) from the policy engine 1016. Based on thestatus, the interceptor and consequence applicator 1015 may allow afunction call to network file share protocol server 1017, 1018, 1019 toproceed (or a message to be processed).

Step 6 (1008): The network file share protocol server 1017, 1018, 1019performs its normal processing. Depending on the type of file operationbeing requested and whether such operation can be completed with filedata cached in network file share protocol server 1017, 1018, 1019,network file share protocol server may or may not access the file systemto fulfill a request.

Step 7 (1009): In case the file system access is required to completethe processing of a request, a network file share protocol server 1017,1018 will perform one of the steps described here depending on itsimplementation:

(1) For a network file share protocol driver 1017 implementation(referring to FIG. 10 a), a network file share protocol driver 1017makes calls into a file system device driver 1020. In this case, aninterceptor and consequence applicator 1021 is installed to interceptcalls into the file system device driver 1020. Information is collectedby the interceptor and consequence applicator 1021 and forwarded to apolicy engine 1016 on the same file server 1033.

(2) For network file share protocol server program 1018 implementation(referring to FIG. 10 b), a server program 1018 makes operating systemfile operation calls to access a file. Similar to client side operatingsystem libraries interceptor and consequence applicator, such fileoperation system calls are intercepted 1011 and reported to a policyengine 1016 on the file server 1033.

Note that interception is performed at both network file share protocoldriver 1017 and file system device driver 1020 (or network file shareprotocol server program 1018 and operating system libraries 1022).Interception at network file share protocol driver 1017 (or network fileshare protocol server program 1018) provides high-level file operationinformation and avoids problems created by caching (i.e., the filesystem is not accessed to complete a request because file data is incache). Interception at the file system device driver 1020 (or operatingsystem libraries 1022) provides complete protection to files on a fileserver. If file system access is generated indirectly through somecomplex protocol driver 1017 (or server program 1018) logic, it may notbe appropriate to enforce policy at protocol driver interceptor andconsequence applicator (or server program interceptor and consequenceapplicator) 1015. An interceptor and consequence applicator 1021, 1023at file system device driver 1020 (or operating system library 1022)level ensures all file operations are intercepted and the abovesituation can be handled. Interception at both the protocol driver 1017(or server program 1018) and the file system device driver 1020 (oroperating system library 1022) can function collaboratively to assistpolicy evaluation.

Step 8 (1010): Processing in step 8 is similar to step 4 (in thedescription of FIGS. 10 a and 10 b). The policy engine 1016 may useinformation collected from previous interception(s) 1005 in policyevaluation.

Step 9 (1011): Using the return status from step 8, an interceptor andconsequence applicator 1021, 1023 can either allow or deny the requestedfile operation.

Step 10-12 (1012-1014): Normal processing steps similar to thosedescribed in the other scenarios above.

In a common CIFS server implementation, a file access operation may comein through a network device driver, then a CIFS driver, then optionallya Distribute File System (DFS) server, followed by a Server MessageBlock (SMB) server and finally a file system device driver. In currentMicrosoft implementations, all the above operations are performed inkernel mode.

In a common NFS server implementation, a file operation comes through anetwork device driver to a NFS server program. The NFS server programthen accesses local files through operating system libraries which mayin turn access file system device driver. The NFS server is normally auser mode application, but there also exists kernel modelimplementations.

In a Network Attached Storage (NAS) implementation, a policy engine mayrun on a separate computer rather than the NAS operating system. It iscommon to find on a NAS operating system, a network-based callbackinterface which provides similar functions to other file serverinterceptor and consequence applicators. Note that this type of callbacksolution is not limited to NAS devices. The policy engine can leveragesimilar techniques that are also available in different serverapplication software.

Referring to FIG. 10 a, another design option that may be added is onewhere a network file share protocol driver interceptor and consequenceapplicator 1015 communicates with a file system device driverinterceptor and consequence applicator 1021 directly. Depending on theimplementation, a network file share protocol driver interceptor andconsequence applicator 1015 may or may not need to communicate with thepolicy engine 1016. Similarly (referring to FIG. 10 b), a network fileshare protocol server program interceptor and consequence applicator1015 can also communicate with an operating system library interceptorand consequence applicator 1023 and it may or may not communicate withthe policy engine 1016. What this means is that information collected ata high-level interception 1015 can be used to assist in interpretingwhat is happening at a lower-level 1021, 1023. Such an interpretationcan occur inside a low-level interceptor and consequence applicator1021, 1023 or policy engine 1016 depending on how the software isdesigned.

FIG. 11 illustrates an embodiment where access control to a nonfilesystem object (e.g., e-mail) is being enforced on a workstation.

The policy definition is:

FOR message.from = Legal AND message.createDate < TODAY - 90 ON OPEN DODENY

Since a nonfile system object (or document) access is applicationspecific, interception is typically performed inside an application, atan application program interface (API), or at a communication protocolinterface, instead of being performed in operating system libraries ordevice drivers. In addition, interception of communication protocol canalso be performed using a proxy (or gateway) application that is placedbetween a client application and a server. An example of an applicationprogram interface includes Microsoft Messaging API, Oracle SQL*NET orJava Message Service (JMS). An example of a communication protocolincludes HTTP, FTP, WebDAV, SMTP, POP3 or IMAP4.

The processing steps are basically the same as illustrated in FIGS. 8and 9, except that interception and enforcement are performeddifferently. There are two methods for handling the interceptor andconsequence applicator on nonfile system objects. In the first method, apolicy enforcement point (PEP) containing the interceptor andconsequence applicator functions is built into an application program.With this approach, interceptor and consequence applicator functions areprovided as an integral part of an application program and theapplication program provides means to communicate with an externalpolicy engine.

The second method requires a PEP to be installed by instrumenting anexisting application program to provide interceptor and consequenceapplicator functions. This second method allows application programsthat are not released with document access and application usage controlcapabilities to be retrofitted to provide such capabilities. Besidesinterceptor and consequence applicator functions, a PEP may alsoimplement obligation and remediation task handling capabilities.

Adapting an application program to provide interceptor and consequenceapplicator functionalities requires application of one or moreinstrumentation techniques. The following are a few exemplaryinstrumentation techniques available for retrofitting applicationprograms to provide document access and application usage controlcapabilities:

(1) Using application program interfaces (APIs) available to implementinterceptor and consequence applicator functionalities.

(2) Implementing interceptors and consequence applicators in anin-process add-on (or plug-in) module or extension library.

(3) Implementing interceptors and consequence applicators in a callbackmodule.

(4) Implementing interceptors and consequence applicators in a devicedriver.

(5) Performing function (or method), class (or object), library,program, and device driver wrapping either statically or dynamically sothat an interceptor has a chance to examine an application programoperation before the actual operation is carried out.

(6) Installing (or registering) a message filter, message hook, messagehandler, event filter, event hook, event handler, preprocessingcallback, post-processing callback, device driver, and device driverfilter at the application program installation time, applicationstart-up time, or after an application program has started up, so thatan application program operation can be intercepted and examined by aninterceptor.

(7) Performing program code analysis and modifying application programcode statically or dynamically to install interceptors and consequenceapplicators.

A nonfile system object (or application data object) can be any datathat can be uniquely identified. For example, a nonfile system objectcan be an e-mail message, a discussion thread, a result set created by adatabase query, a Web page, an electronic form, a contact object, acalendar entry, etc.

Again, a workstation policy enforcer provides access and usage control.It controls what user can view, edit, send and so forth. The workstationpolicy enforcer also addresses problems created by caching and off-lineoperations. For example, Microsoft Outlook can cache e-mail messages ona client computer and a Microsoft Exchange Server policy enforcer cannotcontrol accesses to those cached e-mail messages.

The workstation policy enforcer and document server policy enforcer canindividually provide different “use” control and access protection.

FIG. 12 illustrates an embodiment where a policy enforcer on aworkstation 1200 applies an obligation action for a file accessoperation. An obligation is typically used to implement notification andlog functions.

The policy definition is:

FOR document.category = “Highly-Sensitive” ON OPEN BY user = Executives,Legal DO ALLOW AND LOG OTHERS DENY AND NOTIFY Administrator AND LOG

The policy restricts access to documents categorized as“Highly-Sensitive” to users in the Executives and Legal groups. Inaddition, the document administrator is notified when a user (orapplication) is denied access to one of these documents and the actionis logged every time a user (or application) attempts to open one ofthese documents.

Step 1 (1201): A user who is a member of the Executives group, opens anM&A document categorized as “Highly Sensitive” using Microsoft Word.

Step 2 (1202): The file open operation is intercepted. The interceptorand consequence applicator 1216 collects information about the action,document, and application and forwards that information to a policyengine 1214.

Step 3 (1203): The policy engine 1214 receives the information collectedby the interceptor and consequence applicator 1216 and performs a policyevaluation. The intercepted action in this example is OPEN which matchesthe policy and the policy is then evaluated. In the process ofevaluating the above policy, policy engine 1214 compares the documentcategory against “Highly-Sensitive”, checks if the user is in theExecutives group, and determines that the action should be allowed. Thepolicy engine 1214 returns an ALLOW effect to the interceptor andconsequence applicator 1216.

Step 4 (1204): The policy engine 1214 also recognizes that obligationtasks are assigned to the policy and calls the associated obligationhandler 1215 to carry out the obligation tasks. The notify obligationhandler 1215 is called to send a notification to the administrator. Inaddition, the log obligation handler 1215 is called to log the actionand any associated information of interest. Note that the obligationtasks shown in this example are standard obligation tasks that arehandled by obligation handlers 1215 and the obligation handlers areinvoked by policy engine 1214. A policy enforcer can also support customobligation tasks. Custom obligation tasks can be invoked by policyengine or passed to an interceptor and consequence applicator in apolicy consequence along with policy effect. If a custom obligation taskis passed to an interceptor and consequence applicator, the interceptorand consequence applicator is responsible for performing the customobligation task.

Step 5 (1205): The interceptor and consequence applicator 1216 receivesthe ALLOW effect and calls the application code that it had intercepted.

Step 6 (1206): The normal file open application code is executed andresults in a call to a file operation in the operating system library.

Step 7 (1207): The file open operation system call is intercepted. Theinterceptor and consequence applicator 1217 collects information aboutthe action, document, and application, among other information. Thecollected information is forwarded to policy engine 1214.

Step 8 (1208): The policy engine 1214 receives the information collectedby the interceptor and consequence applicator 1217. Before performingthe policy evaluation, policy engine 1214 looks up in its cache to findthe ALLOW effect produced by the evaluation of the policies on the sameapplication operation. The policy engine 1214 returns an ALLOW effect tothe interceptor and consequence applicator 1217.

Step 9 (1209): This step is not invoked because obligations have beencarried out in step 4 after the policy evaluation in step 3. The policyengine maintains sufficient information to identify that the twointerceptors are related and to ensure that an obligation or remediationtask is not carried out more than once.

Step 10 (1210): The interceptor and consequence applicator 1217 receivesan ALLOW effect from policy engine 1214 and proceeds to call the fileopen function in the operating system library.

Step 11-13 (1211-1213): The normal file open operation is carried out.

FIG. 13 illustrates an embodiment where a policy enforcer on aworkstation 1300 applies a remediation action for a file accessoperation. The policy definition is:

FOR document.name = “C:/secure/marketing/**” ON OPEN BY user = MarketingDO ALLOW OTHERS DENY AND DELETE-ALL “C:/secure/marketing/**”

The policy protects data on desktop and laptop computers by deleting allsensitive files in “C:/secure/marketing/” the first time an unauthorizeduser tries to access such files. The operation that deletes sensitivefiles is specified as a remediation action in the policy.

Step 1 (1301): A user that is a member of the Engineering group tries toopen a file in “C:/secure/marketing/” which is left over by a previoususer of a laptop computer.

Step 2 (1302): A normal file open application code is executed andresults in a call to a file operation in the operating system library.

Step 3 (1303): The file open operation system call is intercepted by theinterceptor and consequence applicator 1309. The interceptor andconsequence applicator 1309 collects information about the action,document, and application, among other information. The collectedinformation is forwarded to the policy engine 1307.

Step 4 (1304): The policy engine 1307 receives the information collectedby the interceptor and consequence applicator 1309 and performs policyevaluation. The intercepted action is OPEN which matches the policy andthe policy is then evaluated. The policy engine 1307 compares thedocument name and path against “C:/secure/marketing/”, checks if theuser is in the Marketing group, and determines that the action should bedenied. In addition, there is a remediation task associate with thepolicy that the policy engine 1307 needs to carry out. The policy engine1307 returns a DENY effect to the interceptor and consequence applicator1309.

Step 5 (1305): The policy engine 1307 calls a delete remediation handler1308 to carry out the remediation task specified in the policy. In thisexample, the delete remediation handler 1308 deletes all files under“C:/secure/marketing/”.

Step 6 (1306): The interceptor and consequence applicator 1309 receivesa DENY effect from policy engine 1307 and terminates the file openoperation.

FIG. 14 illustrates an embodiment where a policy enforcer on a virtualfile server (e.g., a virtual network attached storage (NAS) device suchas Acopia Adaptive Resource Switch, NeoPath File Director, or RainfinityRainStorage) protects files served by the virtual file server.

The policy definition is:

FOR document.name = “//server001/engineering/projectA/**” ON OPEN BYuser = ProjectA-Team DO ALLOW

This scenario demonstrates a situation where a user (or application)action triggers an operation on a file residing on a network attachedstorage (NAS) device 1407 and the file is accessed through a virtualfile server 1404 and policy-based authorization (or policy enforcement)occurs at the virtual file server 1404. The user or application actioncan be performed on any workstation including one that is controlled bya workstation policy enforcer 1401 or one that is not 1403. FIG. 14illustrates a topological diagram containing two workstations 1401,1403, a virtual file server 1404, a file server 1406 and a NAS device1407. The workstations 1401, 1403 access files residing on the fileserver 1406 and the NAS device 1407 through virtual file server 1404.

Step 1 (1408, 1409): A user or application initiates an action. Theaction triggers a file operation on a file residing on the NAS device1407. Since the file path associated with the file operation refers to afile on virtual file server “server001” 1404 (even though the file is onthe NAS device 1407), a file operation request is made to virtual fileserver 1404. The workstation 1401 or 1403 where the action is initiated,can be controlled by a workstation policy enforcer or not controlled bya workstation policy enforcer.

Step 2 (1410): The virtual file server 1404 receives the file operationrequest. The request is run through an authorization process initiatedby an interceptor installed on the virtual file server 1404 (where theinterceptor intercepts the file operation request) or an authorizationstep built into the virtual file server 1404 (where interception is anintegral part of the virtual file server's program logic). Theauthorization process involves collecting information about the fileoperation request and forwards that information to a policy enginerunning on the virtual file server 1404.

Using rules distributed by a policy server, information collected by theauthorization process, and other environment and configuration data, thepolicy engine determines if the file operation request should be allowedor denied. The policy engine will also carry out any obligation andremediation operations deemed necessary. The policy engine may alsodecide to store information to help process future file operationrequests.

The authorization processing program logic receives a return status(i.e., effect) from the policy engine. Based on the status, theauthorization processing program logic may allow a file operationrequest to a file on the NAS device 1407 to be processed; or deny thefile operation request. If a file operation request is allowed, thevirtual file server 1404 performs its normal processing and forwards thefile operation request to the NAS device 1407.

Step 3 (1411): The NAS device 1407 serves the file operation request andreturns a response back to the workstation 1401 through the virtual fileserver 1404.

FIG. 15 illustrates an embodiment where a policy enforcer on a filegateway (e.g., a wide area network file services (WAFS) gateway such asCisco File Engine series appliances or Tacit IShared products orRiverbed Steelhead appliances) protects files accessed through the filegateway.

The policy definition is:

FOR document.name = “//server123/marketing/products/**” ON OPEN BY user= Marketing DO ALLOW

This scenario demonstrates the situation where a user (or application)action triggers an operation on a file residing on a file server that isbeing accessed through a file gateway 1502 and policy-basedauthorization (or policy enforcement) occurs at the file gateway 1502.FIG. 15 shows a topological diagram containing a workstation 1501, afile gateway (e.g., a WAFS gateway) 1502, a WAFS server 1504, a fileserver 1505 and a network attached storage (NAS) device 1506. Theworkstation 1501 access files residing on the file server 1505 and theNAS device 1506 through the file gateway 1502.

Step 1 (1507): User or application initiates an action. The actiontriggers a file operation on a file resided on a file server “server123”1505. The workstation 1501, where the action is initiated can becontrolled by a workstation policy enforcer or not controlled by aworkstation policy enforcer. Since the workstation 1501 is connected tothe file server 1505 through a file gateway 1502, the file operationrequest first reaches the file gateway 1502.

Step 2 (1508): The file gateway 1502 receives the file operationrequest. The request is run through an authorization process initiatedby an interceptor installed on the file gateway 1502 (where theinterceptor intercepts the file operation request) or an authorizationstep built into the file gateway 1502 (where interception is an integralpart of the file gateway's program logic). The authorization processinvolves collecting information about the file operation request andforwards that information to a policy engine running on the file gateway1502.

Using rules distributed by a policy server, information collected by theauthorization process, and other environment and configuration data, thepolicy engine determines if the file operation request should be allowedor denied. The policy engine will also carry out any obligation andremediation operations deemed necessary. The policy engine may alsodecide to store information to help process future file operationrequests.

The authorization processing program logic receives a return status(i.e., effect) from the policy engine. Based on the status, theauthorization processing program logic may allow a file operationrequest to a file on the file server 1505 to be processed; or deny thefile operation request.

By controlling file access at file gateway 1502, a file gateway policyenforcer protects files stored on file server 1505, NAS device 1506, andfiles cached on the file gateway 1502.

Steps 3-4 (1509, 1510): If a file operation request is allowed, the filegateway 1502 performs its normal processing and forwards the fileoperation request to the WAFS server 1504 and finally to the file server1505. The file server 1505 serves the file operation request and returnsa response back to the workstation 1501 through the WAFS server 1504 andthe file gateway 1502.

FIG. 16 illustrates an embodiment that controls application usage on aworkstation. The policy definition is:

FOR document.name = “*.doc” ON PRINT BY user = Guests AND application =“Microsoft Word” DO DENY OTHERS ALLOW

The policy specifies that printing a file from Microsoft Word by a userwho is logged into a guest account is not allowed.

Step 1 (1601): A user has a document opened in Microsoft Word. The usertries to print the document in Microsoft Word by selecting menu item“File|Print” or pressing a print button on a toolbar.

Step 2 (1602): The user action is being intercepted by an applicationprogram interceptor and consequence applicator 1606 before reaching thecode that implements the print function. Interception in Microsoft Wordcan be implemented as a Microsoft Office add-in module. The interceptorcollects information about the action (e.g., print), the document andthe application program (i.e., Microsoft Word); and forwards theinformation to a policy engine 1607 on the workstation.

Step 3 (1603): The policy engine 1607 receives data collected by theinterceptor and consequence applicator 1606 and selects policiesrelevant to the data received. It then evaluates the relevant policiesusing the data received along with any applicable configuration andenvironmental data. In this example, assume only the above policy isselected.

The file name of the document to be printed is compared with the “*.doc”pattern in the policy. The action collected by the interceptor iscompared with the “PRINT” specified in the action element of the policy.The application program information collected by the interceptor iscompared with “Microsoft Word” specified in the subject element of thepolicy and the current user information is compared with a LDAP group,“Guests”, specified in the subject element of the policy.

The outcome of the policy evaluation process is a policy consequence.The policy consequence contains a policy effect (this value is normallyALLOW or DENY) and any optional obligation and remediation tasks to beperformed. If the condition specified in the above policy is satisfied,the positive policy effect specified in the policy consequence elementis applied (DENY in the above policy). If the condition in a policy isnot satisfied, the negative policy effect specified after the OTHERSkeyword is applied. In the case where the OTHERS keyword is notspecified, a negation of the positive policy effect is applied.

Step 4 (1604): Policy engine returns a policy consequence to theinterceptor and consequence applicator 1606 which contains a policyeffect. If the policy effect is ALLOW, the consequence applicator allowsthe print operation to be carried out. If policy effect is DENY, theconsequence applicator terminates the print operation.

Step 5 (1605): When the print action is allowed, application code iscalled to carry out the action.

FIG. 17 illustrates an embodiment that controls application usage on aworkstation. The policy definition is:

ON PASTE BY user = Guest AND application = Instant-Messenger DO DENY

The above policy prevents a user that is logged in as Guest from copyingdata into an Instant Messenger program. The policy does not involve anyfile and nonfile system objects. Application usage control is applied tothe paste command on application data only.

Step 1 (1701): A user performs a “Paste” operation in Yahoo Messenger.The paste action can be invoked through “Edit|Paste” or accelerator keys<Ctrl>+V in Microsoft Windows.

Step 2 (1702): An interceptor and consequence applicator 1706 installedin Yahoo Messenger intercepts the application program operation (e.g.,paste). The interceptor collects information regarding the action andthe application program (here, Yahoo Messenger) and forwards the datacollected to a policy engine 1707 on the workstation.

Step 3 (1703): The policy engine 1707 receives the data collected by theinterceptor and consequence applicator 1706 and selects policiesrelevant to the data received. In this example, assume only the abovepolicy is selected. If the data received contains action PASTE, the useris a member of Guests, and the application program is a member of theInstant-Messenger group, then the condition of the above policy issatisfied and the effect specified in the policy is returned in thepolicy consequence. In this case, the policy evaluation produces thepolicy effect of DENY.

Step 4 (1704): The interceptor and consequence applicator 1706 receivesthe policy consequence returned by the policy engine. Since the policyeffect contained in the policy consequence is DENY, the consequenceapplicator blocks the paste operation.

Step 5 (1705): If the policy consequence returned in step 3 containedthe policy effect ALLOW, then the application code would be executed tocomplete the paste operation.

FIG. 18 illustrates an embodiment that controls application usage onnonfile system objects at a client computer.

The policy definition is:

FOR message.from = CEO AND message.to < > “*@ourcompany.com” ON FORWARDBY user <> CEO DO DENY

The policy above prevents the forwarding of e-mail messages from acompany's CEO to anyone outside the company unless the sender is the CEOhimself/herself. This policy can be evaluated at a workstation or adocument server (i.e., e-mail server).

Step 1 (1801): A user forwards an e-mail message in Microsoft Outlook toa friend outside the company.

Step 2 (1802): An interceptor and consequence applicator 1812 installedin Microsoft Outlook intercepts the forward operation. The interceptorcollects information about the action, the message and the applicationprogram (here, Microsoft Outlook) and forwards that information to apolicy engine 1814 on the workstation.

Step 3 (1803): The policy engine 1814 receives the data collected by theMicrosoft Outlook interceptor and consequence applicator 1812 andselects policies relevant to the data received. In this example, assumeonly the above policy is selected. The policy engine performs the policyevaluation and performs comparisons on the action, the source of themessage, the recipients, and the user. If action is FORWARD, the messageis from the CEO, the user is not the CEO, and the message is sent to aperson outside the company, then the policy consequence returnedcontains a policy effect of DENY.

Step 4 (1804): The interceptor and consequence applicator 1812 receivesa policy consequence containing the policy effect of DENY. Theconsequence applicator applies the policy effect of blocking the forwardoperation.

Step 5-10 (1805-1811): In the case where the policy consequence returnedto the interceptor and consequence applicator 1812 contains the policyeffect of ALLOW, the consequence applicator will not block the forwardoperation. The application code that implements the forward operation isexecuted. The operation may be intercepted again in step 6 (1806) at themessaging API level 1813. Policy evaluation occurs and in this case thepolicy engine returns a policy consequence with the policy effect ofALLOW. The messaging API completes delivery of the message to a mailserver (i.e., Microsoft Exchange Server) which may have a policyenforcer installed 1815, or may not have a policy enforcer installed1816. Once the mail reaches a mail server, the mail server will beresponsible for delivering it to the final destination.

FIG. 19 illustrates an embodiment that combines application usage anddocument access control on files at a client computer.

The policy definition is:

/* File access control */ FOR document.name =“//server1/EarningReports/*”ON OPENBY user = Executives DO ALLOW OTHERSDENY /* Application usage control */ FOR document.name =“//server1/EarningReports/*” ON PRINT, COPY BY user = Audit-Committee DOALLOW OTHERS DENY

The above policies are designed to implement fine-grained control on thedocuments residing within “//server1/EarningReports/” directory. Thefirst policy is designed to implement access control allowing onlyexecutives to view these documents. The second policy controls usagethat only audit committee members who are subset of executives can copyor print such documents.

FIG. 19 shows a typical workstation policy enforcer configuration with apolicy engine, at least one application program interceptor andconsequence applicator 1910, and an operating system library interceptorand consequence applicator 1911. The application program interceptor andconsequence applicator 1910 is responsible for intercepting applicationprogram operations—which represents usage. Usage includes copying andprinting. Usage information is generally available inside an applicationprogram. For example, by intercepting copying and printing insideWindows Explorer, the system can prevent users from copying and printinga file. In addition, copy operations can also be blocked by intercepting“Save As” operations with file names different from the name of thecurrently opened file in an application program.

The operating system library interceptor and consequence applicator 1911intercepts all types of accesses to a file. For example, a simple textfile in “//server1/EarningReports/balancesheet.txt” can be viewed usingMicrosoft Notepad, Microsoft Word, Microsoft Wordpad, DOS command “type”and “edit”, and any application program that can open a text file. Acommon thread among these application programs are the need to open afile before the contents of a file can be read and displayed. Byintercepting file operation system calls such as open( ), fopen( ), andCreateFile( ), a policy enforcer can prevent unauthorized access fromall application programs including those that are instrumented withinterceptors and consequence applicators and those that are notinstrumented.

In the current example, the objective is to limit document access to agroup of users and further limit usage to an even smaller group ofusers. Implementing such a policy requires the ability to control bothaccess and usage. Controlling access at the operating system librarylevel only, cannot distinguish the intended usage of an open( ) fileoperation call, i.e., whether the content will be viewed or printed.

On the other hand, controlling usage at the application program levelonly cannot provide comprehensive access control because an interceptorin an application program has a limited ability to intercept documentaccesses. Further, a newly installed program without instrumentation canbypass such control.

Operation: OPEN

Step 1 (1901): A user who is designated an executive opens a file in“//server1/EarningReports/” using Microsoft Word.

Step 2 (1902): The open operation is intercepted by a Microsoft Wordinterceptor and consequence applicator 1910. The interceptor collectsinformation about the action (OPEN), the document and the applicationprogram (here, Microsoft Word) and forwards the data collected to apolicy engine 1912 on the workstation.

Step 3 (1903): The policy engine 1912 receives data collected by theinterceptor and consequence applicator 1910 and selects policiesrelevant to the data received. Since the current action is OPEN, thefirst policy above is selected. The second policy is not selected inthis case. The policy engine evaluates the relevant policies withinformation provided by the interceptor and other environmental andconfiguration data available to the policy engine. To evaluate the firstpolicy, the policy enforcer compares the intercepted document name andpath against “//server1/EarningReports/*”, the action compared withOPEN, and checks if the user is in the Executives group. The action inthe second policy, above, is associated with COPY and PRINT and is thusnot evaluated. When a policy condition is satisfied, the policy effect(ALLOW) specified in the first policy is returned in a policyconsequence. In this case, the policy effect produced by the policyengine is ALLOW.

Step 4 (1904): The interceptor and consequence applicator 1910 receivesthe policy consequence containing policy effect ALLOW. The file openoperation is allowed to continue. If the policy effect returned bypolicy engine 1912 was DENY, the consequence applicator blocks the fileopen operation.

Step 5 (1905): The application code in Microsoft Word for handling thefile open operation is executed and results in an open( ) file operationsystem call.

Step 6 (1906): The open( ) call is intercepted by an operating systemlibrary interceptor and consequence applicator 1911. The interceptorcollects information regarding the intercepted operation as in step 2(1902) and forwards the data collected to the policy engine 1912.

Step 7 (1907): The policy engine 1912 receives the data collected by theinterceptor and performs policy selection and evaluation similar to thatin step 3 (1903). Alternatively, as an optimization step the policyengine may determine that the interception that occurred at step 6(1906) belongs to same operation intercepted recently in step 2 (1902)and that the same policy consequence should be returned. In either case,the policy evaluation produces an ALLOW policy effect for the firstpolicy above.

Step 8 (1908): The interceptor and consequence applicator 1911 receivesa policy consequence from the policy engine 1912 containing the policyeffect of ALLOW. The consequence applicator then allows the call to theopen( )function in the operating system library to continue.

Step 9 (1909): The operating system library code for implementing thefile open operation is executed.

Operation: PRINT

Step 1 (1901): A user who is designated an executive and a member of theaudit committee tries to print a file in “//server1/EarningReports/”using Microsoft Word.

Step 2 (1902): The print operation is intercepted by a Microsoft Wordinterceptor and consequence applicator 1910. The interceptor collectsinformation about the action (PRINT), the document, and the applicationprogram (here, Microsoft Word), and forwards the data collected to apolicy engine 1912 at the workstation.

Step 3 (1903): The policy engine receives data collected by theinterceptor and consequence applicator 1910 and selects policiesrelevant to the data received. Since the current action is PRINT, thesecond policy is selected. The policy engine evaluates the relevantpolicies with information provided by the interceptor and otherenvironmental and configuration data available to the policy engine. Inthis case, assume a policy condition is satisfied and a policy effect ofALLOW is returned in a policy consequence.

Step 4 (1904): The interceptor and consequence applicator 1910 receivesthe policy consequence containing a policy effect of ALLOW. The fileprint operation is allowed to continue. If the policy effect returned bythe policy engine is DENY, the consequence applicator blocks the fileprint operation.

Step 5 (1905): Application code in Microsoft Word for handling the fileprint operation is executed and the document is successfully printed.Since normal print operation in Microsoft Word does not access the fileassociated an open document, steps 6-9 (1906-1909) are not required.

Operation: COPY

Step 21 (1921): A user who is designated an executive but not a memberof the audit committee tries to copy a file in“//server1/EarningReports/” using Windows Explorer.

Step 22 (1922): The copy operation is intercepted by a Windows Explorerinterceptor and consequence applicator 1925. The interceptor collectsinformation about the action (COPY), the document, and the applicationprogram (here, Windows Explorer), and forwards the data collected to apolicy engine 1912 on the workstation.

Step 23 (1923): The policy engine receives data collected by theinterceptor and consequence applicator 1925 and selects policiesrelevant to the data received. Since the current action is COPY, thesecond policy is selected. The policy engine evaluates the relevantpolicies with information provided by the interceptor and otherenvironmental and configuration data available to the policy engine. Inthis case, assume a policy condition is not satisfied and a policyeffect DENY is returned in a policy consequence.

Step 24 (1924): The interceptor and consequence applicator 1925 receivesthe policy consequence containing a policy effect DENY and the file copyoperation is blocked.

FIG. 20 illustrates an embodiment that uses an obligation to implement aregulatory compliance requirement. The policy definition is:

FOR message.subject = “*” ON SEND BY user = Executives DO ALLOW ANDARCHIVE OTHERS ALLOW

The main objective of the above policy is not controlling access insteadit is designed to carry out an obligation. Note that the system can havepolicies that apply to both control and obligation. The above policy isused to implement a regulatory compliance requirement that all e-mailmessages sent by an executive in a public company must be archived for 7years.

Step 1 (2001): A user who is designated an executive sends an e-mailmessage using Microsoft Outlook.

Step 2 (2002): An interceptor and consequence applicator 2007 installedin Microsoft Outlook intercepts the send operation. The interceptorcollects information about the action (SEND), the message and theapplication program (here, Microsoft Outlook) and forwards the datacollected to a policy engine 2008 on the workstation.

Step 3 (2003): The policy engine 2008 receives the data collected by theinterceptor and consequence applicator 2007 and selects policiesrelevant to the data received. The policy engine performs the policyevaluation on the relevant policies. In this example, assume only theabove policy is selected. When the conditions of the above policy aresatisfied, the policy consequence specified in the policy is adopted. Inthis case, the policy evaluation produces a policy effect of ALLOW andan obligation of ARCHIVE. The policy engine calls an obligation handler2009 to implement the ARCHIVE obligation and returns the policy effectto the interceptor and consequence applicator 2007.

Step 4 (2004): An obligation handler 2009 responsible for carrying outARCHIVE obligation is called along with the message to be sent. In thiscase, the archive obligation handler sends a copy of the message to amessage archive server.

Step 5 (2005): The interceptor and consequence applicator 2007 receivesthe policy consequence from the policy engine 2008 containing the policyeffect of ALLOW. The consequence applicator allows the send operation tocontinue.

Step 6 (2006): The application code in Microsoft Outlook that implementsthe send operation is executed.

FIG. 21 illustrates an embodiment that controls application usage onnonfile system objects at a client computer. The policy definition is:

FOR document.name = “\\server3\finance\storesales-weekly.xls” ON OPEN BYuser = Finance-Staff AND application = Excel DO ALLOW ANDEXCEL:PROTECT(FORMULA)

This policy implements control over application functions. In thisexample, a finance department manager wants to prevent unauthorizedchanges to formulas in a spreadsheet. The above policy is written toenable blocking of changes to spreadsheet formulas whenever a staff inthe finance department opens the controlled spreadsheet. In this case,the blocking operation is implemented as a Microsoft Excel add-on modulethat monitors and blocks edit operations on a formula. In other cases,the protection may be implemented by simply making sure that thebuilt-in protection feature in Microsoft Excel is turned on at the timea spreadsheet is opened.

The steps involved in carrying out the above protection mechanism arethe following:

Step 1 (2101): A user in the finance department tries to open a salesreport spreadsheet using Microsoft Excel.

Step 2 (2102): An interceptor and consequence applicator 2105 installedin Microsoft Excel intercepts the open operation. The interceptorcollects information about the action (OPEN), the document, and theapplication program (Microsoft Excel) and forwards the data collected toa policy engine 2106 on the workstation.

Step 3 (2103): The policy engine 2106 receives the data collected by theinterceptor and consequence applicator 2105 and selects policiesrelevant to the data received. The policy engine evaluates all relevantpolicies. In this example, assume only the above policy is selected.When the conditions of the above policy are satisfied, the policyconsequence specified in the policy is adopted. In this case, the policyevaluation produces a policy effect of ALLOW and an obligation task ofEXCEL:PORTECT. The policy consequence is returned to the interceptor andconsequence applicator 2105.

Step 4 (2104): The interceptor and consequence applicator 2105 receivesa policy consequence from the policy engine 2106 containing the policyeffect ALLOW and the obligation task EXCEL:PROTECT. The consequenceapplicator first allows the open operation to be carried out. Once thespreadsheet is opened, the EXCEL:PROTECT obligation handler in theinterceptor and consequence applicator 2105 is invoked with theparameter FORMULA to enable the protection function.

Note that the obligation handling task is implemented by the interceptorand consequence applicator 2105 in this example. In other examples,standard obligation tasks such as LOG, ARCHIVE, NOTIFY and ENCRYPT arehandled by the policy engine. In addition, the obligation task in thisexample is implemented after the application program operation iscarried out. Some obligation handlers are invoked by the policy engineat the end of policy evaluation. Other obligation handlers are invokedby a consequence applicator. Also, some obligation tasks may be carriedout before the application program operation while others happensafterward.

Step 5 (2105): The application code in Microsoft Excel is executed tocomplete the open operation.

FOR document.name = “\\server3\finance\storesales-weekly.xls” ONEDIT-FORMULA BY user = Finance-Staff AND application = Excel DO DENY

The example described above in FIG. 21 can also be implemented using analternative method. The example above uses a combination of policyobligation and an add-in module that carries out the obligation ofprotecting formulas from being edited. The task of enabling such anobligation function is carried out every time a user opens thecontrolled spreadsheet. On the other hand, the policy above interceptscell edit operations. If a user attempts to edit a formula, the abovepolicy is evaluated which results in the operation being blocked.

The difference between the two examples is that first does not performpolicy evaluation on every edit operation while the policy aboverequires policy evaluation on every edit operation (or formula editoperation) being intercepted.

FIG. 22 a illustrates an embodiment where a document server policyspecifies information to be obtained from a point-of-use policy enforcerduring policy evaluation.

The policy definition is:

FOR document.category = “Highly-sensitive” ON POU:COPY, POU:SEND DO DENYOTHERS ALLOW

The prefix “POU:” in POU:COPY and POU:SEND is an information exchangedirective which instructs a policy engine that evaluates the policy toperform evaluation based on information (here, an action) about theoperation gathered at a point-of-use. In this case, the point-of-use isa workstation that initiated the operation.

An alternative syntax:

FOR document.category = “Highly-sensitive” ON OPEN WHERE NOTPOLICY-ENFORCER-AT-POU  OR POU-POLICY-ENFORCER(ACTION = {COPY, SEND}) DODENY OTHERS ALLOW

The above policy specification uses information exchanges directives toinstruct a policy engine evaluating the policy to perform two prescribedfunctions. The first directive POLICY-ENFORCER-AT-POU instructs a policyengine to check if there is a policy enforcer at a point-of-use wherethe point-of-use being a workstation that initiated the operation beingintercepted at a document server where the policy is being evaluated. Ifa document server policy enforcer detects the presence of a policyenforcer at the point-of-use, the directive evaluates to true, andotherwise false. The second directive POU-POLICY-ENFORCER instructs apolicy engine to check if an action associated with the operation isassociated with action COPY or SEND at the point-of-use. Point-of-useaction information is normally collected by a workstation policyenforcer.

Another alternative syntax:

FOR document.category = “Highly-sensitive” ON OPEN WHERE NOTpou.hasPolicyEnforcer  OR pou.policyEnforcer.action = {COPY, SEND} DODENY OTHERS ALLOW

The information exchange directives pou.hasPolicyEnforcer andpou.policyEnforcer.action in the above policy are functional equivalentsof the directives POLICY-ENFORCER-AT-POU and POU-POLICY-ENFORCERdiscussed above.

This example illustrates a collaborative policy evaluation that relieson information exchange between two policy enforcers. It shows a fileserver policy enforcer trying to enforce a policy that requires useraction information captured at a point-of-use (by a workstation policyenforcer). In order to evaluate such a policy, a file server policyenforcer initiates a conversation with a workstation policy enforcer (onthe workstation that initiates the file request). If the file serverpolicy enforcer cannot find a policy enforcer on the workstation thatmakes the file request, the file server policy evaluates to an effect ofDENY. If workstation policy enforcer tells the file server policyenforcer the action it intercepts is OPEN (operation for viewing afile), the file server policy evaluates to an effect of ALLOW. On theother hand, if the workstation policy enforcer tells the file serverpolicy enforcer that the intercepted action is COPY, the document serverpolicy will evaluate to an effect of DENY.

The following example details a sequence of events that occur during theevaluation of a document server policy that requires informationexchange.

Step 1 (2201): A user at a workstation 2218 tries to open a file forviewing.

Step 2 (2202): An application program interceptor and consequenceapplicator 2220 on the workstation intercepts the file open operation.The interceptor collects information about the interception whichincludes the action (e.g., OPEN), the file name, and other applicationprogram information and sends the collected data to the policy engine2219.

Step 3 (2203): The policy engine 2219 receives the data collected by theinterceptor and consequence applicator 2220 and selects policiesrelevant to the intercepted action and collected data. In this example,assume only the above policy is selected. The policy engine evaluatesthe selected policies using the collected data along with other dataavailable to the policy engine such as current user and operatingenvironment data. The policy evaluation results in a consequence. Assumein this example that the policy evaluation produces the policy effect ofALLOW.

Step 4 (2204): The consequence produced by the policy engine is returnedto the interceptor and consequence applicator 2220. The interceptor andconsequence applicator component (I&CA) is composed of two functionalparts: interceptor, and consequence applicator. The interceptor isresponsible of intercepting application program actions and theconsequence applicator is responsible for applying decisions (orconsequences) made by the policy engine. Since the consequence producedby the policy evaluation in this example contains a policy effect ofALLOW, the operation is not blocked by the consequence applicator.

Step 5 (2205): The application program logic required to carry out thefile open operation is executed.

Step 6 (2206): Execution of the application program logic results in afile open request at the file server 2221.

Step 7 (2207): The file open request is intercepted by a network fileshare protocol interceptor and consequence applicator 2223 at the fileserver. The interceptor collects information about the file open requestand forwards the collected data to a policy engine 2222 on the fileserver.

Step 8 (2208): The policy engine 2222 receives the data collected by theinterceptor and consequence applicator 2223 and selects relevantpolicies based on the data received. Among the policies selected, onepolicy (here, the above policy 2227) contains information exchangedirectives that specify information to be obtained from the point-of-use(i.e., the workstation 2218 that initiated the file open request). Notethat when the POU:COPY policy syntax is used, the policy enforcerimplicitly maps the POU:COPY action to a local OPEN action.

Step 9 (2209): The policy engine 2222 attempts to detect the presence ofa policy enforcer at the point-of-use 2228. If a policy enforcer cannotbe detected at the point-of-use or communication to the policy enforcerfails, the policy engine will produce a consequence with a policy effectof DENY according to the above policy. If a policy enforcer at thepoint-of-use can be contacted, the policy engine at the file serverrequests the originating interception data from the workstation policyenforcer. In this case, assume the policy engine 2222 has successfullyconnected to the policy enforcer on workstation 2218.

Step 10 (2210): The workstation policy enforcer returns the originatinginterception data to the file server policy engine 2222. In this case,the action intercepted at the point-of-use is OPEN. The policy engineevaluates the relevant policies using the data collected by the localinterceptor, data requested from the workstation policy enforcer, anddata available to the file server policy enforcer. Assume the policyevaluation process produces a consequence that contains a policy effectof ALLOW.

Step 11 (2211): The policy consequence is returned to the interceptorand consequence applicator 2223. Since the consequence contains a policyeffect of ALLOW, the consequence applicator does not block the file openrequest.

Step 12 (2212): The file open request is processed by the network fileshare protocol driver 2224.

Steps 13-17 (2213-2217): The steps between step 13 and step 17 as shownin the diagram may or may not be carried out depending on policyenforcer and file server implementations. The following outlines one ofthe possible scenarios:

(1) In step 12 (2212), the network file share protocol driver 2224 logicresults in a call to the file system device driver 2226. The call isintercepted at step 13 (2213) by an interceptor and consequenceapplicator 2225. The interceptor collects information about theintercepted operation and forwards that data to the policy engine 2222.Policy engine evaluates relevant policies in step 14 (2214) and returnsa policy effect of ALLOW to the interceptor and consequence applicator2225. In step 15 (2215), the interceptor and consequence applicatorallows the call to be carried out. In step 16 and 17 (2216, 2217), filesystem device driver logic is executed to serve the file open requestwhich involves accessing data on a local disk.

FIG. 22 b illustrates an embodiment where a workstation policy enforcertransmits information obtained at a workstation to a file server policyenforcer to support policy evaluation at the file server policyenforcer.

The definition of the policy of interest that is evaluated at the fileserver is:

FOR document.category = “Private” ON POU:COPY DO DENY OTHERS ALLOW

The prefix “POU:” in POU:COPY is an information exchange directive thatinstructs a policy engine that evaluates the policy to perform anevaluation based on information (here, an action) related to theoperation gathered at a point-of-use. In this case, the point-of-use isa workstation that initiated the operation.

An alternative syntax is:

FOR document.category = “Private” ON OPEN WHEREPOU-POLICY-ENFORCER(ACTION = {COPY}) DO DENY OTHERS ALLOW

The above policy specification uses information exchange directives toinstruct a policy engine that evaluates the policy to perform aprescribed function. The directive POU-POLICY-ENFORCER instructs thepolicy engine to check if an action intercepted at a point-of-use by apolicy enforcer that is associated with the operation is COPY.

In other words, the policy describes if a file server policy enforcerdoes not have information to enforce a policy on a copy action, itshould acquire the information needed to enforce the policy. In thiscase, to examine a request message for information attached by aworkstation policy enforcer that initiated the request.

This example illustrates a collaborative policy evaluation that relieson information exchange between two policy enforcers. It shows a fileserver policy enforcer trying to enforce a policy that requires useraction information captured at a point-of-use (by a workstation policyenforcer). In order to evaluate the policy at a file server, aworkstation policy enforcer attaches information it has gathered aboutan operation to one or more messages it sends to the file server. A fileserver policy enforcer examines the messages it receives for suchattached information and uses the information in policy evaluation. If afile server policy enforcer cannot find such attached information, apolicy that specifies point-of-use information (such as the abovepolicy) may evaluate to an effect DENY.

A message where a workstation policy enforcer may attach point-of-useinformation includes: Internet Protocol message (e.g., User DatagramProtocol (UDP) or Transmission Control Protocol (TCP) message), networkfile share protocol message (e.g., CIFS or NFS message), or applicationprotocol message (e.g., HTTP, SOAP, XML-RPC, SMTP, POP3, IMAP4, FTP orWebDAV message).

According to the above policy, if a workstation policy enforcer tells afile server policy enforcer that an action it has intercepted was OPEN(an action OPEN intercepted at a point-of-use may correspond to a useraction of viewing a file), the above policy should evaluate to a policyeffect of ALLOW at the file server. On the other hand, if theworkstation policy enforcer tells the file server policy enforcer thatthe intercepted action was COPY, the above policy should evaluate to apolicy effect DENY.

The following example details a sequence of events that occur during theevaluation of a file server policy that requires information exchange.

Step 1 (2264): A user at a workstation 2251 tries to open a file forviewing.

Step 2 (2265): An application program interceptor and consequenceapplicator 2254 on the workstation intercepts the file open operation.The interceptor collects information about the interception whichincludes the action (e.g., OPEN), the file name, and other applicationprogram information and sends the collected data to a policy engine2253.

Step 3 (2266): The policy engine 2253 receives the data collected by theinterceptor and consequence applicator 2254 and selects policiesrelevant to the intercepted action and collected data. In this example,assume only the above policy is selected. The policy engine evaluatesthe selected policies using the collected data along with other dataavailable to the policy engine such as current user and operatingenvironment data. The policy evaluation results in a consequence. Assumein this example that the policy evaluation produces a policy effect ofALLOW.

Step 4 (2267): The policy engine 2253 makes available all or part of theinformation collected by the interceptor and consequence applicator 2254and any additional information needed to evaluate policy at a fileserver (together called point-of-use information below) to the enforcerdata service adaptor 2256 for transmission to the file server.

Step 5 (2268): The consequence produced by the policy engine 2253 isreturned to the interceptor and consequence applicator 2254. Theinterceptor and consequence applicator component is composed of twofunctional parts: interceptor, and consequence applicator. Theinterceptor is responsible of intercepting application program actionsand the consequence applicator is responsible for applying decisions (orconsequences) made by the policy engine. Since the consequence producedby the policy evaluation in this example contains a policy effect ofALLOW, the operation is not blocked by the consequence applicator.

Step 6 (2269): The application program logic required to carry out thefile open operation is executed.

Step 7 (2270): The file open application program logic resulted in oneor more network packets being sent through a network device driver 2255.The network packets are intercepted by the enforcer data service adaptor2256 and the point-of-use information is placed on at least one networkpackets being intercepted.

In an alternative implementation, the point-of-use information may beprovided by the interceptor and consequence applicator 2254 in step 2(2265). In this case, if no other information needs to be furnished bythe policy engine 2253, step 4 (2267) may be eliminated.

Step 8 (2271): Network packets originated from the workstation found itsway to a file server 2252. The enforcer data service adaptor 2260 at thefile server intercepts network packets arrived at the file server andextract the point-of-use information attached in step 7 (2270). Thepoint-of-use information extracted is made available to a policy engine2257 at the file server. The enforcer data service adaptor 2260 passesnetwork packets to a network device driver 2261 to continue normalprocessing of network traffic.

Step 9 (2272): For network file share protocol traffic, the networkdevice driver 2261 at the file server passes network packets (ormessages) it receives to a network file share protocol driver 2259 forfurther processing. Before the network packets reach the network fileshare protocol driver, they are intercepted by an interceptor andconsequence applicator 2258 at the file server. The interceptor collectsinformation about an operation (e.g., a file open request) and forwardsthe collected data to a policy engine 2257 at the file server.

Step 10 (2273): The policy engine 2257 receives the data collected bythe interceptor and consequence applicator 2258 and selects relevantpolicies based on the data received. Among the policies, one policy(here, the above policy) contains information exchange directives thatspecify information to be obtained from the point-of-use (i.e., theworkstation 2251 that initiated the file open request).

Note that POU:COPY policy syntax implicitly maps to a local OPEN actionmaking the policy relevant to an OPEN operation that is interceptedlocally.

Policy engine 2257 attempts to locate point-of-use information providedby the workstation that initiated the operation. In this case, anattempt to locate point-of-use information is successful and thepoint-of-use information provided in step 8 (2271) is found. Thepoint-of-use information contains an action OPEN. As a result, the abovepolicy is not selected (the policy applies if an action contains in thepoint-of-use information is COPY).

The policy engine determines a set of relevant policies and evaluatesthe relevant policies using the data collected by the local interceptor,the point-of-use information, and data available to the file serverpolicy enforcer. In this case, assume the policy evaluation processproduces a consequence that contains a policy effect of ALLOW.

In a specific implementation, the above policy is selected even thoughthe point-of-use action is OPEN (not COPY) and evaluation of the policyproduce an effect ALLOW.

Step 11 (2274): The policy consequence is returned to the interceptorand consequence applicator 2258. Since the policy consequence contains apolicy effect of ALLOW, the consequence applicator does not block thefile open request.

Step 12 (2275): The file open request is processed by the network fileshare protocol driver 2259.

Steps 13-17 (2276-2280): The steps between step 13 and step 17 as shownin the diagram may or may not be carried out depending on policyenforcer and file server implementations. The following outlines one ofthe possible scenarios:

(1) In step 12 (2275), the network file share protocol driver logicresults in a call to the file system device driver 2263. The call isintercepted at step 13 (2276) by an interceptor and consequenceapplicator 2262. The interceptor collects information about theintercepted operation and forwards that data to the policy engine 2257.The policy engine evaluates relevant policies in step 14 (2277) andreturns a policy effect of ALLOW to the interceptor and consequenceapplicator 2262. In step 15 (2278), the interceptor and consequenceapplicator allows the call to be carried out. In step 16 and 17 (2279,2280), file system device driver logic is executed to serve the fileopen request which involves accessing data on a local disk.

The enforcer data service adaptors 2256 and 2260 illustrated in thisexample are associated with network device drivers and attach data toand extract data from network packets respectively. In anotherimplementation of information exchange, the enforcer data serviceadaptor 2256 at the workstation creates one or more custom data packetscontaining point-of-use information and sends them to the file server2252. These custom data packets are processed by enforcer data serviceadaptor 2260 at the file server which extracts point-of-use informationfrom the custom data packets and make the point-of-use informationavailable to the policy engine 2257.

In another implementation of information exchange, at workstation 2252,an enforcer data service adaptor 2256 attaches control information toregular network packets and creates custom network packets to holdpoint-of-use information and sends them to a file server 2252. At thefile server, an enforcer data service adaptor 2260 extracts controlinformation from regular network packets and extracts point-of-useinformation from custom data packets making the point-of-use informationavailable to a policy engine 2257.

In a specific implementation, the control information attached to aregular network packet contains a flag to indicate point-of-useinformation is available on request and the enforcer data serviceadaptor 2260 at the file server sends a request to the workstation torequest point-of-use information. In response to the request, theenforcer data service adaptor 2256 at the workstation sends the abovecustom network packets to the file server.

In another implementation of information exchange, a first enforcer dataservice adaptor is associated with a network file share protocol client(e.g., CIFS or NFS client) at a workstation and a second enforcer dataservice adaptor is associated with a network file share protocol driver(such as 2259) at a file server. The first enforcer data service adaptorattaches point-of-use information collected at the workstation to one ormore network file share protocol messages and the second enforcer dataservice adaptor extracts the point-of-use information attached. Thepoint-of-use information extracted is made available to a policy engineat a file server.

In another implementation of information exchange, a first enforcer dataservice adaptor is associated with a network file share protocol client(e.g., CIFS or NFS client) at a workstation and a second enforcer dataservice adaptor is associated with a network file share protocol driver(such as 2259) at a file server. The first enforcer data service adaptorsends point-of-use information collected at the workstation in one ormore custom messages to the file server and the second enforcer dataservice adaptor extracts point-of-use information from the one or morecustom messages. The point-of-use information is made available to apolicy engine at the file server.

In another implementation of information exchange, a point-of-useenforcer data service adaptor is associated with network file shareprotocol client (e.g., CIFS or NFS) and a file server enforcer dataservice adaptor is associated with a network file share protocol driver(such as 2259). The point-of-use enforcer data service adaptor attachesinformation collected at the point-of-use to network files protocolmessages and sends enforcer specific messages to a file server. The fileserver enforcer data service adaptor extracts information attached tonetwork file share protocol messages and process enforcer specificmessages sent by a point-of-use enforcer data service adaptor.

In another implementation of information exchange, a first enforcer dataservice adaptor is associated with a client application program on aworkstation and a second enforcer data service adaptor is associatedwith a server application program (e.g., HTTP server) on a documentserver. The first enforcer data service adaptor attaches point-of-useinformation collected at the workstation by inserting one or moremessage headers into a message (e.g., HTTP GET or POST). The secondenforcer data service adaptor extracts the point-of-use information fromthe one or more message headers. The point-of-use information is madeavailable to a policy engine at the document server.

FIG. 23 illustrates an embodiment where a file server policy enforcerallows access to a file only if a workstation policy enforcer isdetected on a client computer that requested the file.

The policy definition is:

FOR document.name = “//server1/legal/**” ON OPEN BY user = Legal,M&A-Team WHERE POLICY-ENFORCER-AT-POU DO ALLOW AND OTHERS DENY

An alternative syntax:

FOR document.name = “//server1/legal/**” ON OPEN BY user = Legal,M&A-Team WHERE pou.hasPolicyEnforcer DO ALLOW AND OTHERS DENY

The following policy includes additional information on point-of-usepolicy enforcer capabilities.

FOR document.name = “//server1/legal/**” ON OPEN BY user = Legal,M&A-Team WHERE POLICY-ENFORCER-AT-POU AND POU-POLICY-ENFORCER( CAPABILITY = {SAVE, CUT-AND-PASTE}; POLICY-VERSION >= {1.32}) DO ALLOWAND OTHERS DENY

The transfer-of-control directives specified in the above policiesinstruct a policy engine to perform one or more prescribed functions.The directive POLICY-ENFORCER-AT-POU (or pou.hasPolicyEnforcer)instructs a policy engine that evaluates the policy (that specifies thedirective) to check if there is a policy enforcer at a point-of-usewhere the point-of-use is a workstation that initiated the operationintercepted at a document server. The directive POU-POLICY-ENFORCERinstructs a policy engine to verify if a policy enforcer at apoint-of-use (e.g., a workstation policy enforcer) can enforce SAVE andCUT-AND-PASTE capabilities and policies being enforced at thepoint-of-use is at least version 1.32 or newer.

The function of the policy is to make sure a controlled document doesnot become uncontrolled once the document is loaded into an application.Consider that a user in a M&A-Team opens a legal document in“//server1/legal/” in Microsoft Word. The operation is successfulbecause users in M&A-Team are allowed to open such file. Now, the userperforms “File|Save As” with a local file path. If the save operation issuccessful, the newly saved copy of the controlled document becomesuncontrolled unless the workstation the user is using is controlled by aworkstation policy enforcer that is capable of providing equivalentlevel of protection to the newly created copy of the document.

A document server policy enforcer protects (or controls) documents whena document is retrieved from a document server or a repository protectedby the document server policy enforcer. Once a document server policyenforcer grants access to a document on a document server to aworkstation requesting the document, it can no long control reproduction(e.g., copy or print) or distribution (e.g., send by e-mail or transferusing FTP) of the document. To prevent a controlled document frombecoming uncontrolled, a document server policy enforcer only grantsdocument access to a workstation that has the ability to continue thesame level of control provided by the document server policy enforcer.Document server policy enforcer accomplishes this objective by verifyingif a workstation requesting access to a document has a policy enforcerinstalled on it.

For example, a user in the M&A-Team can open a file in“//server1/legal/” when the user is logged on to a computer with aworkstation policy enforcer running. When the same user logs on to acomputer that does not have a workstation policy enforcer installed, thefile open operation fails.

The following is a description of a policy enforcement process:

Step 1 (2301): A user at a workstation 2318 tries to open a file forviewing.

Step 2 (2302): An application program interceptor and consequenceapplicator component 2320 on the workstation intercepts the file openoperation. The interceptor collects information about the interceptionwhich includes the action (OPEN), the file name, and other applicationprogram information, and sends the collected data to the policy engine2319.

Step 3 (2303): The policy engine 2319 receives the data collected by theinterceptor and consequence applicator 2320 and selects policiesrelevant to the intercepted action and collected data. In this example,assume only the above policy is selected. The policy engine evaluatesthe selected policies using the collected data along with other dataavailable to the policy engine such as the current user and operatingenvironment data. The policy evaluation results in a consequence. Inthis example the policy evaluation produces a policy effect of ALLOW.

Step 4 (2304): The consequence produced by the policy engine 2319 isreturned to the interceptor and consequence applicator. The interceptorand consequence applicator component (I&CA) is composed of twofunctional parts: interceptor, and consequence applicator 2320. Theinterceptor is responsible of intercepting application program actionsand the consequence applicator is responsible for applying decisions (orconsequences) made by the policy engine. Since the consequence producedby the policy evaluation in this example contains a policy effect ofALLOW, the operation is not blocked by the consequence applicator.

Step 5 (2305): The application program logic required to carry out thefile open operation is executed.

Step 6 (2306): Execution of the application program logic results in afile open request at the file server 2321.

Step 7 (2307): The file open request is intercepted by a network fileshare protocol interceptor and consequence applicator 2323 at the fileserver. The interceptor collects information about the file open requestand forwards the collected data to a policy engine 2322 on the fileserver.

Step 8 (2308): The policy engine 2322 receives the data collected by theinterceptor and consequence applicator 2323 and selects relevantpolicies based on the data received. Among the policies selected, onepolicy (here, assume one of the above policies or 2327) contains atransfer-of-control directive that requires the presence of apoint-of-use policy enforcer (i.e., a workstation 2318 that initiatesthe file open request).

Step 9 (2309): The policy engine 2322 attempts to detect the presence ofa policy enforcer at the point-of-use. If a policy enforcer cannot bedetected at the point-of-use or communication to the policy enforcerfails, the policy engine will produce a consequence with a policy effectof DENY according to the above policy. In this case, assume a policyenforcer at the point-of-use can be contacted and the policy conditionis satisfied, a consequence containing a policy effect of ALLOW iscreated.

Step 10 (2310): Optionally, if a policy enforcer at the point-of-use canbe contacted and a policy containing a transfer-of-control directive(referred to as “transfer-of-control policy” below) requests that thepoint-of-use policy enforcer capabilities be communicated to the fileserver policy enforcer, the policy engine 2322 at the file server makesa request to the workstation policy enforcer. The workstation policyenforcer returns the requested information to the file server policyengine. If the workstation policy enforcer capabilities do not matchthat required by the transfer-of-control policy, the policy evaluationproduces a consequence that contains a policy effect of DENY.Alternatively, the request to the workstation policy enforcer can be aquery that inquires if the workstation policy enforcer supports therequested capabilities specified in the policy.

Step 11 (2311): The policy consequence is returned to interceptor andconsequence applicator component 2323. Since the consequence containsthe policy effect ALLOW, the consequence applicator does not block thefile open request.

Step 12 (2312): The file open request is processed by the network fileshare protocol driver 2324.

Steps 13-17 (2313-2317): The steps between step 13 and step 17 as shownin the figure may or may not be carried out depending on policy enforcerand file server implementations. The following outlines one of thepossible scenarios:

(1) In step 12 (2312), the network file share protocol driver 2324 logicresults in a call to the file system device driver 2326. The call isintercepted at step 13 (2313) by an interceptor and consequenceapplicator component 2325. The interceptor collects information aboutthe intercepted operation and forwards that data to the policy engine2322. Policy engine evaluates relevant policies in step 14 (2314) andreturns a policy effect of ALLOW to the consequence applicator. In step15 (2315), the interceptor and consequence applicator allows the call tobe carried out. In steps 16 and 17 (2316, 2317) the file system devicedriver logic is executed to serve the file open request which involvesaccessing data on a local disk.

FIG. 24 illustrates an embodiment where a copy operation is performedfrom a file server to a destination workstation and the destinationworkstation does not have a policy enforcer which results in a denial ofthe operation.

The policy definition is:

FOR document.name = “//server1/legal/**” ON COPY BY user = Legal WHEREPOLICY-ENFORCER-AT-DESTINATION DO ALLOW AND OTHERS DENY

An alternative syntax:

FOR document.name = “//server1/legal/**” ON COPY BY user = Legal WHEREdestination.hasPolicyEnforcer DO ALLOW AND OTHERS DENY

Below is an alternative policy that implements the sametransfer-of-control function but with an additional list of requiredcapabilities.

FOR document.name = “//server1/legal/**” ON COPY BY user = Legal WHEREPOLICY-ENFORCER-AT-DESTINATION  ANDDESTINATION-POLICY-ENFORCER(CAPABILITY= {COPY,PRINT}) DO ALLOW ANDOTHERS DENY

The transfer-of-control directives specified in the above policiesinstruct a policy engine to perform one or more prescribed functions.The directive POLICY-ENFORCER-AT-DESTINATION (ordestination.hasPolicyEnforcer) instructs a policy engine that evaluatesthe policy containing the directive to check if there is a policyenforcer at the destination of the operation. In this case, thedestination is a workstation or server where the document(s) are copiedto. The directive DESTINATION-POLICY-ENFORCER instructs a policy engineto verify if a destination policy enforcer (e.g., a workstation policyenforcer or a document server policy enforcer) has the capabilitiesand/or policies to enforce COPY and PRINT actions.

The above policy specifies that files in “//server1/legal/” can becopied only to a workstation or document server with a policy enforcerrunning. This policy can be enforced at a document server whichguarantees that protected files on the document server are not copied tounprotected workstations (or document servers). The function of thispolicy is to prevent a protected document from becoming unprotected onceit leaves the protected environment.

Step 1 (2401): A user (or an application program) takes an action tocopy a file on a file server 2415 to a workstation's local disk 2414(the following works the same if a copy is attempted between fileservers and the destination of a copy operation is different from thepoint-of-use).

Step 2 (2402): Application program code is executed on the workstation2414 to implement the user (or application program) action mentioned instep 1. Execution of the application program code results in a filerequest at the file server 2415.

Step 3 (2403): File request is intercepted at the file server's networkfile share protocol driver by an interceptor and consequence applicator2417. The interceptor collects information associated with theinterception (i.e., action, document identifier, client IP address,etc.) and sends it to a policy engine 2416 running on the file server.

Step 4 (2404): The policy engine 2416 takes the information collected bythe interceptor and consequence applicator 2417 and selects policiesrelevant to the intercepted data. Among the selected policies, at leastone policy (here, assume one of the above policies or 2421) contains atransfer-of-control directive that requires a policy enforcer to bepresent at the destination.

Step 5 (2405): The policy engine 2416 attempts to communicate with apolicy enforcer at the destination 2414. Since there is no policyenforcer at the destination, the policy containing a transfer-of-controldirective (referred to as “transfer-of-control policy” below) produces aconsequence that contains a policy effect of DENY. In the case where thecopy operation's destination is a file server 2412 with a policyenforcer installed and policy conditions are satisfied, a policy effectALLOW is produced.

Step 6 (2406): If a policy enforcer at the destination can be contactedand a transfer-of-control policy requests that the destination policyenforcer capabilities be communicated to the file server policyenforcer, the policy engine 2416 at “File Server 1” 2415 makes a requestto the policy enforcer at “File Server 2” 2412. The policy enforcer at“File Server 2” 2412 returns the requested information to the policyengine 2416. If the destination policy enforcer capabilities do notmatch those required by the transfer-of-control policy, the policyevaluation produces a consequence that contains a policy effect of DENY.Alternatively, the request to the destination policy enforcer can be aquery that inquires if the destination policy enforcer supports therequested capabilities specified in the policy.

Step 7 (2407): The interceptor and consequence applicator 2417 receivesthe consequence from the policy evaluation. The policy effect of DENY inthe consequence results in blocking the file operation at the fileserver 2415.

Steps 8-11 (2408-2411): Depending on the policy enforcer implementation,the implementation of the policy effect in step 6 may be delayed to step11 (2411). Discussions on different server interception techniques aredescribed above (refer to descriptions for FIG. 10).

(1) In a slightly different scenario, the policy engine 2416 may decidethat step 4 is just an information collection step and defer the policyevaluation to step 10 and the COPY action is terminated at step 11(2411) in file system device driver interceptor and consequenceapplicator 2419.

(2) In yet another embodiment, the interceptor and consequenceapplicator 2417 at step 3 does not communicate with the policy enforcerbut communicates with the second interceptor and consequence applicator2419 (or stores collected data in shared memory). The informationcollected at step 3 is made available to step 9 (2409). In this case,the policy evaluation is deferred to step 10 (2410) and the COPY actionis terminated at step 11 (2411).

(3) Some implementations may use only one interceptor and consequenceapplicator (rather than two). For example, an implementation may useonly file system device driver interceptors but not network file sharingprotocol interceptors.

FIG. 25 illustrates an embodiment where a workstation policy enginedelegates evaluation of a policy to a policy decision server because theinformation about a recipient in a message is unavailable at theworkstation.

The definition of a delegation policy used in this example is:

FOR message.category = “Sensitive” ON SEND BY user = Employees TOmessage.recipients <> Employees DO DELEGATE-TO “PDServer1” EVALUATE${event-data}

A delegation directive, DELEGATE-TO, is used in the delegation policy toinstruct a policy engine to perform a delegation function. TheDELEGATE-TO directive may specify a delegation target (i.e.,“PDServer1”) at which policy evaluation should be performed. Inaddition, an EVALUATE directive instructs a policy engine to direct adelegation target to perform policy evaluation with event data (here, ${event-data}) provided by the policy engine. The event data may include:action, resource(s), user, computer and application associated with anintercepted operation. Event data is transmitted to a delegation targetas part of the delegation process.

Definition of the delegation target policy used in this example is:

FOR message.category = “Sensitive” ON SEND BY user = Employees TOmessage.recipients <> Employees  AND INVOKECheckProjectNDAOnRecord(${recipients}) DO ALLOW OTHERWISE DENY

The delegation target policy uses a special directive INVOKE to invoke auser-defined function CheckProjectNDAOnRecord( ). The user-definedfunction checks if all recipients (here, ${recipient} which is part of${event-data}) of the message (this operation involve sending an e-mailmessage) have signed non-disclosure agreements (NDA). Since customer,vendor and partner information is not maintained by policy enforcers andpolicy server, a user-defined function is used to carry out the NDAvalidation process.

In this example, the delegation policy is evaluated at a workstation andthe delegation target policy is evaluated at a policy decision server.When policy evaluation at a workstation policy enforcer involves thedelegation policy, a delegation process is trigged. The delegationprocess causes policy evaluation to be invoked at a policy decisionserver. In this case, the policy decision server is PDServer1 and thepolicy being evaluated at the policy decision server is the delegationtarget policy.

Step 1 (2501): A user sends an e-mail message using Microsoft Outlook.

Step 2 (2502): The send message operation is intercepted by anapplication program interceptor and consequence applicator 2511installed in Microsoft Outlook. The interceptor collects informationabout the send operation and forwards that information to a policyengine 2512 running on the workstation 2510.

Step 3 (2503): The policy engine 2512 receives the data collected by theinterceptor and consequence applicator 2511 and selects policiesrelevant to the data received. Among the relevant policies, there is apolicy (here, assume the above workstation delegation policy) containinga delegation directive that instructs the policy engine to delegatepolicy evaluation to another policy engine if the conditions of thedelegation policy are satisfied. Assume the policy engine proceeds withthe policy evaluation and the condition in the delegation policy issatisfied. The result of the policy evaluation includes a policy effectto be produced by delegating policy evaluation to another policy engine.

Step 4 (2504): The consequence portion of the delegation policy 2515requires that the policy engine 2512 obtain a policy effect throughdelegating the policy execution to a policy engine 2514 on policydecision server “PDServer1” 2513. The policy engine (“master”) 2512 onthe workstation attempts to communicate with the policy engine(“helper”) 2514 on PDServer1. If the master policy engine fails tocommunicate with the helper policy engine, the policy effect of thedelegation policy will be DENY.

Step 5 (2505): In case communications with a helper policy engine onPDServer1 (2513) are successful, the helper policy engine 2514 receivesthe delegation policy 2515 execution request from the master policyengine 2512 along with all event data collected by the workstationpolicy enforcer (where the master policy engine is located). The helperpolicy engine selects policies relevant to the data received andevaluates the relevant policies. The consequence resulting from thepolicy evaluation is returned to the master policy engine. In this case,assume the above delegation target policy 2516 is selected, therecipients contained in the event data have non-disclosure agreements onrecord, and the policy evaluation produces a policy effect of ALLOW.

(1) Note that the policy selection step described in step 5 (2505) isnot required if a delegation target policy (2516) or a set of delegationtarget policies is named in the delegation policy (2515). In this case,the named delegation target policy (2516) or delegation target policyset is evaluated.

Step 6 (2506): The consequence produced by the helper policy engine 2514on PDServer1 is returned to the master policy engine 2512 on theworkstation. The master policy engine returns the consequence to theinterceptor and consequence applicator 2511. In this example, which is asimplified scenario, the consequence produced by the helper policyengine is returned to the interceptor and consequence applicator. In amore complex scenario, this consequence can be combined with otherpolicy consequences in the master policy engine using a combiningalgorithm to produce a final consequence that is returned to theinterceptor and consequence applicator on the workstation.

Step 7 (2507): The interceptor and consequence applicator 2511 receivesthe consequence containing a policy effect of ALLOW from by the masterpolicy engine 2512. The consequence applicator in the interceptor andconsequence applicator 2511 applies the policy effect ALLOW which allowsthe send message operation to continue.

Step 8 (2508): Application program code in Microsoft Outlook is executedto complete the send message operation.

FIG. 26 illustrates an embodiment where a document server policyrequires that copies of a file on all workstations be deleted when themaster copy of the same file on a document server is deleted.

The policy definition is:

FOR document.name = “//server1/pricing/master/price-list-0105.xls” ONDELETE BY user = Managers DO ALLOW AND DELEGATE-TO POU-Policy-Enforcers DO DELETE “**/pricing/price-list-0105.xls”

A delegation directive, DELEGATE-TO, is specified in the policy toinstruct a policy engine to delegate policy consequence implementationto all policy enforcers belong to a POU-Policy-Enforcers group. Thepolicy consequence to be implemented (i.e., DELETE“**/pricing/price-list-0105.xls”) is specified using a DO directive.

Step 1 (2601): A user at a workstation 1 (2616) tries to delete a masterprice list file on a file server.

Step 2 (2602): Application program code is executed on workstation 1(2616) that results in a delete file request on the file server 2617.

Step 3 (2603): A network file share protocol interceptor 2619 on thefile server intercepts the delete file request from workstation 1(2616). The interceptor collects information about the delete filerequest and forwards the collected data to a policy engine 2618 on thefile server.

Step 4 (2604): The policy engine 2618 on the file server receives thedata collected by the interceptor and consequence applicator 2619 andselects polices relevant to the data received. Among the relevantpolicies there is a policy (2623) that specifies the delegation ofconsequence applications to other policy enforcers (referred to as“delegation policy” below). The policy engine proceeds with the policyevaluation.

Step 5 (2605): The conditions in the delegation policy (2623) aresatisfied and the policy engine 2618 processes the delegation taskspecified in the consequence portion of the delegation policy (2623).The policy engine (“master”) 2618 on the file server attempts tocommunicate with the “POU-Policy-Enforcers” specified in the delegationpolicy (2623). For each point-of-use policy enforcer (“helper”)contacted, the master policy engine instructs the helper policy enforcerto carry out the portion of the consequence to be delegated.

Steps 6 a and 6 b (2606, 2607): The helper policy enforcer receives aconsequence delegation request from the master policy engine and carriesout the delegated consequence accordingly. In this case, if one or morecopies of the specified price list file exist, they will be deleted fromthe workstation's storage devices.

Step 7 (2608): The interceptor and consequence applicator 2619 receivesa consequence returned from the master policy engine. In this case, theconsequence contains a policy effect of ALLOW and the interceptor andconsequence applicator allows the delete file request to be carried out.

Step 8 (2609): The network file share protocol driver 2620 logic thatimplements a delete file request is executed.

Steps 9-13 (2610-2614): The steps between step 9 and step 13 as shown inthe figure may or may not be carried out depending on policy enforcerand file server implementations. The following outlines one of thepossible scenarios:

(1) In step 8 (2609), the network file share protocol driver 2620 logicresults in a call to the file system device driver 2622. The call isintercepted at step 9 (2610) by an interceptor and consequenceapplicator component 2621. The interceptor collects information aboutthe intercepted operation and forwards that data to the policy engine2618. Policy engine evaluates relevant policies in step 10 (2611) andreturns a policy effect of ALLOW to the interceptor and consequenceapplicator. In step 11 (2612), the interceptor and consequenceapplicator allows the call to be carried out. In steps 12 and 13 (2613,2614) the file system device driver 2622 logic is executed to serve thefile open request which involves accessing data on a local disk.

3.0 Implementation Mechanisms—Hardware Overview

FIG. 27 is a block diagram that illustrates a computer system 2700 uponwhich an embodiment of the invention may be implemented. Computer system2700 includes a bus 2702 or other communication mechanism forcommunicating information, and a processor 2704 coupled with bus 2702for processing information. Computer system 2700 also includes a mainmemory 2706, such as a random access memory (“RAM”) or other dynamicstorage device, coupled to bus 2702 for storing information andinstructions to be executed by processor 2704. Main memory 2706 also maybe used for storing temporary variables or other intermediateinformation during execution of instructions to be executed by processor2704.

Computer system 2700 further includes a read only memory (“ROM”) 2708 orother static storage device coupled to bus 2702 for storing staticinformation and instructions for processor 2704. A storage device 2710,such as a magnetic disk or optical disk, is provided and coupled to bus2702 for storing information and instructions. Computer system 2700 maybe coupled via bus 2702 to a display 2712, such as a cathode ray tube(“CRT”), for displaying information to a computer user. An input device2714, including alphanumeric and other keys, is coupled to bus 2702 forcommunicating information and command selections to processor 2704.Another type of user input device is cursor control 2716, such as amouse, trackball, stylus, or cursor direction keys for communicatingdirection information and command selections to processor 2704 and forcontrolling cursor movement on display 2712. This input device typicallyhas two degrees of freedom in two axes, a first axis (e.g., x) and asecond axis (e.g., y), that allows the device to specify positions in aplane.

The invention is related to the use of computer system 2700 forcontrolling document access using centrally managed rules. According toone embodiment of the invention, controlling document access usingcentrally managed rules is provided by computer system 2700 in responseto processor 2704 executing one or more sequences of one or moreinstructions contained in main memory 2706. Such instructions may beread into main memory 2706 from another computer-readable medium, suchas storage device 2710. Execution of the sequences of instructionscontained in main memory 2706 causes processor 2704 to perform theprocess steps described in this application. In alternative embodiments,hard-wired circuitry may be used in place of or in combination withsoftware instructions to implement the invention. Thus, embodiments ofthe invention are not limited to any specific combination of hardwarecircuitry and software.

The term “computer-readable medium” as used in this application refersto any medium that participates in providing instructions to processor2704 for execution. Such a medium may take many forms, including but notlimited to, nonvolatile media, volatile media, and transmission media.Nonvolatile media includes, for example, optical or magnetic disks, suchas storage device 2710. Volatile media includes dynamic memory, such asmain memory 2706. Transmission media includes coaxial cables, copperwire and fiber optics, including the wires that comprise bus 2702.Transmission media can also take the form of acoustic or light waves,such as those generated during radio wave and infrared datacommunications.

Common forms of computer-readable media include, for example, a floppydisk, a flexible disk, hard disk, magnetic tape, or any other magneticmedium, a CD-ROM, any other optical medium, punchcards, papertape, anyother physical medium with patterns of holes, a RAM, a PROM, and EPROM,a FLASH-EPROM, any other memory chip or cartridge, a carrier wave asdescribed here, or any other medium from which a computer can read.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to processor 2704 forexecution. For example, the instructions may initially be carried on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 2700 canreceive the data on the telephone line and use an infrared transmitterto convert the data to an infrared signal. An infrared detector canreceive the data carried in the infrared signal and appropriatecircuitry can place the data on bus 2702. Bus 2702 carries the data tomain memory 2706, from which processor 2704 retrieves and executes theinstructions. The instructions received by main memory 2706 mayoptionally be stored on storage device 2710 either before or afterexecution by processor 2704.

Computer system 2700 also includes a communication interface 2718coupled to bus 2702. Communication interface 2718 provides a two-waydata communication coupling to a network link 2720 that is connected toa local network 2722. For example, communication interface 2718 may bean integrated services digital network (“ISDN”) card or a modem toprovide a data communication connection to a corresponding type oftelephone line. As another example, communication interface 2718 may bea local area network (“LAN”) card to provide a data communicationconnection to a compatible LAN. Wireless links may also be implemented.In any such implementation, communication interface 2718 sends andreceives electrical, electromagnetic or optical signals that carrydigital data streams representing various types of information.

Network link 2720 typically provides data communication through one ormore networks to other data devices. For example, network link 2720 mayprovide a connection through local network 2722 to a host computer 2724or to data equipment operated by an Internet Service Provider (“ISP”)2726. ISP 2726 in turn provides data communication services through theworld wide packet data communication network now commonly referred to asthe “Internet” 2728. Local network 2722 and Internet 2728 both useelectrical, electromagnetic or optical signals that carry digital datastreams. The signals through the various networks and the signals onnetwork link 2720 and through communication interface 2718, which carrythe digital data to and from computer system 2700, are exemplary formsof carrier waves transporting the information.

Computer system 2700 can send messages and receive data, includingprogram code, through the network(s), network link 2720 andcommunication interface 2718. In the Internet example, a server 2730might transmit a requested code for an application program throughInternet 2728, ISP 2726, local network 2722 and communication interface2718. In accordance with the invention, one such downloaded applicationprovides for controlling document access using centrally managed rulesas described in this application.

The received code may be executed by processor 2704 as it is received,and/or stored in storage device 2710, or other nonvolatile storage forlater execution. In this manner, computer system 2700 may obtainapplication code in the form of a carrier wave.

4.0 Extensions and Alternatives

In the foregoing specification, the invention has been described withreference to specific embodiments thereof. It will, however, be evidentthat various modifications and changes may be made thereto withoutdeparting from the broader spirit and scope of the invention. Thespecification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense.

1. A method of controlling application usage and document access in aplurality of computers the method comprising: evaluating at least onerule pertaining to an occurrence of an event; wherein the at least onerule is among a plurality of rules stored on a first computer; whereinthe at least one rule contains at least one expression used by theevaluating step to decide whether to perform an action; communicatingwith a plurality of computers as indicated by the at least one rule; andinstructing the plurality of computers to perform an action as indicatedby the at least one rule.
 2. A method of controlling application usageand document access in a plurality of computers the method comprising:evaluating at least one rule pertaining to an occurrence of an event,wherein the at least one rule is among a plurality of rules stored on afirst computer, and wherein the at least one rule contains at least oneexpression used by the evaluating step to decide whether to perform anaction; communicating with a plurality of computers as indicated by theat least one rule; and instructing the plurality of computers toevaluate at least one rule.
 3. An apparatus for controlling applicationusage and document access in a plurality of computers comprising: amodule for evaluating at least one rule pertaining to an occurrence ofan event, wherein the at least one rule is among a plurality of rulesstored on a first computer, and wherein the at least one rule containsat least one expression used by the evaluating module to decide whetherto perform an action; a module for communicating with a plurality ofcomputers as indicated by the at least one rule; and a module forinstructing the plurality of computers to perform an action as indicatedby the at least one rule.
 4. An apparatus for controlling applicationusage and document access in a plurality of computers comprising: amodule for evaluating at least one rule pertaining to an occurrence ofan event, wherein the at least one rule is among a plurality of rulesstored on a first computer, and wherein the at least one rule containsat least one expression used by the evaluating module to decide whetherto perform an action; a module for communicating with a plurality ofcomputers as indicated by the at least one rule; and a module forinstructing the plurality of computers to evaluate at least one rule.