发明名称 Intelligent security analysis and enforcement for data transfer
摘要 An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level of security protecting the transfer of the data is determined. Based on the level of sensitivity, the level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the levels of sensitivity and security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action is executed to connect the computer and transfer the message using the changed level of security.
申请公布号 US9521122(B2) 申请公布日期 2016.12.13
申请号 US201414274167 申请日期 2014.05.09
申请人 International Business Machines Corporation 发明人 Abuelsaad Kelly;DeLuca Lisa Seacat;Jang Soobaek;Krook Daniel C.
分类号 G06F21/00;H04L29/06;H04W12/02;G06F21/60 主分类号 G06F21/00
代理机构 Schmeisr, Olsen & Watts 代理人 Schmeisr, Olsen & Watts ;Hartwell William H.
主权项 1. A method of managing a message being transferred from a computer, the method comprising the steps of: the computer determining a level of sensitivity of data in a payload of the message and identifying an application initiating a transfer of the data in the message via a network; the computer determining a level of security protecting the transfer of the data, the level of security indicated by (1) a first setting of the computer that specifies that a first or a second method of encryption at a network layer is applied by a corresponding wireless access point that provides access to the network for the transfer of the data, the first method of encryption having a strength of encryption that is stronger than a strength of encryption of the second method of encryption and (2) a second setting of the application that specifies that a first or a second protocol at an application layer is utilized for the transfer of the data, the first protocol having encryption at the application layer and the second protocol having no encryption at the application layer; based in part on the level of sensitivity of the data, the computer determining whether the level of security satisfies a threshold level; if the level of security does not satisfy the threshold level, based at least in part on the level of sensitivity of the data and the level of security, the computer determining an action to change the level of security so that the changed level of security satisfies the threshold level, the action to change the level of security including a change to the first setting but no change to the second setting, a change to the second setting but no change to the first setting, or changes to the first and second settings, and in response, executing the action to connect the computer and transfer the message using the changed level of security indicated by the change in the first setting, the change in the second setting, or the changes in the first and second settings; and if the level of security satisfies the threshold level, the computer connecting and transferring the message using the level of security.
地址 Armonk NY US