Patents Assigned to BLUE JUNGLE
  • Publication number: 20070156897
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: May 12, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156670
    Abstract: In an information management system, policies are optimized before they are associated to a device in order to increase evaluation speed or reduce space requirements, or both. Optimization techniques may include common subexpression elimination, constant folding, constant propagation, comparison optimization, dead code or subexpression removal, map or lookup table generation, policy rewriting, redundant policy elimination, heuristic-based policy ordering, or policy-format transformation, and combinations of these.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156659
    Abstract: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070157287
    Abstract: A policy language for an information management system allows specifying or more policies using policy abstractions. The policies and policy abstractions are decoupled from one another, so policies and policy abstractions may be specified and altered separately from each other. A policy may refer to any number of policy abstractions. Multiple policies may reference a single policy abstraction, and a change to that policy abstraction will result in multiple policies being changed. Further, policy abstractions may be nested, so one policy abstraction may reference another policy abstraction, and so forth.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: Blue Jungle
    Inventor: Keng Lim
  • Publication number: 20070157288
    Abstract: In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20070156696
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: December 22, 2006
    Publication date: July 5, 2007
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim