Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system
The invention is an a document classification and marking engine/method that functions in a real-time compatible mode with off-the-shelf word processors, e-mail programs and presentation or other document development software applications. The software engine is used for the security classification of sensitive or national security classified information in electronic format and is enhanced by methods and processes that ensure that the software classification engine considers all document informational elements regardless of attributes assigned to the text that may hide text from the user. The software engine provides a complete and reliable document classification determination interface method based on user selections and uniquely codes the full text classification determination in a persistent manner within the electronic shell of the document in real-time and dynamically displays the text based full classification determination in the banner of the host document development application. The unique codes of the full classification embedded in the electronic shell of the document enable effective and reliable software processes and methods that establish controls for access, movement, storage etc. for electronic documents, as well as virtual electronic security perimeters, on a computer, networks of computers and/or among computer networks and domains of networks. The full or complete and persistent classification codes embedded in the document shell also enables reliable software processes and methods that immediately warn or alert security personnel of a beach of a physical security perimeter between or among computers networks or domains of networks established to protect the information contained in electronic document format.
This application claims priority from U.S. provisional application No. 61/127,385—filed May 13, 2008 which is hereby incorporated by reference. As well as pending utility patent application Ser. No. 11/520,857, filed Sep. 13, 2006, both applications filed by inventors James Luke Turner and Robert E. Turner.
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENTThe current patent development and submission involved no federal funds or sponsorship.
REFERENCE TO SEQUENCING LISTING, OR COMPUTER PROGRAM LISTING COMPACT DISK APPENDIXNot Applicable
THE TECHNICAL FIELD OF THE INVENTIONThe present invention relates to the identification, classification, marking, protection and control of sensitive, personal or proprietary information as well as sensitive or national security classified government information hereinafter referenced as “classified” in its electronic document form on a computer, computer network or among computer networks as well as the appropriate classification and marking of derived hard copy forms of an electronic documents informational content. It also relates to:
-
- The complete and reliable classification assessment of all information contained in an electronic document regardless of the attributes assigned to the information by document development software applications or the users of such document development software applications. Attributes such as but not limited to whether or not the information text is visible to the user or hidden, not viewed by the user.
- The association of an electronic document's complete classification of all informational content to unique non-text based codes persistently embedded in a document's electronic shell.
- The reliable association of all information contained within an electronic document to unique classification codes corresponding to text classification determinations in an information classification regime for computers, networks of computers, and domains of networks.
- The establishment of reliable security access controls for electronic documents/information based upon a document's or storage media's associated complete or full classification code(s), as well as similar unique classification regime code assignments to the security clearance level or access authority of users of the network; to elements of a computer operating system's file management system on a computer; to computers on a network; to networks and to domains of networks in real-time.
- The establishment of document/information “Need to Know” or authorized access controls to electronic documents/information for computer or network system users based on the complete classification determination of all information contained in an electronic with representative unique classification codes persistently embedded in a document's electronic shell in relation to user security clearance level or access profiles within a specific sensitivity or classification level for electronic documents matrix and resident on, or associated with a computer network or domain of computer networks.
- The establishment and configuration of positive and reliable real-time controls relating to the movement and/or storage of classified or sensitive electronic documents/information on or across computers, computer networks and domains of networks and associated electronic document storage media.
- The establishment/configuration of virtual, electronic security perimeters among computers or computer networks based on the complete, unique and persistent classification or sensitivity codes for electronic documents/information enabling positive document access, movement and other document/information security controls.
- The process and method or continuous and real-time security verification of physical security perimeters among computer networks or domains of computer networks that separate different levels of sensitive or classified electronic documents/information to include unclassified, computers, computer networks or domains of networks for the purpose of protecting information.
The invention's processes and methods to reliably obtain the full or complete classification determination for an electronic document as well as embedding and associating unique codes in the electronic shell of a document representing the complete classification determination, provides a reliable basis for further methods and processes of the invention to control document movement, access and storage of electronic documents within classified or sensitive computers, computer networks or domains of networks as well as methods and processes to identify and immediately alert on a security breach by an electronic document or its storage media of a physical security perimeter between computer networks or domains of networks operating at different sensitivity or classification levels without compromising or otherwise providing insight into the individual classification regimes resident on networks or domains of computer networks operating at the higher classification or sensitivity level.
BACKGROUND OF THE INVENTIONThis patent application provides further separate innovation and utility of methods and processes set forth in pending Utility patent application Ser. No. 11/520,857. The creation of computer systems, networks of computers, and associated software that allow for the movement of sensitive and/or classified documents within and among computer networks has by its very nature reduced the rigor of document security control as it was applied in previous paper document/information control systems. “Need to Know” determinations essential to information security control in paper based access control systems for national security classifications have been suspended for electronic documents/information developed, moved/transmitted and stored on computer systems and networks of computer systems in lieu of alleged productivity gains. The productivity attributes of document development software applications have compounded this document/information security problem by providing hard copy output generation or other electronic output views of the information contained in electronic documents, that may not reflect the full content of the information contained in an electronic document, and thus may not reflect the full sensitivity or national security classification of the information contained in the electronic document, thereby subjecting the document/information to possible mishandling and/or compromise.
The productivity gains of computers, computer networks, and document development software, have led to the development of sensitive and classified computer networks without sufficient methods for positive identification and persistent and consistent feedback for the developer/user of an electronic document of all possible information in the electronic document as well as the lack of developer/user capability to assign or determine corresponding sensitivity or classification designation for the informational content of the entire electronic document. This significant shortcoming has resulted in lack of positive controls at the document level to adequately control access to information in electronic document format within a physical security perimeter set for a sensitive or classified network or domain. In addition, current security processes and software to control information in electronic documents do not provide adequate assurance and verification and alerting capabilities to determine that the information is not breaching physical security perimeters among networks or domains of networks, approved for different levels of sensitive or classified information. In addition to these short comings, The capability to store huge numbers of documents/information on portable media devices, the ease of transferring information between or among computers, and the practice of close physical proximity of computers of differing classification and/or sensitivity levels to enhance user productivity, multiply the potential risk and damage associated with lack of positive security control of documents/information resident within security perimeters established for computers or networks of computer.
Recent inventions that provide user assurance of appropriate national security or sensitivity classification assessment and classification determinations for information in electronic documents, persistent document marking capability for electronic documents, and the association of unique classification codes embedded in the document's electronic shell, have not fully accounted for the information classification problem associated with productivity features found in most document development host software applications. The ability to provide comments or notes within a document or to hide text/information in an electronic document or it's electronic shell, as well as the ability to provide application or user driven subset views of the information contained in an electronic document are some typical document development software application features that may mislead a user's understanding or ability to ascertain the full or complete classification or sensitivity value of the information contained within the total electronic document and may cause the mishandling or compromise of information contained in an electronic document. Currently, user's of electronic document files are unable to determine a classification or sensitivity distinction between a subset view of the informational content of a document generated by a document development software application that they may be handling and the full or complete classification determination of the all the information regardless of the application attributes, visible, hidden, etc, assigned to information contained in the document. The ability of document originators, subsequent authors of a document, as well as subsequent systems users that may develop and or subsequently use or move electronic document information on computer systems and computer networks to know the full sensitivity or classification value of an electronic document is of critical importance to assuring and enforcing complete control of sensitive or classified information.
Similarly, automated means and software programs designed to control access to electronic document information or to control the movement or storage of electronic documents in real-time require positive, and persistent means to determine the full classification value of the information contained in the total electronic document in order to be effective. Control systems based on document/information sensitivity and classification determinations that do not account for the full or complete sensitivity or classification potential of the information contained in an electronic document have ineffective control structures and establish potential systemic or “programmed-in” vulnerabilities into the control systems for electronic documents. The current state of developing, processing and disseminating sensitive and/or classified electronic information for stand-alone computers, networked computers and domains of networks is piecemeal, relying on disparate, text based sensitivity determinations on possible subset informational or “print” views of the electronic document to identify sensitivity or national security classification, and provide ineffective security control of the movement of, and access to, sensitive and/or classified electronic documents/information on computer networks.
Such control systems have not accounted for the potential to overlook portions of the content of an electronic document that may change the value of the document's sensitivity or classification. As an example, most modern word processing and document development software provides the capability for Comments, Notes, Hidden Text, etc to be established in a document's electronic file. However, the user must select to view such information by specifically selecting controls in the application to view that information. Failure to view or account for such potentially hidden information when classifying a document as to it's sensitivity or national security designation may lead to catastrophic miss-classification of the document/information and have a ripple effect for subsequent users of the document that rely on the text classification marks of the “print” view of the document to determine how to appropriately disseminate, move or store an electronic document on a computer network. The productivity gains of computers and computer networks as well as associated communication capability to transmit electronic document information exacerbate this information control problem.
In addition, subsequent users of such documents may be mislead by subset views provided by modern document development software applications of the information contained in an electronic document which may result in false assumptions of the classification value of the displayed or subset information, resulting in mishandling of the electronic documents as well as mishandling printed views of the subset information. For example, a user may receive an electronic document whereby comments made by a previous user of the electronic document were not assessed and/or classified by the previous user. The comments inserted into the electronic document are of a higher classification value and require additional protection than the classification marking for the electronic document when displayed without the comments being visible. The subsequent user elects to display comments in his/or her view of the information contained in the electronic document. The subsequent user prints that view of the electronic document not realizing that the information contained therein is improperly classified and marked. In addition to an improperly marked hard copy of the information, the second user unknowingly forwards the electronic document to another user on the network who is not authorized to have access to the information contained in the comments, thereby compromising the information.
Document development and dissemination software has also led to multiple computers, possibly representing multiple networks, side by side on users desks at different levels of sensitivity or classification without sufficient capability to alert security personnel to breaches or spills of information, whether intentional or inadvertent, among the various systems.
Compounding these systemic flaws, there currently is little positive and accurate control and tracking over the access to and the movement of such information within the security perimeters of authorized computer networks or among authorized network domains. As a result, Government and businesses are grappling with intentional insider threats and perimeter breaches to sensitive and classified information on their systems, as well as inadvertent disclosures from their systems that compromise protected critical or national security classified information.
Attempts at text-based controls for sensitive and classified information have been ineffective due to false negatives as well as false positives, and their inability to adequately handle compilation classification designations as well as the inability to handle graphics and other modern features of computer document development software.
In order for electronic document security to be effective new methods are needed to assure that the classification process assesses all potential information, both visible and hidden, contained within an electronic document, that both the classification of the complete electronic document file, as well as the classification of the current output view of the document are available, dynamic, persistent and apparent to users of the electronic document file in real-time, and that electronic document/information dissemination, movement, access and media storage controls are based on the full classification value of the information in a document.
The present invention by means of full and complete value classification determinations of all information contained in an electronic document, as well as the use of persistent, unique codes to represent the full classification determination in the shell of an electronic document, provides a positive basis for effective controls for electronic documents, as well as the establishment of meaningful virtual electronic perimeters that are based on positive, and reliable identification of an electronic document's full value sensitivity or classification.
In the instant invention the methods and processes established to ensure full value user classification determinations of all the information contained in electronic documents and the assignment and registry of unique representative classification coding combine to enable additional methods and processes to:
-
- 1. Identify, positively and reliably, the full sensitivity/classification of all information in an electronic document to system/application users;
- 2. Provide positive and immediate methods with which to control access to electronic documents to authorized system users;
- 3. Control, positively and reliably, the movement of electronic documents on a network operating in a multi-level classification mode;
- 4. Identify, positively and reliably, a breach of a physical security perimeter between computers, computer networks or systems of computer networks operating at different levels of sensitivity or classification, without compromising or providing unnecessary insight into the classification criteria, or sensitive program designations.
Any software firm that produces document security control software needs to make their product line more effective in sensitive and classified information network environments. Any government or government sponsored entity authorized to classify or handle national security classified information needs more effective security software for computers and networks.
Needs exist for new and positive methods of identifying and assuring the proper classification of all information contained in an electronic document in real-time. Needs exist for positive feedback to users of host document development applications to ensure that they know the full classification level of an electronic document so that they can properly protect the information in accordance with the standards of their organization, or law. Needs exist for methods of real-time positive security controls for electronic documents based on reliable and persistent full classification determinations of all information contained in the electronic document without compromising sensitive programs or classification criteria, to control and protect electronic documents/information on computer networks, as well as provide the capability of alerting security personnel to breaches of physical security perimeters among networks at different levels of classification or sensitivity.
SUMMARY OF THE INVENTIONThe processes and methods of the present invention provides additional significant utility to recent advances in methods to enable computer or computer network users to assess and to classify information contained in electronic documents by means of an assistance interface that identifies document portions and provides a point and click classification determination process, and associates the text based classification determination with unique codes representing the sensitivity or classification level determinations for information contained in a document and embedding the codes in the shell of an electronic document, as well as assuring persistent classification marks for electronic documents in viewed or printed output. The present invention improves the positive and unique, non-text based codes that are imbedded in a document's electronic shell, unique codes that correspond to a document's sensitivity or classification. The invention is a method to ensure that a system user assesses and classifies all information contained in an electronic document, assuring that a classification determination has been made for each portion of the informational content of an electronic document to include portions of information that may be hidden from view of the classifier or subsequent users of an electronic document and thereby missed or not considered for it's classification value. The invention's methods work dynamically in conjunction with host document development software to provide the classifier or subsequent users of an electronic document with visible, positive classification mark determinations for both the full or complete informational content of an electronic document as well as providing dynamically in real-time the classification value of any informational subset view of the document that may be displayed by means of features in document development software applications.
The methods of the invention not only assures a full and complete classification determination that includes all information contained in an electronic document and positively and persistently displays that classification text within the host application's display, but it also assigns a unique classification code to represent the text classification determination for the total information content of the electronic document and embeds the unique code in the electronic shell of the document in a reliable and persistent manner. The invention further provides methods for the System Security Administrator (SSA) for a computer network to develop and initiate reliable, virtual changeable perimeter controls that manage a document's movement or access within, or among computer networks, based on the coded classification value of the full or complete document content, assigning and assuring proper access control at the document, subfolder, folder, drive, or volume level of document electronic storage. The invention's methods also improves previous methods of electronic document control by establishing the capability to assign and code “Need to Know” access lists to an electronic document for additional access control within national security classification designations. “Kneed to Know” document access lists become reliable in the electronic environment as a result of the invention's methods to reliably ascertain the full or complete classification content of documents/information electronic format in real-time.
The invention uses the same unique; non-text based coding capability within the document's electronic shell to control whether or not documents of specific sensitivity or classification may cross network domains for dissemination, access and document control on computer networks of other network domains. The invention provides a software interface that allows the SSA to setup the criteria and controls based on the full sensitivity or classification of information contained in electronic documents that may need to be disseminated or controlled on other authorized computer network or domains. The unique coding scheme which can enable a unique classification code set for each domain enabling the SSA to identify the organizational ownership of documents that may have crossed computer network domains and reliably provide consistent tracking, control and oversight capabilities based on the full content classification of an electronic document and the unique, organizationally specific, representative code.
By means of the reliable full classification of a document's information content and the unique and persistent coding capability within a document's electronic shell, as well as the unique coding capability and assignment associated with storage media that contain classified and/or sensitive documents/information, the present invention also provides methods to immediately and accurately identify a breach of physical security perimeters. This aspect of the invention is a method that is established and resident on a computer, computer network or system of networks that “watches” for and/or senses specific unique classification codes that occur in the documents electronic shell, or are imbedded on document storage media that are not authorized on the receiving computer, network of computers or domain of networks. The unique classification codes that represent text based classification determinations allow the invention's methods and processes to be resident on computers not authorized to receive the text based information and to function on unclassified or lower classified computers without compromising or allowing unnecessary insight into the text based classification regime of higher level classification computers.
The inventions methodology immediately alerts the SSA to physical breaches of the security perimeter established for the computer, network or system of networks, providing positive identification of the breach, level of the beach, time, date, user and other information important to the remedy. The unique codes associated with the full classification of an electronic document's information and persistently imbedded in the document's electronic shell allow for the establishment of positive “monitoring” capability on computers or networks of lower classification authority, without compromising the text value of the classification, where the text value or the fact that such information exists on the higher level network is in itself sensitive or classified information.
The persistent embedded unique codes in a document's electronic shell that represent a complete classification determination of all information of an electronic document enable the invention's positive and dynamic virtual perimeters within a computer, network or domain of computer networks to:
-
- 1. Control access to document information;
- 2. Control the movement and storage of documents; and
- 3. Provide alerts, warnings or statistical information on attempts to circumvent or breach virtual perimeters.
These and further and other objects and features of the invention are apparent in the disclosure, which includes the above and ongoing written specification, with the drawings.
The present invention is a process and method enhancement for an automated assistance system used to completely identify, mark, control, track and otherwise protect the sensitive and/or classified information of an organization when that information is in electronic document format on computers or computer networks.
The present invention is an enhancement of a software classification engine method and process that runs in a compatible mode with “off-the-shelf” word processing, e-mail, presentation, spread sheet or other document development software. The invention is a process and method to assure the proper assessment and classification of all information, both visible and hidden, that may be contained in an electronic document to establish the complete or full classification determination in electronic format before the document or changes to the content of the document are committed to electronic format. The invention, via the host document development software application user/document interface, provides dynamic. persistent visual and readable total classification determination status to the document developer/classifier and/or subsequent users of an electronic document ensuring that users of the electronic document have sufficient knowledge of the full classification value of the informational content of an electronic document for proper secure handling of the electronic or digital information in accordance with the rules and regulations of the organization to protect the information.
By means of the process and method for obtaining a complete classification determination and embedding a corresponding, unique and persistent classification code in the electronic shell of the document, the invention provides the proper basis for positive control of the electronic document regarding its movement, storage location and access on a computer, computer network or computer domain without compromising classification determination criteria which may itself be classified or sensitive when in a readable text format.
Accordingly, the invention's assurance of complete, persistent, and unique codes representing document classification or sensitivity determinations in the document's electronic shell provides the basis to establish proper virtual perimeters to the computer file level on or among computers, computer networks and domains of networks to provide proper control of the movement or storage of the documents. It also provides the basis for proper methods for real-time virtual controls based on user authorized access levels to allow or prevent system user access to documents/information based upon user access authorization codes and the full classification determination.
The invention's assurance of complete, persistent classification or sensitivity codes in a document's electronic shell provides the basis to positively warn or alert when a document has breached a physical perimeter established to protect information on a computer, network or domain of higher classification or sensitivity, by any means of file or media transfer across a physical perimeter to a computer, network or domain not authorized for the document/information.
The invention's process and method of dynamically presenting in real-time two classes of document classification information to the user, (1) the full or complete classification consisting of all of the informational elements of an electronic document, and (2) the classification of the current or selected view of an electronic document displayed and/or printed. These two classes of classification information provides assurance that the user has all of the necessary information to properly safeguard the information contained in the electronic document as well as the current displayed view or printed hard copy of the document. Thereby the invention's enhanced software classification engine prevents user assumptions about the classification of an electronic document serving to prevent inadvertent compromise due to unrecognized safeguarding requirements possibly associated with a higher classification level for the full informational content of an electronic document as opposed to a potential subset of that information displayed in the current or user selected view of a document within the host document development application. Conversely, the dynamic real-time interaction of the modified classification engine to re-establish the appropriate classification of information in a subset view of a document's information assures that the appropriate classification for the view is displayed and/or printed, preventing over classification or under classification/control of the information.
In addition to the complete text classification determination being persistently and obviously displayed in the banner of the host document development application, the invention's enhanced classification engine sets in real-time a unique code(s) that represents the full text classification determination into the electronic shell of the document, and records the complete classification information about the document, date, author, path etc in a relational database. The database can be used to establish historical information on the document and the classification state of the information contained therein in real-time. The database can also be used to assure that the classification code embedded in the document is correctly reestablished if the code(s) is removed from the electronic shell by a user outside of the host application. The invention's methods will sense that the classification code is missing from the documents electronic shell and will reinstall the complete classification code based on the information contained in the database for the document. The invention's method will also warn security personnel in real-time of an apparent attempt to manipulate a document's classification outside of the document's host application software. These methods of the invention provide for the persistent nature of the classification codes embedded in the documents shell.
The invention's real-time, complete or full and persistent classification code(s) embedded in the document's electronic shell provides a real-time basis to positively, and reliably control the movement, storage and access to documents/information in accordance with its full classification or sensitivity level in accordance with the information protection rules or requirements of an organization.
The assurance of a full or complete classification determination for all information, visible or hidden, contained in an electronic document, coupled with the real-time, persistent embedding of a unique code within the documents electronic shell that faithfully represents the text based classification determination of the information enables further aspects of the invention. The dynamic, real-time incorporation into a document's electronic shell of machine readable unique codes that reflect the complete classification of document information, as well as persistent unique identification codes on document storage media for electronic documents provides a basis for a positive and reliable solution to identify and alert or inform network security administrators that a breach of a physical security perimeter between computers, networks of computers or domains of computer networks authorized at different national security or sensitivity levels has occurred. Because the classifications are uniquely coded, and not text based, the classification or sensitivity levels that are not authorized to reside on a computer, computer network or domain of computer networks can be resident on those systems to identify a physical breach without the potential to compromise the text based classification determination for classified programs or access levels that may in themselves be sensitive and or classified. In addition the unique, complete classification or sensitivity codes imbedded in a document and into document storage media provide near absolute assurance that there will be no false identification of a physical perimeter breach that could occur with text based classification searches.
The invention's assurance of real-time full or complete classification determination for information, visible or hidden, contained in an electronic document, and real-time persistent codes embedded in the documents electronic shell that uniquely represent a text classification determination enables further aspects of the invention. Having machine readable unique codes that reflect the complete classification of a document, as well as having persistent unique identification codes on document storage media for electronic documents provides a positive solution to control the movement, storage or access to classified and/or sensitive information in electronic format on or among computer networks or computer domains. In effect the controls equate to virtual perimeters for documents/information on computers, networks or among domains of networks at the file level based on the sensitivity or classification of the information contained in the document, the type of operating system event, the predetermined storage authority for media and/or the security clearance or access profile of the system user. The authorities for these elements are pre-determined in a matrix and the invention enhanced classification and monitoring engine is able to allow or prevent activities based on reliable, persistent and complete or full classification determinations. In this aspect of the invention, the reliable, unique, persistent and complete classification coding embedded in the electronic shell of a document or embedded on document storage media enable the invention to establish dynamic electronic perimeters to control the electronic access to or movement of classified or sensitive information. By means of the enhanced classification aspect of the invention, which establishes a complete classification of all information, whether visible or hidden, for a document, and the unique embedded classification codes that represent text based classification determination—for example “Top Secret//Special Access Required/Blue Dog/Red Dog/Noform//3.3 (b) 25×2” classification my be represented by the invention's modified classification engine as {BC3C66FE-35D2-44EE-954F-61C0A34ACF1}{CB30C677-D35F-FF23-BC25-BBC24BA12E89}{556B329C-25AB-4312-AAB9-BC34A237CC9}{7B954CC2-FF34-673B-8CCA-BB3C4C67AAB}{F2B45CCA-BB34-23FF-5649-23FCA2B789F}{2CA34B64-CB56-234F-935A-FCA34B23C98} and embeds the codes in the electronic shell of the document. The invention by means of testing for certain codes in the documents electronic shell can relate the presence or absence of codes to an action matrix maintained on the inventions network server, thereby, imposing positive controls or dynamic perimeters to allow or prevent operating system or host application events or activity for the document/information across a network or among networks or domains of networks without the potential of compromise of the text based classification determination, which may in itself be classified and or sensitive. The invention's capability to log document access or document movement or attempts by users to initiate such actions provides additional methods and processes of the invention to warn or alert security personnel to attempted operating system or application software events that are pre-determined to pose possible serious security risk to the information/document.
While the invention has been described with reference to specific embodiments, modifications, variations of the invention may be constructed without departing from the scope of the invention.
Claims
1. A computer system comprising a method and system in real-time, by means of a user interface or desk-top tool functioning in conjunction with and within a host document development software application, to assure that users of the document development application assess and make classification determinations on all possible informational content of an electronic document regardless of the attributes (visible, hidden, etc) assigned to the informational portions of the electronic document by the host document development software or user's (past or present) of the document development software, or the location of the information within the total electronic, digital, computer, or machine representation of the document.
2. The method and system of claim 1 further comprising a method and system to monitor in real-time user changes in the text/informational content of a document via the host document development software application to assure that added information, portions and/or changes to portions or information are identified and presented to the document user/classifier in real-time, for the purpose of assessing and properly classifying or maintaining the proper classification of the full or complete information of an electronic document, and the posting in local and/or network databases the document changes and any corresponding or resultant user classification events.
3. The method and system of claim 2 further comprising of a method and system to dynamically provide real-time, constant, visible feedback to the developer/classifier of electronic documents, or subsequent users of an electronic document, of the full text based classification determination, or classification mark, for all of the informational content of the complete electronic document, within the banner display scheme of the host document development software application.
4. The method and system of claim 3 further comprising a method and system to dynamically, in real-time, assess and display within the host document development software application the proper classification determination, or classification mark, in a text based format in accordance with the classification rules and regulations of an organization, for subset electronic, informational views or displays of an electronic document, and potentially printed hard copy subsets of the full informational content of an electronic document, within the current informational subset view or display of the document in the host application, while persistently maintaining the full classification determination for all of the information contained in the document in the banner of the document development software.
5. The method and system of claim 4 further comprising of a method and system to dynamically post in real-time a unique, machine readable code that represents the full or complete text based classification determination of all the information contained in an electronic document into the electronic shell of an electronic document.
6. The method and system of claim 5 further comprising of a system and method to ensure that the codes representing the total text based classification determination of all of the informational content of an electronic document are persistently embedded into the electronic shell of an electronic document and cannot be changed outside of the host document development software without detection.
7. The method and system of claim 6 further comprising a system and method to dynamically, in real-time, post and record the full or complete classification determination for all of the information in an electronic document, to a local and/or network databases, to log current document classification status, and pertinent document information as well as assigning a unique identification code to each document for the purpose of positively tracking document changes and access and assuring the persistent aspect of the embedded full classification and document identification codes embedded in the electronic shell of electronic documents by the invention's methods.
8. The method and system of claim 7 further comprising a system and method to monitor in real-time, and identify the removal of, or change to, the full classification code imbedded by the invention into the shell of an electronic document, by means outside of the authorized host document development software for the electronic document, and warning/alerting in real-time of the removal or change to the embedded full classification code, as well as subsequent, immediate re-posting to the electronic shell of the document the proper classification code for the document from a database and logging the event in local and/or network databases for the purpose of assuring the protection of the information contained in the electronic document and the reliability of security controls for the document effected and based on the embedded full classification code in the shell of an electronic document.
9. The method and system of claim 8 further comprising a system and method to establish and maintain virtual security perimeters in real-time within networks or domains of networks authorized to manage various levels of national security classified or sensitive information, by means of monitoring and assessing the full or complete classification code imbedded into the electronic shell of a document or within storage media for electronic documents, against a controlling database of matrixes of preset conditions, precipitated by an operating system event or call (copy, move, print, send, rename, delete, etc), or a similar software application activity event within a computer, network of computers, or domains of networks, within the physical security perimeter of such networks, for the purpose of determining if the full classification code for the document's information allows the operating system or application event to occur, as well as the logging and recording of successful event activity or attempted/denied event activity in a local and/or network databases for security system oversight and management.
10. The method and system of claim 9 further comprising a system and method to continuously monitor in real-time computers outside of the physical security perimeter of a certain sensitivity or classification level of a computer, network of computers or domain of networks or otherwise unauthorized to receive or store predetermined levels of classified or sensitive information, for full classification codes embedded into the shells of electronic, or on storage media for electronic documents, for the purpose of positive and immediate identification of breaches of physical security perimeters and the real-time notification of such security perimeter breaches to predetermined security or management personnel and/or the real-time initiation of computer, network or domain active measures to prevent the further dissemination of the information in accordance with preset matrixes in a controlling database, without jeopardizing or providing undue insight to the sensitivity or classification of the organization's classification criteria used to assign classifications to documents and information.
Type: Application
Filed: May 12, 2009
Publication Date: Jul 22, 2010
Inventors: James Luke Turner (Raleigh, NC), Robert Edward Turner (Huntingtown, MD)
Application Number: 12/454,094
International Classification: G06F 21/24 (20060101); G06F 17/24 (20060101); G06F 17/00 (20060101);