U.S. patent application number 15/197974 was filed with the patent office on 2016-10-20 for email system for preventing inadvertant transmission of proprietary message or documents to unintended recipient.
The applicant listed for this patent is James Randall Beckers, Mark MEISTER. Invention is credited to James Randall Beckers, Mark MEISTER.
Application Number | 20160308814 15/197974 |
Document ID | / |
Family ID | 45439354 |
Filed Date | 2016-10-20 |
United States Patent
Application |
20160308814 |
Kind Code |
A1 |
MEISTER; Mark ; et
al. |
October 20, 2016 |
EMAIL SYSTEM FOR PREVENTING INADVERTANT TRANSMISSION OF PROPRIETARY
MESSAGE OR DOCUMENTS TO UNINTENDED RECIPIENT
Abstract
A system that alerts a sender of an email message as to the
addressees of the email, when the email is determined to be
sensitive, such as when it includes a word such a "confidential".
The user can allow the message to be sent or go back to a mail
create/edit operation where the message or list of addresses can be
revised. Trigger words can be stored in a table or database. The
system also detects sensitive words in attachments. The sensitive
words detected and their locations can be shown in a pop-up
message.
Inventors: |
MEISTER; Mark; (Potomac,
MD) ; Beckers; James Randall; (Rockville,
MD) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
MEISTER; Mark
Beckers; James Randall |
Potomac
Rockville |
MD
MD |
US
US |
|
|
Family ID: |
45439354 |
Appl. No.: |
15/197974 |
Filed: |
June 30, 2016 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
12831456 |
Jul 7, 2010 |
9406048 |
|
|
15197974 |
|
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
H04L 51/14 20130101;
H04L 51/30 20130101; H04L 51/04 20130101; G06Q 10/107 20130101 |
International
Class: |
H04L 12/58 20060101
H04L012/58 |
Claims
1. A method, comprising: specifying trigger words in a trigger word
table before a message is sent where the trigger words indicate
proprietary, confidential or sensitive material; detecting
initiation of sending of an email message by detecting activation
of a send function; scanning, by an email system, the message for
the trigger words of the trigger word table indicating that a
message may include proprietary, confidential or sensitive material
where the message comprises a message body and message attachments;
alerting the user, that the user is about to send a message when
the message includes one or more of the trigger words, with a
pop-up display message comprising a list of trigger words found,
locations in the message body and message attachments of the
trigger words found and an email address of the email message
recipient; allowing the user to approve sending the message and
sending the message using an icon; and allowing the user to
disapprove sending the message and initiate revising the message
using another icon.
2. A method as recited in claim 1, wherein the trigger words are
selected to stop sending of the email message determined as
comprising confidential, proprietary or sensitive material.
3. A method as recited in claim 1, wherein the user is alerted
directly when one or more of the trigger words are first found.
4. A method as recited in claim 1, wherein the alerting is
triggered by an exact match with one or more of the trigger
words.
5. A method as recited in claim 1, wherein the corresponding
locations of the one or more of the trigger words determined to be
included in the at least one of the message body and the attachment
of the email message respectively identify the one or more of the
trigger words as being located in one or more of a subject line,
the message body and the attachment.
6. A system, comprising: an email server computer; and an email
client computer allowing specification of trigger words in a
trigger word table before a message is sent where the trigger words
indicate proprietary, confidential or sensitive material, detecting
initiation of sending of an email message by detecting activation
of a send function., scanning, by an email system, the message for
the trigger words of the trigger word table indicating that a
message may include proprietary, confidential or sensitive material
where the message comprises a message body and message attachments,
alerting the user, that the user is about to send a message when
the message includes one or more of the trigger words, with a
pop-up display message comprising a list of trigger words found,
locations in the message body and message attachments of the
trigger words found and an email address of the email message
recipient, allowing the user to approve sending the message and
sending the message using an icon and allowing the user to
disapprove sending the message and initiate revising the message
using another icon.
7. A non-transitory computer readable storage storing a process,
comprising: specifying trigger words in a trigger word table before
a message is sent where the trigger words indicate proprietary,
confidential or sensitive material; detecting initiation of sending
of an email message by detecting activation of a send function;
scanning, by an email system, the message for the trigger words of
the trigger word table indicating that a message may include
proprietary, confidential or sensitive material where the message
comprises a message body and message attachments; alerting the
user, that the user is about to send a message when the message
includes one or more of the trigger words, with a pop-up display
message comprising a list of trigger words found, locations in the
message body and message attachments of the trigger words found and
an email address of the email message recipient; allowing the user
to approve sending the message and sending the message using an
icon; and allowing the user to disapprove sending the message and
initiate revising the message using another icon.
8. A display comprising a pop-up message indicating a message to be
sent is a sensitive message the pop-up display message includes a
surrounding border that blinks, an indication that the user is
about to send the message with one or more of trigger words
determined as indicating confidential, proprietary or sensitive
material, an email address of an addressee of the email message and
corresponding locations of the one or more of the trigger words in
the email message.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a U.S. Continuation Patent Application
filed under 37 USC 1.53(b) claiming the benefit of U.S. application
Ser. No. 12/831,456, filed Jul. 7, 2010, the disclosure of which is
incorporated herein by reference.
BACKGROUND
[0002] 1. Field
[0003] The present invention is directed to a system that can
prevent confidential or proprietary email messages from being
inadvertently sent.
[0004] 2. Description of the Related Art
[0005] Proprietary or otherwise sensitive or confidential
information is routinely exchanged during the ordinary course of
business. While the errant or inadvertent transmission of
proprietary information in the form a "hard-copy" is rare, such is
not the case when proprietary information is included in electronic
form (e.g., electronic mail, or "e-mail".) It is not at all
uncommon that email is misaddressed in haste or simply as the
result of an oversight. In that event, proprietary information can
and does fall into the wrong hands, e.g., a business competitor or
the adverse party in a legal proceeding, too frequently. What is
needed is the addition of at least two steps in the process of
creating and transmitting electronic messages in order to prevent
inadvertent disclosure of sensitive information. The first
additional step is one that scans the content of the email,
including any attachments, for markings that indicate it includes
proprietary information (e.g., "Proprietary" header and/or footer,
etc.). The second additional step requests that the sender confirm
that the email and attachments are intended for the specific
addressee(s).
SUMMARY
[0006] It is an aspect of the embodiments to provide a system that
alerts the user in order to prevent confidential or proprietary
email messages from being sent to an unintended recipient
inadvertently.
[0007] The above aspects can be attained by a system that alerts a
user with a message pop-up when an email message is to be sent that
may be sensitive, such as when it includes a word such a
"confidential". The user can allow the message to be sent or go
back to a mail create/edit operation where the message and/or
addressees can be revised. Trigger words can be stored in a table
or database. The system also detects sensitive words in
attachments. The sensitive words detected and their locations can
be shown in the pop-up message.
[0008] These together with other aspects and advantages which will
be subsequently apparent, reside in the details of construction and
operation as more fully hereinafter described and claimed,
reference being had to the accompanying drawings forming a part
hereof, wherein like numerals refer to like parts throughout.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] FIG. 1 illustrates a computer network that can be used to
transmit proprietary or otherwise confidential information in
electronic form.
[0010] FIG. 2 illustrates some markings that might typically be
used to alert a recipient or a reader that the information included
in a transmission is proprietary or confidential.
[0011] FIG. 3 diagrams the high level steps that typically occur in
drafting an email up to the point that network transmission is
initiated. For the example, the use of the public Internet is
assumed as the transmission medium.
[0012] FIG. 4 extends the process diagramed in FIG. 3 in order to
affect the check and alert/confirm aspects of the subject
invention.
[0013] FIG. 5 illustrates the "Confirmation Request" that a sender
of proprietary information might see in order to prevent
inadvertent transmission.
[0014] FIG. 6 depicts scanning in more detail.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0015] Proprietary information is commonly exchanged among business
partners or potential partners. When it is, confidentiality is or
may be critical to a successful venture, and therefore the
unintended disclosure of proprietary information can have
disastrous effects.
[0016] In the modern times, most if not all business data is
exchanged electronically, for example by electronic mail ("email")
via the public Internet ("Internet"). FIG. 1 illustrates how
businesses are connected via the Internet, and specifically
illustrates a sender's computer 101 and a recipient's computer 103,
and their respective email servers 102 and 104. Typically, the
sender uses widely available word processing, spreadsheet,
presentation-builder, and/or client email applications resident on
his/her computer to create and store documents. When proprietary or
sensitive information is included in these documents, it is common
that the author and/or sender will add a caption to alert any
recipient as to the confidential nature of the information.
Representative markings are shown by reference numbers 201, 202,
and 203 in FIG. 2.
[0017] When a sender wishes to share proprietary information that's
been prepared as described above, they will ordinarily transmit it
via the Internet. As is commonly done today, an email is drafted
(see FIG. 3) 301 and addressed 302 using the client application on
the sender's computer 101. Attachments and "Proprietary" markings,
e.g., 201, are added 303 as applicable. When the user is ready to
send the email, she "presses" the "send" button 304 on her email
tool. From there, the sender's computer 101 makes a network
connection to an email server 102, and the email makes its way from
sender, to receiver's email server 104 and computer 103. Assuming
that the sender intended for that receiver to have the information
in or attached to the email, the desired result has been
achieved.
[0018] It can and does happen that email is errantly addressed and
therefore ends up in the possession of an unintended recipient. To
catch the unintended error and prevent this undesirable result,
operations 402-405 of FIG. 4 can, by way of example, be inserted in
the process. After the sender "presses" the "send" button 401 and
before the client email application may make a network connection
406 to its email server 102, the system detects the send button
activation and scans the email and attachments (as applicable) for
words indicative of sensitive information 402. The message is
examined, for example, for the words "proprietary", or
"confidential", or "sensitive", etc. This can be accomplished in
the same way that "spell checking" is implemented (or included as
part of that same step, if enabled, for that matter.) Note that a
custom dictionary of "trigger" words could optionally also be
compiled by the individual user or user's agency, and used during
the screening 402. The scanning process includes scanning the email
message and attachments, including the email subject line, headers,
footers, notes, body text, file name, etc. and any other parts of
the message that can be labeled with or include a trigger word,
such as meta data.
[0019] In the event that one of any of the recognizable words is
found 403, in either the email or the attachments, the application
displays a "Confirmation Request" 404 in the form of a "pop-up" 501
(see FIG. 5) on the display of the sender's computer 101. The
pop-up warns the sender that she is about to send proprietary
information 502, displays the addressee's email address 503, and
requests that the sender either "approve" 504 the transmission, in
which case the application makes the connection 406 to the email
server 102 to continue the conventional transmission sequence, or
the user can "cancel" 505 the transmission and return the sender to
any of the email drafting steps coming before the send button is
activated 401. This will allow the user to revise the message.
[0020] As depicted in FIG. 6, the system can scan 601 the email
message, including subject line, etc. for trigger words that can be
stored in a trigger word database 602. If a trigger word is found,
603, the confirmation request pop-up is displayed 404. If no
trigger words are found in the email message, the system can check
604 to see if the message has attachments. If there are
attachments, the type of the first attachments can be determined
605. When the attachments type is an image type, the attachment is
opened and an optical charter recognition process can be executed
606 to produce a text file of words in the image file. When the
file type of the attachment is a spread sheet, the cells of the
spread sheet can be converted 607 into a text file. When the file
type is text, the file can be opened and the text can scanned for
the trigger word of the database 602. Then, a determination 603 can
be made as to whether trigger words have been found. Again, if
trigger words are found, the pop-up can be displayed 404. When no
trigger words are found, the system can check 604 to see if
additional attachments are attached to the email message.
[0021] The embodiments have been described with the pop-up
confirmation being displayed when a trigger word is discovered,
this can occur when a trigger word is first encountered and it is
possible to scan the message and all attachments for trigger words
before displaying the pop-up and also provide a list indicating
where and what trigger words can be found in the message and/or
attachments.
[0022] The alert has been described as a pop-up message; the alert
can also include a sound alert as well as other alerting techniques
such as a blinking red box surrounding the pop-up message.
[0023] The embodiments have been described with respect to the scan
operation being performed by the client computer 101; however, the
scanning can be performed by the server or another machine. The
embodiments have been described as using a client computer (such as
a desktop, laptop, tablet, etc.) to create the email, attach the
attachments, send, etc.; however, it is possible for other types of
devices to create and send the email, for example, a handheld
digital assistant, a smart telephone, a smart cellular telephone,
etc.
[0024] The embodiments have been discussed with respect to
performing the word search for sensitive words being initiated by
the SEND button being pressed. However, the checking can occur
based on other events. For example, the checking can be initiated
when an address is added to the address filed of a message. As
another example, the checking can run in the background much like a
spell checker and alert the user whenever a sensitive word is added
to the message, that is, the checking can be initiated or started
by the creation of an email message or the start of the text. In
this situation, it is also possible to set a flag for the
production of an alert during the creation of the message when it
is being drafted and then pop-up the alert when an address is added
to the message address field. The checking can also occur,
particularly for an attachment, when or each time an attachment is
attached to a message.
[0025] The embodiments can be implemented in computing hardware
(computing apparatus) and/or software, such as (in a non-limiting
example) any computer that can store, retrieve, process and/or
output data and/or communicate with other computers. The results
produced can be displayed on a display of the computing hardware. A
program/software implementing the embodiments may be recorded on a
computer-readable media, e.g., a non-transitory or persistent
computer-readable medium. The program/software implementing the
embodiments may also be transmitted over a transmission
communication path, e.g., a network implemented via hardware.
Examples of the non-transitory or persistent computer-readable
media include a magnetic recording apparatus, an optical disk, a
magneto-optical disk, and/or a semiconductor memory (for example,
RAM, ROM, etc.). Examples of the magnetic recording apparatus
include a hard disk device (HDD), a flexible disk (FD), and a
magnetic tape (MT). Examples of the optical disk include a DVD
(Digital Versatile Disc), a DVD-RAM, a CD-ROM (Compact Disc-Read
Only Memory), and a CD-R (Recordable)/RW. An example of
communication media via which the program/software may be sent
includes, for example, a carrier-wave signal.
[0026] The many features and advantages of the invention are
apparent from the detailed specification and, thus, it is intended
by the appended claims to cover all such features and advantages of
the invention that fall within the true spirit and scope of the
invention. Further, since numerous modifications and changes will
readily occur to those skilled in the art, it is not desired to
limit the invention to the exact construction and operation
illustrated and described, and accordingly all suitable
modifications and equivalents may be resorted to, falling within
the scope of the invention.
* * * * *