Browse Prior Art Database

Scan FAX's for keywords related to security policy and control disposition of FAX based on keywords

IP.com Disclosure Number: IPCOM000030629D
Original Publication Date: 2004-Aug-20
Included in the Prior Art Database: 2004-Aug-20
Document File: 1 page(s) / 23K

Publishing Venue

IBM

Abstract

Incoming and outgoing FAX's can represent a security problem for an enterprise because the content of the FAX is usually not directly controlled by the security policy of the enterprise. Typically, enterprises rely on security training of trusted employees to control the content of FAX's as it relates to the enterprise security policy. Unfortunately, employee errors or deliberate deception can thwart security policy.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 74% of the total text.

Page 1 of 1

Scan FAX's for keywords related to security policy and control disposition of FAX based on keywords

    The technology used to search for and interpret text on an incoming FAX has matured significantly in the last several years. This technology is resident on most FAX and Multi-function devices containing FAX capability. Using this technology, text can be easily and quickly located on any incoming or outgoing FAX. Once converted to text, keywords are searched for by the FAX device. Examples of relevant security keywords in a corporate environment would include words like "confidential," and phrases like "internal use only." Examples in a government environment would include words like "secret," "bomb," etc. In some environments, particular languages could indicate a security action needs to be taken. For example, the discovery of Arabic on a FAX in some specific government environments could be used to trigger appropriate action.

    If a keyword is found on an outgoing FAX, configured actions are automatically taken by the FAX device such as: 1) prompting the user to confirm that this FAX transmission meets enterprise security policy, and/or 2) denying the transmission, and/or 3) routing of the attempted transmission, and/or information about the sender, by email to appropriate security personnel.

    If a keyword is found on and incoming FAX, configured actions are automatically taken by the FAX device such as: 1) routing of the transmission, as well as information about t...