US 12,316,675 B2
Content based security requirements
Fang Lu, Billerica, MA (US); Jeremy R. Fox, Georgetown, TX (US); Martin G. Keen, Cary, NC (US); and Uri Kartoun, Cambridge, MA (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Sep. 16, 2021, as Appl. No. 17/447,813.
Prior Publication US 2023/0080992 A1, Mar. 16, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 21/62 (2013.01)
CPC H04L 63/20 (2013.01) [G06F 21/6218 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
determining characteristics of a set of objects having a first sensitivity score, the characteristics including at least one of memory size, total number of words in an object, access frequency, and storage time;
associating, from the determined characteristics, a set of characteristics of the set of objects with the first sensitivity score;
creating a rules database establishing links between object characteristics and security requirements, the rules database:
linking the set of characteristics with the first sensitivity score; and
linking the first sensitivity score with a set of security requirements;
monitoring use of a computing system for an object modification, the object modification includes adding content to the object;
responsive to detecting the object modification, identifying an object being modified by the object modification and a storage location of the object, the object having a pre-defined sensitivity score, the storage location having a pre-defined security score, and the storage location being secured according to a first security protocol based on the pre-defined security score of the storage location being below a threshold value for maintaining the first security protocol;
computing a revised sensitivity score for the object during modification of characteristics of the object;
revising the pre-defined security score of the identified storage location based on the revised sensitivity score of the object stored therein to generate a revised security score of the storage location; and
responsive to the revised security score of the storage location exceeding the threshold value, taking a security action to modify the first security protocol.