发明名称 METHOD FOR SECURING ELECTRONIC DATA BY RESTRICTING ACCESS AND TRANSMISSION OF THE DATA
摘要 A method for securing data by embedding the data in a data structure and utilizing a sensor to detect transfer of the data structure. The data is embedded such that the data is only accessible by first executing an executable program. If the executable program determines that the device attempting to access the data (the accessing device) does not have permission to access the data, then the executable program destroys the data. If the data structure is transferred to another device, a sensor positioned to detect the data structure when transferred will identify the data. If the sensor determines that the data structure is not permitted to be transferred, then the sensor destroys the data.
申请公布号 US2016359858(A1) 申请公布日期 2016.12.08
申请号 US201615170048 申请日期 2016.06.01
申请人 Bottomline Technologies (DE), Inc. 发明人 Ramberg Fred;Ramberg Trevor
分类号 H04L29/06;G06F21/62 主分类号 H04L29/06
代理机构 代理人
主权项 1. A system for securing electronic data, the system comprising: an executable program stored on a non-transitory computer readable medium of an accessing device and configured to be executed by a processor of the accessing device; a data structure stored on a non-transitory computer readable medium of a host device, the data structure comprising: an identifier;embedded data accessible only by first executing the executable program, wherein: the executable program when executed determines if the accessing device attempting to access the embedded data has permission to access the embedded data;if the accessing device is determined not to have permission to access the embedded data, the executable program destroys the embedded data; andif the accessing device is determined to have permission to access the embedded data, the executable program allows the host device to access the embedded data; and a sensor positioned to detect the data structure when transferred from the host device to a receiving device outside of a predefined area, wherein the sensor is configured to: detect the identifier of the data structure when the data structure is transferred from the host device to a receiving device;access a permission table associating each of a plurality of identifiers with a permission regarding transfer and determine a permission associated with the identifier;if the permission associated with the identifier indicates that the data structure is permitted to be transferred to the receiving device, then the sensor is configured to allow the data structure to be transmitted to the receiving device; andif the permission associated with the identifier indicates that the data structure is not permitted to be transferred to the receiving device, then the sensor is configured to destroy the embedded data.
地址 Portsmouth NH US