发明名称 |
Data security system and with territorial, geographic and triggering event protocol |
摘要 |
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described. |
申请公布号 |
US9311499(B2) |
申请公布日期 |
2016.04.12 |
申请号 |
US200912403850 |
申请日期 |
2009.03.13 |
申请人 |
|
发明人 |
Redlich Ron M.;Nemzow Martin A. |
分类号 |
H04L29/06;G06F21/62 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
Kain, Jr. Robert C. |
主权项 |
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; and at least one of: prior to storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores; or concurrent with storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores. |
地址 |
|