System and method for secure synchronization of data across multiple computing devices
First Claim
Patent Images
1. A computer implemented method comprising:
- detecting, at a server computing device, a file content update on a first computing device, the file, in a first format, created by a first application and the file to be synchronized on a plurality of different computing devices in a plurality of different formats optimized for rendering on different device types, the plurality of different computing devices including a second computing device receiving the file in a second format optimized for the second computing device;
associating, at the server computing device, a security policy with the file, wherein security controls are to be applied to the file based on the security policy, and wherein the security controls comprise one or more of viewing restrictions, copying restrictions, printing restrictions, forwarding restrictions, access restrictions, application of watermarks, setting of expiration dates and times, authentication requirements, redaction, and prevention of screen captures;
responsive to determining at the second computing device that one or more of the security controls to be applied to the file are unenforceable by a second application of the second computing device when the security controls are applied to the file in the second format;
transforming, at the server computing device, the file to a different format of the plurality of different formats, wherein the security controls, when applied to the file in the different format, are enforceable by the second application of the second computing device; and
applying, at the server computing device, the security controls to the file in the different format for enforcement, by the second application at the second computing device, of the applied security controls with respect to the file in the different format; and
propagating, at the server computing device, the file content update to the file in the different format comprising transforming the update to a corresponding update for the file in the different format.
5 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a plurality of different types of client computer systems in a plurality of formats. The method further comprises associating a security policy with the file, wherein the security policy includes restrictions to limit one or more actions that can be performed with the file, and synchronizing the file to a second client computing system while applying the security policy to provide controls for enforcement of the restrictions at the second client computer system.
34 Citations
29 Claims
-
1. A computer implemented method comprising:
-
detecting, at a server computing device, a file content update on a first computing device, the file, in a first format, created by a first application and the file to be synchronized on a plurality of different computing devices in a plurality of different formats optimized for rendering on different device types, the plurality of different computing devices including a second computing device receiving the file in a second format optimized for the second computing device; associating, at the server computing device, a security policy with the file, wherein security controls are to be applied to the file based on the security policy, and wherein the security controls comprise one or more of viewing restrictions, copying restrictions, printing restrictions, forwarding restrictions, access restrictions, application of watermarks, setting of expiration dates and times, authentication requirements, redaction, and prevention of screen captures; responsive to determining at the second computing device that one or more of the security controls to be applied to the file are unenforceable by a second application of the second computing device when the security controls are applied to the file in the second format; transforming, at the server computing device, the file to a different format of the plurality of different formats, wherein the security controls, when applied to the file in the different format, are enforceable by the second application of the second computing device; and applying, at the server computing device, the security controls to the file in the different format for enforcement, by the second application at the second computing device, of the applied security controls with respect to the file in the different format; and propagating, at the server computing device, the file content update to the file in the different format comprising transforming the update to a corresponding update for the file in the different format. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A secure synchronization system comprising:
-
a memory to store a file; and a hardware processor coupled with the memory, and configured; to detect, at a server computing device, a file content update on a first computing device, the file, in a first format, created by a first application and the file to be synchronized on a plurality of different computing devices in a plurality of different formats optimized for rendering on different device types, the plurality of different computing devices including a second computing device receiving the file in a second format optimized for the second computing device; to associate, at the server computing device, a security policy with the file, wherein security controls are to be applied to the file based on the security policy, and wherein the security controls comprise one or more of viewing restrictions, copying restrictions, printing restrictions, forwarding restrictions, access restrictions, application of watermarks, setting of expiration dates and times, authentication requirements, redaction, and prevention of screen captures; responsive to determining at the second computing device that one or more of the security controls to be applied to the file are unenforceable by a second application of the second computing device when the security controls are applied to the file in the second format; to transform, at the server computing device, the file to a different format of the plurality of different formats, wherein the security controls, when applied to the file in the different format, are enforceable by the second application of the second computing device; and to apply, at the server computing device, the security controls to the file in the different format for enforcement, by the second application at the second computing device, of the applied security controls with respect to the file in the different format; and to propagate, at the server computing device, the file content update to the file in the different format comprising transforming the update to a corresponding update for the file in the different format. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification