Coerced encryption on connected devices
First Claim
1. A method performed by a computing system comprising one or more processors and memory, the method comprising:
- synchronizing, over a network, one or more content items stored on a storage device of a personal computing device with one or more corresponding content items hosted by an online content management server;
subsequent to the synchronizing, receiving, at the online content management server, over a network from the personal computing device, an indication that disk encryption is currently disabled on the storage device; and
based, at least in part, on receiving the indication, performing both;
(a) withholding new synchronization data from the personal computing device for synchronizing the one or more content items stored on the storage device of the personal computing device with the corresponding one or more content items hosted by the online content management server, and (b) sending, from the online content management server, an instruction to the personal computing device to remove, from the storage device, the one or more content items stored on the storage device of the personal computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.
22 Citations
19 Claims
-
1. A method performed by a computing system comprising one or more processors and memory, the method comprising:
-
synchronizing, over a network, one or more content items stored on a storage device of a personal computing device with one or more corresponding content items hosted by an online content management server; subsequent to the synchronizing, receiving, at the online content management server, over a network from the personal computing device, an indication that disk encryption is currently disabled on the storage device; and based, at least in part, on receiving the indication, performing both;
(a) withholding new synchronization data from the personal computing device for synchronizing the one or more content items stored on the storage device of the personal computing device with the corresponding one or more content items hosted by the online content management server, and (b) sending, from the online content management server, an instruction to the personal computing device to remove, from the storage device, the one or more content items stored on the storage device of the personal computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method performed by a computing system comprising one or more processors and memory, the method comprising:
-
synchronizing one or more content items stored in a portion of a storage device of a personal computing device with corresponding one or more content items hosted by an online content management server by at least sending synchronization data from the online content management server to the personal computing device; subsequent to the synchronizing, determining, at the online content management server, that disk encryption is disabled on the storage device of the personal computing device, the storage device storing the one or more content items; based at least in part on the determining that disk encryption is disabled on the storage device of the personal computing device, performing both;
(a) withholding new synchronization data from the personal computing device for synchronizing the one or more content items stored in the portion of the storage device of the personal computing device with corresponding one or more content items hosted by the online content management server, and (b) sending, from the content management server, an instruction to the personal computing device to enable disk encryption for at least a portion of the storage device storing the one or more content items, the sending the instruction causing the personal computing device to automatically enable disk encryption for at least the portion of the storage device storing the one or more content items. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification