System and method to provide server control for access to mobile client data
First Claim
Patent Images
1. A method for protecting a data item, comprising:
- upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score of the data item, a confidence level that a user of the client device is an authorized user, and a current protection level of the data item, the sensitivity score being generated based on a value of the data item to a particular individual or organization and a cost of recreating the data item if destroyed or modified;
applying, using a processor, a policy to determine an appropriate protection for the data item based upon the sensitivity score, the confidence level, and the current protection level; and
providing a protected data item to the client device by applying the appropriate protection to the data item, wherein a unique encryption key is employed for each application of a protection technique on each of one or more data items.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection, level of the data item. A policy is applied to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level. A protected data item is provided to the client device by applying the appropriate protection to the data item.
23 Citations
20 Claims
-
1. A method for protecting a data item, comprising:
-
upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score of the data item, a confidence level that a user of the client device is an authorized user, and a current protection level of the data item, the sensitivity score being generated based on a value of the data item to a particular individual or organization and a cost of recreating the data item if destroyed or modified; applying, using a processor, a policy to determine an appropriate protection for the data item based upon the sensitivity score, the confidence level, and the current protection level; and providing a protected data item to the client device by applying the appropriate protection to the data item, wherein a unique encryption key is employed for each application of a protection technique on each of one or more data items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium comprising a computer readable program for protecting a data item, wherein the computer readable program when executed on a computer causes the computer to perform the steps of:
-
upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score of the data item, a confidence level that a user of the client device is an authorized user, and a current protection level of the data item, the sensitivity score being based on a value of the data item to a particular individual or organization and a cost of recreating the data item if destroyed or modified; applying a policy to determine an appropriate protection for the data item based upon the sensitivity score, the confidence level, and the current protection level; and providing a protected data item to the client device by applying the appropriate protection to the data item, wherein a unique encryption key is employed for each application of a protection technique on each of one or more data items. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for protecting a data item, comprising:
-
upon initiation of transfer of the data item from a server to a mobile device, determining a sensitivity score of the data item, a confidence level that a user of the client device is an authorized user, and a current protection level of the data item using a data protection server, the sensitivity score being generated based on a value of the data item to a particular individual or organization and a cost of recreating the data item if destroyed or modified; applying a policy to determine an appropriate protection for the data item using the data protection server, wherein the appropriate protection is based upon the sensitivity score, the current protection level, the confidence level, and features of at least one of the data item and the mobile device; and providing a protected data item to the mobile device by applying the appropriate protection to the data item using the data protection server, wherein a unique encryption key is employed for each application of a protection technique on each of one or more data items.
-
Specification