×

Data classification and access control for cloud based data

  • US 10,404,716 B2
  • Filed: 03/15/2017
  • Issued: 09/03/2019
  • Est. Priority Date: 02/13/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method of reducing or preventing data leakage which would otherwise occur from applications running at a client operating system (OS) and which do not operate in accordance with restrictions imposed by a data protection policy for confidential resources stored at a network resource server, wherein the computer-implemented method is performed by one or more processors when executing computer-executable instructions for the computer-implemented method, which comprises:

  • storing at the network resource server first data or resources that are designated as confidential, and second data or resources that are designated as public;

    storing at a policy server the data protection policy that determines the restrictions imposed by the data protection policy as to how one or more applications running at the client OS are to be restricted in terms of how the first data or resources are used or where the first data or resources are located or accessed;

    distributing the data protection policy from the policy server to the one or more client OS of one or more client systems, and wherein each client OS of the one or more client OS that receives the data protection policy has a credential store in which access credentials are stored that are required for authentication by the network resource server before granting access to an application running at a client OS of a given client of the one or more client systems to the first data or resources;

    determining at the client OS of the given client that a first application running at the client OS of the given client complies with the restrictions imposed by the data protection policy and that the first application is a compliant application;

    providing the compliant application with the access credentials stored at the credential store of the client OS of the given client required by the compliant application to access the first data or resources at the network resource server;

    determining at the client OS of the given client that a second application running at the client OS of the given client does not comply with the restrictions imposed by the data protection policy and that the second application is a noncompliant application; and

    denying the access credentials stored at the credential store of the client OS of the given client required by the noncompliant application to access the first data or resources at the network resource server.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×