×

Pervasive data security

  • US 10,484,339 B2
  • Filed: 03/24/2016
  • Issued: 11/19/2019
  • Est. Priority Date: 03/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computing device comprising:

  • a processor;

    at least one network interface coupled to the processor configured to enable communications via one or more communication networks;

    a memory for content and programming;

    a security client program stored in the memory, wherein execution of the security client program by the processor configures the computing device to perform acts comprising;

    intercepting an operating system call performed by a calling application to create a particular version of a plurality of versions of an unencrypted asset;

    requesting a first key for the unencrypted asset from a server, the first key corresponding to a user identity associated with the computing device and the particular version of the unencrypted asset;

    upon receiving the first key for the particular version of the unencrypted asset from the server;

    creating a secure resource by encrypting the unencrypted asset;

    completing the operating system call;

    sending an update message to the server, the update message including an indication to provide a second user identity with permission to access only the particular version of the unencrypted asset; and

    upon failing to receive the first key in response to requesting the first key, suspending the operating system until receipt of the first key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×