Method and system for managing the display of sensitive content in non-trusted environments
First Claim
Patent Images
1. A method for managing the display of sensitive content in non-trusted environments, comprising the steps of:
- interrogating a list of policies associated with a given user and a physical device;
determining a location of the physical device;
comparing the location of the physical device with a list of trusted locations; and
enforcing a plurality of rules contained in the policy, wherein access to sensitive information is limited or restricted based on the location.
1 Assignment
0 Petitions
Accused Products
Abstract
A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.
95 Citations
18 Claims
-
1. A method for managing the display of sensitive content in non-trusted environments, comprising the steps of:
-
interrogating a list of policies associated with a given user and a physical device;
determining a location of the physical device;
comparing the location of the physical device with a list of trusted locations; and
enforcing a plurality of rules contained in the policy, wherein access to sensitive information is limited or restricted based on the location. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for managing the display of sensitive content in non-trusted environments, comprising:
-
a memory;
a display; and
a processor coupled to the memory and the display, wherein the processor is programmed to;
interrogate a list of policies associated with a given user and a physical device;
determine a location of the physical device;
compare the location of the physical device with a list of trusted locations; and
enforce a plurality of rules contained in the policy, wherein access to sensitive information is limited or restricted based on the location. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A machine-readable storage, having stored thereon a computer program having a plurality of code sections executable by a machine for causing the machine to perform the steps of:
-
interrogating a list of policies associated with a given user and a physical device;
determining a location of the physical device;
comparing the location of the physical device with a list of trusted locations; and
enforcing a plurality of rules contained in the policy, wherein access to sensitive information is limited or restricted based on the location. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification