Protection of information in computing devices
First Claim
1. A method for protecting information in a computing device, comprising:
- detecting location of the computing device;
determining whether the location is an unauthorized location; and
restricting access to the information in response to the location being an unauthorized location.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.
-
Citations
34 Claims
-
1. A method for protecting information in a computing device, comprising:
-
detecting location of the computing device;
determining whether the location is an unauthorized location; and
restricting access to the information in response to the location being an unauthorized location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for protecting information in a computing device comprising:
-
one or more devices adapted to detect location of the computing device; and
a protection process coupled to the one or more devices, the protection process adapted to determine whether the location is in an unauthorized position and adapted to cause the information in the computing device to be restricted in response to the location being an unauthorized location. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for protecting information in a computing device, comprising:
-
detecting location of the computing device;
determining whether the location is an unauthorized location; and
creating one or more decoy files in the information in response to the location being an unauthorized location. - View Dependent Claims (32, 33, 34)
-
Specification