METHOD AND SYSTEM FOR PROTECTING USER DATA IN A NODE
First Claim
1. A method for protecting data comprising:
- detecting at least one of an attempt to compromise security of data stored in a residing node and an actual security breach of the data stored in the residing node; and
moving the data from the residing node to an escrow node upon detection of at least one of the attempt to compromise security and the actual security breach, the escrow node being a trustworthy intermediary node.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for protecting data stored in a node are disclosed. Upon detection of an attempt to compromise security at a residing node, the data may be moved from the residing node to an escrow node which is a trustworthy intermediary node. The data may be encrypted prior to transmission to the escrow node. Stakeholders of the data may be notified of such movement so that the stakeholders may take action. An attempted breach of security may automatically place the residing node in a compromised state, upon which the owner may submit the residing node to a security bureau to clear the compromised state. The escrow node may transfer the data to an off-site node if the owner or user of the residing node is not trustworthy. The residing node may send a message to an intermediary node as a notification regarding a breach in security, and encrypts the data with a new encryption key issued by the intermediary node.
41 Citations
92 Claims
-
1. A method for protecting data comprising:
-
detecting at least one of an attempt to compromise security of data stored in a residing node and an actual security breach of the data stored in the residing node; and
moving the data from the residing node to an escrow node upon detection of at least one of the attempt to compromise security and the actual security breach, the escrow node being a trustworthy intermediary node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of protecting data comprising:
-
detecting an attempt to compromise security of data stored in a residing node; and
disallowing a usage right associated with the data.
-
-
35. A method of protecting data stored in a residing node, the method comprising:
-
detecting an attempt to compromise security of data stored in a residing node; and
sending a message to a generator of the data to inform the generator of the detected attempt to compromise security of the stored data, whereby the generator takes an action to protect the stored data. - View Dependent Claims (36, 37, 38)
-
-
39. A method of protecting data comprising:
-
detecting an attempt to compromise security of data stored in a residing node; and
the residing node sending a message to an intermediary node as a notification regarding the detected attempt to compromise security of the stored data;
the intermediary node issuing a new encryption key to the residing node; and
the residing node encrypting the data with the new encryption key. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46)
-
-
47. A system for protecting data comprising:
-
a residing node comprising;
a user data module for storing data; and
a security module for detecting at least one of an attempt to compromise security of the stored data and an actual security breach of the stored data in the residing node; and
an escrow node for moving the data from the residing node upon detection of at least one of the attempt to compromise security of the stored data and the actual security breach of the stored data, the escrow node being a trustworthy intermediary node. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
-
-
80. A node for protecting data comprising:
-
a user data module for storing data; and
a security module for detecting an attempt to compromise security of the stored data in the node and for disallowing a usage right associated with the stored data.
-
-
81. A system for protecting data comprising:
-
a generator of data; and
a residing node comprising;
a user data module for storing data; and
a security module for detecting an attempt to compromise security of the stored data and for sending a message to the generator of the data to inform the generator of the attempt to compromise security of the stored data, whereby the generator takes an action to protect the stored data. - View Dependent Claims (82, 83, 84)
-
-
85. A system for protecting data comprising:
-
an intermediary node; and
a residing node comprising;
a user data module for storing data; and
a security module for detecting an attempt to compromise security of the stored data, wherein the residing node sends a message to the intermediary node as a notification regarding the attempt to compromise security of the stored data, the intermediary node issues a new encryption key to the residing node and the residing node encrypts the stored data with the new encryption key. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92)
-
Specification