Data security in a disconnected environment
First Claim
Patent Images
1. A method for data protection comprising:
- receiving a request for data encrypted with an encryption key;
granting the request if an indicator value is within a threshold; and
modifying the indicator value.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and methods regulate access to sensitive data with minimal dependency on a communications network. Data access is quantitatively limited to minimize the data breaches resulting from, e.g., a stolen laptop or hard drive.
83 Citations
18 Claims
-
1. A method for data protection comprising:
-
receiving a request for data encrypted with an encryption key; granting the request if an indicator value is within a threshold; and modifying the indicator value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium whose contents cause a computer to perform a method for data protection comprising:
-
receiving a request for data encrypted with an encryption key; granting the request if an indicator value is less than a threshold; and advancing the indicator value.
-
Specification