Cryptographic control for mobile storage means
First Claim
1. ) A method of regulating the interaction between a computing station and mobile storage means, the method comprising:
- a) monitoring one or more interfaces associated with the computing device for operational requests made by the mobile storage means;
b) identifying the operational requests and information associated with the mobile storage means;
c) retrieving a policy that comprises one or more rules associated with the computing station; and
d) evaluating the one or more rules associated with the policy to determine whether the operational request may be granted.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
-
Citations
11 Claims
-
1. ) A method of regulating the interaction between a computing station and mobile storage means, the method comprising:
-
a) monitoring one or more interfaces associated with the computing device for operational requests made by the mobile storage means; b) identifying the operational requests and information associated with the mobile storage means; c) retrieving a policy that comprises one or more rules associated with the computing station; and d) evaluating the one or more rules associated with the policy to determine whether the operational request may be granted. - View Dependent Claims (2, 3)
-
-
4. ) A method of regulating interaction between a computing station and a mobile storage means, the method comprising:
-
a) defining a policy for the computing station, wherein the policy comprises one or more allowable operations; b) associating the policy with the computing station by making the policy accessible to the computing station; and c) evaluating the policy in response to requested operations from the mobile storage means based on information retrieved from the mobile storage means. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. ) A computing device having access to computer program code, wherein when executed, configures the computing device to:
-
a) restrict the operations that may take place between a computing device and a mobile storage means; b) monitor one or more interfaces associated with the computing device to detect operational requests made by or to the mobile storage means; and c) enforce one or more rules associated with a policy that regulates the interaction between the computing device and the mobile storage means.
-
Specification