CONTENT CRYPTOGRAPHIC FIREWALL SYSTEM
First Claim
1. ) A method of regulating the interaction between the storage or content of a mobile storage device and a computer station, the method comprising:
- a) determining whether a request has been made for an operation to be performed between the storage or content of a mobile storage device and the computer station;
b) retrieving from storage or content provisioning information;
c) comparing security domain information associated with the storage or content and the computer station; and
d) evaluating one or more rules associated with the computer station to determine an action to implement based on the requested operation.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method that regulates the various operations between computing stations and storage or content. Any operation that involves or may lead to the exchange or accessing of content (data) between storage or hosting content container and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed/updated upon a computing station for specific User(s) and will regulate the data operations that may take place between the computing stations and storage or content based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
111 Citations
19 Claims
-
1. ) A method of regulating the interaction between the storage or content of a mobile storage device and a computer station, the method comprising:
-
a) determining whether a request has been made for an operation to be performed between the storage or content of a mobile storage device and the computer station; b) retrieving from storage or content provisioning information; c) comparing security domain information associated with the storage or content and the computer station; and d) evaluating one or more rules associated with the computer station to determine an action to implement based on the requested operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. ) A method of deploying a policy that governs the interaction between a computing station and the storage or content, the method comprising:
-
a) defining one or more rules to be associated with a policy, wherein the one or more rules are defined based on requested operations, one or more control criteria, one or more logical operations and one or more actions; b) creating a policy module based on the one or more rules defined; and c) installing the policy module upon the computing station. - View Dependent Claims (15)
-
-
16. ) A method of provisioning a storage or content upon a mobile storage device the method comprising:
-
a) specifying a policy comprised of one or more rules to be associated with the storage or content; b) generating an encryption key and a signature; and c) generating provisioning information, and writing the encryption key, signature, and provisioning information on storage or content. - View Dependent Claims (17, 18, 19)
-
Specification