METHOD AND SYSTEM FOR SECURELY IDENTIFYING COMPUTER STORAGE DEVICES
First Claim
1. A method for securely controlling access of devices that are capable of storing data, the method comprising the steps ofuniquely identifying a device;
- andapplying a security policy that is based at least in party on the unique identification.
3 Assignments
0 Petitions
Accused Products
Abstract
In a private network setting in which various computers can be attached, the confidential or sensitive data within the various devices on the private network is vulnerable. The ability to copy such confidential or sensitive data to a storage device communicatively coupled to a client computer on the network is governed and controlled. Only devices that include an authentic stamp or digital certificate can be accessed by client computers. If a device does not have a valid stamp or the stamp has been black listed, then the access to the device can be prevented or greatly limited.
-
Citations
37 Claims
-
1. A method for securely controlling access of devices that are capable of storing data, the method comprising the steps of
uniquely identifying a device; - and
applying a security policy that is based at least in party on the unique identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
- and
-
20. A system for securely controlling access to memory storage devices existing or introduced into a network setting, the system comprising:
-
a server housing a security manager module; a plurality of client devices coupled to the server through a network; wherein the security manager module is operable to; control access to the each of the plurality of client devices contingent at least in part upon said client device being associated with a client agent; and apply a security policy related to accessing the storage device based at least in part on the identification information. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for protecting transferring of data between one or more client computers and one or more external devices, wherein the one or more client computers are clients of a private network that includes a security server, the method comprising the steps of:
-
a. connecting an external device to one of the one or more client computers; b. searching for a digital certificate that was previously written on the external device and was generated by the security server;
if the digital certificate was not found, then limiting the transfer of data to or from the external device, if the digital certificate exist proceeding to step c;c. processing the digital certificate and determining what type of data transferring is allowed between the external device and the client computer; and d. controlling the data transfer according to the processed decision.
-
-
30. A method of controlling access to storage devices to a system comprising:
determining a level of access to a storage device based on a security policy, said security policy based at least in part on a unique identifier previously stored on said storage device. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
Specification