Differential encryption utilizing trust modes
First Claim
Patent Images
1. A method of data security comprising:
- detecting the status of a connection between a system and a security system; and
when detecting that the system is disconnected from a security device, implementing a first encryption paradigm for the system; and
when detecting that the system is connected to the security device, implementing a second encryption paradigm for the system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques.
54 Citations
34 Claims
-
1. A method of data security comprising:
-
detecting the status of a connection between a system and a security system; and when detecting that the system is disconnected from a security device, implementing a first encryption paradigm for the system; and when detecting that the system is connected to the security device, implementing a second encryption paradigm for the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of data security comprising:
-
detecting whether a system is attended; and when detecting that the system is unattended, implementing a first encryption paradigm for the system; and when detecting that the system is attended, implementing a second encryption paradigm for the system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer-readable medium whose contents cause a computer to perform a method of data security comprising:
-
detecting the status of a connection between a system and a security system; and when detecting that the system is disconnected from a security device, implementing a first encryption paradigm for the system; and when detecting that the system is connected to the security device, implementing a second encryption paradigm for the system.
-
-
34. A computer-readable medium whose contents cause a computer to perform a method of data security comprising:
-
detecting whether a system is attended; and when detecting that the system is unattended, implementing a first encryption paradigm for the system; and when detecting that the system is attended, implementing a second encryption paradigm for the system.
-
Specification