Systems and Methods for Preventing Access to Stored Electronic Data
First Claim
Patent Images
1. A method of securing data stored on removable electronic storage media comprising:
- authenticating a user of an agent computing device when the removable media is connected to the agent computing device, wherein the agent computing device is configured to store predefined access control information;
unlocking an encrypted portion of the removable media using an encryption key provided to the user when the user is authenticated;
identifying when the agent computing device has been compromised through detection of loss, theft, or unauthorized access to the agent computing device; and
communicating an access elimination command to the agent computing device upon receipt of an access elimination trigger, the access elimination command adapted to prevent further access to encrypted portions of the removable media.
1 Assignment
0 Petitions
Accused Products
Abstract
The techniques described herein include data security systems and methods adapted to protect stored data from unauthorized access. Encryption keys can be maintained on a removable media that allow an authorized user of an agent computing device to access encrypted portions of the removable media. The agent computing device controls access using predefined access control information. An access elimination command communicated to the agent computing device can prevent further access to encrypted data on the removable media.
32 Citations
30 Claims
-
1. A method of securing data stored on removable electronic storage media comprising:
-
authenticating a user of an agent computing device when the removable media is connected to the agent computing device, wherein the agent computing device is configured to store predefined access control information; unlocking an encrypted portion of the removable media using an encryption key provided to the user when the user is authenticated; identifying when the agent computing device has been compromised through detection of loss, theft, or unauthorized access to the agent computing device; and communicating an access elimination command to the agent computing device upon receipt of an access elimination trigger, the access elimination command adapted to prevent further access to encrypted portions of the removable media. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system configured to secure data stored on removable electronic storage media, the system comprising:
-
an authentication module configured to authenticate a user of an agent computing device when the agent computing device is connected to the removable electronic storage media; a memory to store predefined access control information on the agent computing device; and an encryption key associated with the user when the user is authenticated to unlock an encrypted portion of the removable media; a detection module configured to identify when the agent computing device has been compromised through loss, theft, or unauthorized access of the agent computing device; and a communication module configured to send an access elimination command to the agent computing device upon receipt of an access elimination trigger, the access elimination command adapted to prevent further access to encrypted portions of the removable media. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification