Methods And Devices For Protecting Private Data
First Claim
Patent Images
1. A method for protecting private data comprising:
- identifying one or more permissions associated with private data; and
controlling, through operation of a stored operating system (OS) at a device within a cloud-based network, a directional flow of data associated with the private data based on the identified permissions.
3 Assignments
0 Petitions
Accused Products
Abstract
Private data in a cloud-based network may be protected by insuring that inadvertent, malicious, or suspicious access to such data is minimized. Reachability analyses may generate directed graphs that can be displayed as paths on a graphical user interface. If a displayed component of a path indicates that inadvertent, malicious or suspicious access may occur corrective action may be taken to prevent such access.
-
Citations
60 Claims
-
1. A method for protecting private data comprising:
-
identifying one or more permissions associated with private data; and controlling, through operation of a stored operating system (OS) at a device within a cloud-based network, a directional flow of data associated with the private data based on the identified permissions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A device within a cloud-based network for protecting private data operable to:
-
identify one or more permissions associated with private data; and control, through operation of a stored operating system (OS), a directional flow of data associated with the private data based on the identified permissions. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification