Method and system for managing the display of sensitive content in non-trusted environments
First Claim
Patent Images
1. A method for managing a presentation of sensitive content in non-trusted environments, comprising the steps of:
- interrogating a list of one or more corporate policies associated with a given user and a physical device, the policy data being acquired locally from the physical device or dynamically via access to a corporate network, each corporate policy prohibiting or restricting access to corporate data in a non-trusted environment;
determining a location of the physical device;
determining whether the user and the physical device is in a trusted or non-trusted environment by comparing the determined location of the physical device with a list of trusted locations, the list of trusted locations being embedded within the policy data or stored separately;
providing access to a subscription-based service that maintains an organization list of individuals and machine identification information indicating that a listed individual or machine is associated with a predetermined organization;
determining that an individual or machine identified on the list associated with a competitive organization is within a predetermined proximity of the physical device, and in response thereto, transmitting an alert to the physical device; and
enforcing a plurality of rules contained in the corporate policy for managing the presentation of sensitive content by blocking a visual presentation or audible presentation of at least one object in portions of the presentation if the physical device is not located in a trusted location or if an individual or a machine identified on the competitive organization list is within a predetermined proximity of the physical device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.
46 Citations
7 Claims
-
1. A method for managing a presentation of sensitive content in non-trusted environments, comprising the steps of:
-
interrogating a list of one or more corporate policies associated with a given user and a physical device, the policy data being acquired locally from the physical device or dynamically via access to a corporate network, each corporate policy prohibiting or restricting access to corporate data in a non-trusted environment; determining a location of the physical device; determining whether the user and the physical device is in a trusted or non-trusted environment by comparing the determined location of the physical device with a list of trusted locations, the list of trusted locations being embedded within the policy data or stored separately; providing access to a subscription-based service that maintains an organization list of individuals and machine identification information indicating that a listed individual or machine is associated with a predetermined organization; determining that an individual or machine identified on the list associated with a competitive organization is within a predetermined proximity of the physical device, and in response thereto, transmitting an alert to the physical device; and enforcing a plurality of rules contained in the corporate policy for managing the presentation of sensitive content by blocking a visual presentation or audible presentation of at least one object in portions of the presentation if the physical device is not located in a trusted location or if an individual or a machine identified on the competitive organization list is within a predetermined proximity of the physical device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification