System and method for lost data destruction of electronic data stored on portable electronic devices
First Claim
1. A method of automatically encrypting similar data stored on a plurality of electronic devices based upon encryption rules stored on another electronic device, comprising the steps of:
- automatically creating a set of customized encryption rules for each of the plurality of electronic devices by replicating at least some of the encryption rules according to a predetermined mapping function and providing each set of customized rules in a storage area associated with the another electronic device;
upon connection of each one of the plurality of electronic devices with the another electronic device, automatically downloading the set of customized rules associated with the one electronic device to the one electronic device; and
applying the rules on the one electronic device to encrypt the similar data stored thereon.
1 Assignment
0 Petitions
Accused Products
Abstract
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device communicates periodically with a server. If communications is note established between the client and the server for a selected activation interval and a subsequent grace period, the data is determined to be lost, and programmed security rules are automatically executed. Rules relating to encryption, as well as other security procedures, can be defined and entered by an administrator with access to the server, and then disseminated to each of a plurality of clients that access the server.
-
Citations
6 Claims
-
1. A method of automatically encrypting similar data stored on a plurality of electronic devices based upon encryption rules stored on another electronic device, comprising the steps of:
-
automatically creating a set of customized encryption rules for each of the plurality of electronic devices by replicating at least some of the encryption rules according to a predetermined mapping function and providing each set of customized rules in a storage area associated with the another electronic device; upon connection of each one of the plurality of electronic devices with the another electronic device, automatically downloading the set of customized rules associated with the one electronic device to the one electronic device; and applying the rules on the one electronic device to encrypt the similar data stored thereon. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification