Method and system for managing the display of sensitive content in non-trusted environments
First Claim
Patent Images
1. A system for managing a presentation of sensitive content in non-trusted environments, comprising:
- a memory;
a display; and
a processor coupled to the memory and the display, wherein the processor is programmed to;
interrogate a list of one or more corporate policies associated with a given user and a physical device, the policy data being acquired locally from the physical device or dynamically via access to a corporate network, each corporate policy prohibiting or restricting access to corporate data in a non-trusted environment;
determine a location of the physical device;
determine whether the user and the physical device is in a trusted or non-trusted environment by comparing the determined location of the physical device with a list of trusted locations, the list of trusted locations being embedded within the policy data or stored separately;
access a subscription-based service that maintains an organization list of individuals and machine identification information indicating that a listed individual or machine is associated with a predetermined organization;
determine that an individual or machine identified on the list associated with a competitive organization is within a predetermined proximity of the physical device, and in response thereto, transmitting an alert to the physical device; and
enforce a plurality of rules contained in the corporate policy for managing the presentation of sensitive content by blocking a visual presentation or audible presentation of at least one object in portions of the presentation if the physical device is not located in a trusted location or if an individual or a machine identified on the competitive organization list is within a predetermined proximity of the physical device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.
29 Citations
12 Claims
-
1. A system for managing a presentation of sensitive content in non-trusted environments, comprising:
-
a memory; a display; and a processor coupled to the memory and the display, wherein the processor is programmed to; interrogate a list of one or more corporate policies associated with a given user and a physical device, the policy data being acquired locally from the physical device or dynamically via access to a corporate network, each corporate policy prohibiting or restricting access to corporate data in a non-trusted environment; determine a location of the physical device; determine whether the user and the physical device is in a trusted or non-trusted environment by comparing the determined location of the physical device with a list of trusted locations, the list of trusted locations being embedded within the policy data or stored separately; access a subscription-based service that maintains an organization list of individuals and machine identification information indicating that a listed individual or machine is associated with a predetermined organization; determine that an individual or machine identified on the list associated with a competitive organization is within a predetermined proximity of the physical device, and in response thereto, transmitting an alert to the physical device; and enforce a plurality of rules contained in the corporate policy for managing the presentation of sensitive content by blocking a visual presentation or audible presentation of at least one object in portions of the presentation if the physical device is not located in a trusted location or if an individual or a machine identified on the competitive organization list is within a predetermined proximity of the physical device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A machine-readable storage, having stored thereon a computer program having a plurality of code sections executable by a machine for causing the machine to perform the steps of:
-
interrogating a list of one or more corporate policies associated with a given user and a physical device, the policy data being acquired locally from the physical device or dynamically via access to a corporate network, each corporate policy prohibiting or restricting access to corporate data in a non-trusted environment; determining a location of the physical device; determining whether the user and the physical device is in a trusted or non-trusted environment by comparing the determined location of the physical device with a list of trusted locations, the list of trusted locations being embedded within the policy data or stored separately; providing access to a subscription-based service that maintains an organization list of individuals and machine identification information indicating that a listed individual or machine is associated with a predetermined organization; determining that an individual or machine identified on the list associated with a competitive organization is within a predetermined proximity of the physical device, and in response thereto, transmitting an alert to the physical device; and enforcing a plurality of rules contained in the corporate policy for managing the presentation of sensitive content by blocking a visual presentation or audible presentation of at least one object in portions of the presentation if the physical device is not located in a trusted location or if an individual or a machine identified on the competitive organization list is within a predetermined proximity of the physical device. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification