×

System, method and apparatus for electronically protecting data and digital content

  • US 7,937,579 B2
  • Filed: 03/16/2006
  • Issued: 05/03/2011
  • Est. Priority Date: 03/16/2005
  • Status: Active Grant
First Claim
Patent Images

1. A system for protecting sensitive data comprising:

  • one or more clients, each client having a data storage and a content manager, wherein two or more items of sensitive data are stored within a file on the data storage and the content manager extracts the sensitive data items from the file on the data storage, sends the extracted data items to a server for storage, receives a pointer for each extracted data item indicating where the extracted data item has been stored and replaces the extracted items of sensitive data stored in the file on the data storage with the pointers;

    the server communicably coupled to the one or more clients, wherein the server receives the extracted data items from the client, stores the extracted data items to a secure storage, generates the pointer for each extracted data item and sends the pointers to the client; and

    wherein the content manager and the server protect the sensitive data items within the file by restricting subsequent access to and use of the sensitive data items via the pointers based on one or more rules by;

    receiving a first request from one or more applications for data stored in the file on the data storage,determining whether the requested data includes one or more of the sensitive data items,providing the requested data to the one or more applications whenever the requested data does not include any of the sensitive data items, andperforming the following steps whenever the requested data includes one or more of the sensitive data items;

    sending a second request containing the pointer for each sensitive data item included in the requested data to the server that authenticates the second request,denying the first request whenever the authentication fails, andreceiving and providing the requested sensitive data items to the one or more applications whenever the authentication succeeds.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×