System and method for lost data destruction of electronic data stored on portable electronic devices
First Claim
1. A method of automatically managing encrypted data stored on an electronic device based upon rules stored on another electronic device, comprising the steps of:
- downloading from a network, a set of customized rules to a first electronic device, wherein the set of customized rules includes at least some encryption rules replicated from a second electronic device using a predetermined mapping function;
applying the rules on the first electronic device to encrypted data stored on the first device that is similar to encrypted data stored on the second electronic device; and
preventing access to the encrypted data when the first electronic device is determined to be lost, wherein the set of customized rules includes rules used in determining that the first electronic device is lost.
1 Assignment
0 Petitions
Accused Products
Abstract
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device communicates periodically with a server. If communications is note established between the client and the server for a selected activation interval and a subsequent grace period, the data is determined to be lost, and programmed security rules are automatically executed. Rules relating to encryption, as well as other security procedures, can be defined and entered by an administrator with access to the server, and then disseminated to each of a plurality of clients that access the server.
-
Citations
20 Claims
-
1. A method of automatically managing encrypted data stored on an electronic device based upon rules stored on another electronic device, comprising the steps of:
-
downloading from a network, a set of customized rules to a first electronic device, wherein the set of customized rules includes at least some encryption rules replicated from a second electronic device using a predetermined mapping function; applying the rules on the first electronic device to encrypted data stored on the first device that is similar to encrypted data stored on the second electronic device; and preventing access to the encrypted data when the first electronic device is determined to be lost, wherein the set of customized rules includes rules used in determining that the first electronic device is lost. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for lost data destruction data, comprising:
-
maintaining a set of customized rules in a portable electronic device, wherein the set of customized rules includes at least some encryption rules replicated from another electronic device using a predetermined mapping function; providing access to encrypted data stored on the portable electronic device in accordance with the set of customized rules, wherein the encrypted data includes data similar to data stored in the another electronic device; and preventing access to the encrypted data when the portable electronic device is determined to be lost, wherein the set of customized rules includes rules for determining that the portable electronic device is lost. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification