System and method for lost data destruction of electronic data stored on portable electronic devices
First Claim
1. An electronic device adapted to maintain encrypted data using rules stored on a different electronic device, and comprising:
- storage configured to maintain a set of customized rules that includes at least some encryption rules replicated from the different electronic device using a predetermined mapping function; and
a processor that applies the rules to encrypted data stored in the electronic device, wherein the encrypted data is similar to encrypted data stored on the different electronic device, whereinthe processor is configured to determine when the electronic device is lost based on the set of customized rules and is further configured to prevent access to the encrypted data when the electronic device is determined to be lost, wherein the set of customized rules includes rules used in determining that the first electronic device is lost, and wherein the processor prevents access by causing one or more of destruction of an encryption key stored on the electronic device, destruction of data stored on the electronic device and disablement of the electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
A data security system and method protects stored data from unauthorized access. According to one aspect of the invention, a client computing device communicates periodically with a server. If communications is note established between the client and the server for a selected activation interval and a subsequent grace period, the data is determined to be lost, and programmed security rules are automatically executed. Rules relating to encryption, as well as other security procedures, can be defined and entered by an administrator with access to the server, and then disseminated to each of a plurality of clients that access the server.
-
Citations
6 Claims
-
1. An electronic device adapted to maintain encrypted data using rules stored on a different electronic device, and comprising:
-
storage configured to maintain a set of customized rules that includes at least some encryption rules replicated from the different electronic device using a predetermined mapping function; and a processor that applies the rules to encrypted data stored in the electronic device, wherein the encrypted data is similar to encrypted data stored on the different electronic device, wherein the processor is configured to determine when the electronic device is lost based on the set of customized rules and is further configured to prevent access to the encrypted data when the electronic device is determined to be lost, wherein the set of customized rules includes rules used in determining that the first electronic device is lost, and wherein the processor prevents access by causing one or more of destruction of an encryption key stored on the electronic device, destruction of data stored on the electronic device and disablement of the electronic device. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification