System and method for ensuring security of data stored on data storage devices
First Claim
1. A method for using an electronic computing device to prevent access to data stored in a preselected memory portion of a portable data storage device, comprising the steps of:
- providing the portable storage device with a first software program that comprises a current expiration time value wherein the first software program is configured to compare the current expiration time value against a time based parameter and activate a security mechanism to protect the data stored in the portable data storage device based on the comparison;
providing an electronic computing device with a second software program, the second software program being configured to receive data sent from the portable storage device and to;
identify the portable data storage device via the received data sent from the portable storage device; and
reset the current expiration time value of the first software program to a later time value according to, at least, a day of week schedule when the portable data storage device is in electronic communication with the electronic computing device prior to said comparison and the passage of the current expiration time.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access to the data and includes the step of providing the portable storage device with a first software program that has a current expiration time value. The first software program is able to compare the current expiration time value against a time based parameter and activate a security mechanism protecting the data stored in the portable data storage device based on the comparison. The method also includes the step of providing an electronic computing device with a second software program. The second software program is able to identify the portable data storage device and reset the current expiration time value of the first software program to a later time value when the electronic computing device is electronically communicating with the portable data storage device.
18 Citations
17 Claims
-
1. A method for using an electronic computing device to prevent access to data stored in a preselected memory portion of a portable data storage device, comprising the steps of:
-
providing the portable storage device with a first software program that comprises a current expiration time value wherein the first software program is configured to compare the current expiration time value against a time based parameter and activate a security mechanism to protect the data stored in the portable data storage device based on the comparison; providing an electronic computing device with a second software program, the second software program being configured to receive data sent from the portable storage device and to; identify the portable data storage device via the received data sent from the portable storage device; and reset the current expiration time value of the first software program to a later time value according to, at least, a day of week schedule when the portable data storage device is in electronic communication with the electronic computing device prior to said comparison and the passage of the current expiration time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for using an electronic computing device to prevent access to data stored in a preselected memory portion of a portable data storage device, comprising the steps of:
-
providing the portable storage device with a first software program that comprises a first current expiration time value wherein the first software program is configured to compare the first current expiration time value against a first time based parameter and activate a first security mechanism to protect the data stored in the portable data storage device based on the comparison; providing an electronic computing device with a second software program that comprises a second current expiration time value wherein the second software program is configured to; identify the portable data storage device via received data sent from the portable storage device; reset the first current expiration time to a later time value when the portable data storage device is in electronic communication with the electronic computing device prior to said comparison and passage of the first current expiration time; compare the second current expiration time value against a second time based parameter; and activate a second security mechanism based on the comparison of the second current expiration time value and the second time based parameter; and providing an administrative host electronic computing device that is remote from the electronic computing device and the portable data storage device with a third software program wherein the third software program is configured to; identify the electronic computing device; and reset the second current expiration time value to a later time value. - View Dependent Claims (14, 15, 16, 17)
-
Specification