Securing data using integrated host-based data loss agent with encryption detection
First Claim
Patent Images
1. A method, comprising:
- detecting an attempted access to write content in a host computer system to a removable device;
determining whether the content comprises data that is not encrypted;
determining an encryption status of the removable device, based, at least in part, on examining whether blocks or sectors written on the removable device are encrypted or whether an encrypted portion of the content will be written to the removable device; and
blocking the attempted access to the removable device, based, at least in part, on the encryption status, and in response to a determination that the content comprises the data that is not encrypted.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
187 Citations
17 Claims
-
1. A method, comprising:
-
detecting an attempted access to write content in a host computer system to a removable device; determining whether the content comprises data that is not encrypted; determining an encryption status of the removable device, based, at least in part, on examining whether blocks or sectors written on the removable device are encrypted or whether an encrypted portion of the content will be written to the removable device; and blocking the attempted access to the removable device, based, at least in part, on the encryption status, and in response to a determination that the content comprises the data that is not encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for handling data, comprising:
-
a processor operable to execute computer program instructions; and a memory operable to store the computer program instructions, wherein the computer program instructions, when executed, cause the processor to detect an attempted access to write content to a removable device; determine whether the content comprises data that is not encrypted; determine an encryption status of the removable device, based, at least in part, on examining whether blocks or sectors written on the removable device are encrypted or whether an encrypted portion of the content will be written to the removable device; and block the attempted access to the removable device, based, at least in part, on the encryption status, and in response to a determination that the content comprises the data that is not encrypted. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product embodied in a non-transitory medium and, when executed by a processor, causes the processor to perform operations, comprising:
-
detecting an attempted access to write content in a host computer system to a removable device; determining whether the content comprises data that is not encrypted; determining an encryption status of the removable device, based, at least in part, on examining whether blocks or sectors written on the removable device are encrypted or whether an encrypted portion of the content will be written to the removable device; and blocking the attempted access to the removable device, based, at least in part, on the encryption status, and in response to a determination that the content comprises the data that is not encrypted. - View Dependent Claims (14, 15, 16, 17)
-
Specification