×

System and method for intelligence based security

  • US 9,141,815 B2
  • Filed: 12/12/2012
  • Issued: 09/22/2015
  • Est. Priority Date: 02/18/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented in a computer system having a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the computer system to perform data security operations, the method comprising:

  • applying one or more security measures to data identified by an application-specific file type, maintain the one or more security measures applicable to data while the data is not in use, and automatically remove the one or more security measures from the data in response to detecting a triggering file operation requesting access to the data; and

    applying the one or more security measures to the data in response to detecting a triggering file operation, the one or more security measures being applied based on one or more intelligence based encryption rules, each intelligence based encryption rule including one or more of;

    a path at which data to be protected is stored, a scope of data to be protected stored at the path, or one or more attributes of processes required to be running for data to be protected; and

    receiving one or more parameters defining a security policy, and generate the one or more intelligence based encryption rules based on the security policy;

    identifying a hash of one or more user credentials stored in an operating system'"'"'s registry, the one or more user credentials including a password;

    moving the hash from the registry to an encrypted folder by applying the one or more intelligence based encryption rules to the hash;

    in response to a request by the operating system to perform a password check operation, placing an unencrypted version of the hash back in the registry; and

    moving the hash from the registry back to the encrypted folder upon completion of the password check operation by the operating system.

View all claims
  • 14 Assignments
Timeline View
Assignment View
    ×
    ×