System and method for intelligence based security
First Claim
1. A method implemented in a computer system having a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the computer system to perform data security operations, the method comprising:
- applying one or more security measures to data identified by an application-specific file type, maintain the one or more security measures applicable to data while the data is not in use, and automatically remove the one or more security measures from the data in response to detecting a triggering file operation requesting access to the data; and
applying the one or more security measures to the data in response to detecting a triggering file operation, the one or more security measures being applied based on one or more intelligence based encryption rules, each intelligence based encryption rule including one or more of;
a path at which data to be protected is stored, a scope of data to be protected stored at the path, or one or more attributes of processes required to be running for data to be protected; and
receiving one or more parameters defining a security policy, and generate the one or more intelligence based encryption rules based on the security policy;
identifying a hash of one or more user credentials stored in an operating system'"'"'s registry, the one or more user credentials including a password;
moving the hash from the registry to an encrypted folder by applying the one or more intelligence based encryption rules to the hash;
in response to a request by the operating system to perform a password check operation, placing an unencrypted version of the hash back in the registry; and
moving the hash from the registry back to the encrypted folder upon completion of the password check operation by the operating system.
14 Assignments
0 Petitions
Accused Products
Abstract
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
21 Citations
18 Claims
-
1. A method implemented in a computer system having a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the computer system to perform data security operations, the method comprising:
-
applying one or more security measures to data identified by an application-specific file type, maintain the one or more security measures applicable to data while the data is not in use, and automatically remove the one or more security measures from the data in response to detecting a triggering file operation requesting access to the data; and applying the one or more security measures to the data in response to detecting a triggering file operation, the one or more security measures being applied based on one or more intelligence based encryption rules, each intelligence based encryption rule including one or more of;
a path at which data to be protected is stored, a scope of data to be protected stored at the path, or one or more attributes of processes required to be running for data to be protected; andreceiving one or more parameters defining a security policy, and generate the one or more intelligence based encryption rules based on the security policy; identifying a hash of one or more user credentials stored in an operating system'"'"'s registry, the one or more user credentials including a password; moving the hash from the registry to an encrypted folder by applying the one or more intelligence based encryption rules to the hash; in response to a request by the operating system to perform a password check operation, placing an unencrypted version of the hash back in the registry; and moving the hash from the registry back to the encrypted folder upon completion of the password check operation by the operating system. - View Dependent Claims (2, 3)
-
-
4. A system for securing data, comprising:
-
at least one processor; and a memory operably coupled to at least one processor, the memory having program instructions stored thereon that, upon execution by the at least one processor, cause the system to; apply one or more security measures to data identified by an application-specific file type, maintain the one or more security measures applicable to data while the data is not in use, and automatically remove the one or more security measures from the data in response to detecting a triggering file operation requesting access to the data; and apply the one or more security measures to the data in response to detecting a triggering file operation, the one or more security measures being applied based on one or more intelligence based encryption rules, each intelligence based encryption rule including one or more of;
a path at which data to be protected is stored, a scope of data to be protected stored at the path, or one or more attributes of processes required to be running for data to be protected; andreceive one or more parameters defining a security policy, and generate the one or more intelligence based encryption rules based on the security policy; identify a hash of one or more user credentials stored in an operating system'"'"'s registry, the one or more user credentials including a password; move the hash from the registry to an encrypted folder by applying the one or more intelligence based encryption rules to the hash; in response to a request by the operating system to perform a password check operation, place an unencrypted version of the hash back in the registry; and move the hash from the registry back to the encrypted folder upon completion of the password check operation by the operating system. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A memory device having program instructions stored thereon that, upon execution by a processor of a computer system, cause the computer system to:
-
receive parameters defining a security policy; generate one or more intelligent security rules that are based on the security policy and that are directed to data that is identified by an application-specific file type; detect, by an intelligent security filter, a triggering file operation generated by an application that provides the application-specific file type; determine, by the intelligent security filter, that the one or more intelligent security rules requires a security measure to be applied to the data in response to the triggering file operation; and responsive to determining that the triggering file operation requires the security measure, apply the security measure to the data, wherein the detecting, determining, generating, and applying are performed without user interaction, wherein the security measure is applied without direction and control from the application, wherein the data includes a hash of a password stored in an operating system'"'"'s registry, and wherein applying the security measure includes;
(a) moving the hash from the registry to an encrypted folder, (b) placing an unencrypted version of the hash back in the registry in response to performance of a password check operation, and (c) moving the hash from the registry back to the encrypted folder upon completion of the password check operation. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification