Data security system and with territorial, geographic and triggering event protocol
First Claim
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
- separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content;
permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and
said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; and
at least one of;
prior to storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores;
orconcurrent with storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores.
2 Assignments
0 Petitions
Accused Products
Abstract
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described.
-
Citations
23 Claims
-
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; and at least one of; prior to storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores;
orconcurrent with storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein said access controls are applied to respective secure data stores in at least one of the following manners; said access controls applied sequentially to respective secure data stores; said access controls applied concurrently to respective secure data stores; said access controls applied to respective secure data stores subsequent to application of a security protocol; said secure data stores are mapped and said access controls are applied to obtain the mapped secure data stores;
orsaid access controls are applied subsequent to an exchange of compensation or an exchange of data, said access controls applied to respective secure data stores subsequent to application of a hierarchical security protocol.
-
-
21. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event, and wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server effecting said storing of sensitive content in secure data stores of said plurality of security data stores; and said server permitting reconstruction of some or all of said data by controlling the application of said access controls to respective secure data stores.
-
-
22. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server effecting said storing of sensitive content in secure data stores of said plurality of security data stores.
-
-
23. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server permitting reconstruction of some or all of said data by controlling the application of said access controls to respective secure data stores.
-
Specification