Securing data based on network connectivity
First Claim
1. A method, comprising:
- storing a plurality of data documents;
identifying a trusted computer network;
monitoring a plurality of active network connections;
determining that the trusted computer network is unavailable by determining that the plurality of active network connections does not comprise the trusted computer network; and
in response to determining that the trusted computer network is unavailable, securing sensitive data documents, wherein securing the sensitive data documents comprises;
for each data document of the plurality of data documents, determining a respective classification of a plurality of classifications, the plurality of classifications comprising a sensitive classification based on predetermined criteria; and
encrypting particular data documents having the sensitive classification;
determining that the trusted computer network is available by determining that the plurality of active network connections comprises the trusted computer network; and
in response to determining that the trusted computer network is available, decrypting the particular data documents.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes identifying a trusted computer network. The method also includes monitoring a plurality of active network connections. The method further includes determining that the trusted computer network is unavailable by determining that the plurality of active network connections does not comprise the trusted computer network. The method additionally includes, in response to determining that the trusted computer network is unavailable, securing sensitive data documents. Securing the sensitive data documents includes, for each data document of a plurality of data documents, determining a respective classification of a plurality of classifications. The plurality of classifications includes a sensitive classification based on predetermined criteria. Securing the sensitive data documents also includes encrypting particular data documents having the sensitive classification.
27 Citations
17 Claims
-
1. A method, comprising:
-
storing a plurality of data documents; identifying a trusted computer network; monitoring a plurality of active network connections; determining that the trusted computer network is unavailable by determining that the plurality of active network connections does not comprise the trusted computer network; and in response to determining that the trusted computer network is unavailable, securing sensitive data documents, wherein securing the sensitive data documents comprises; for each data document of the plurality of data documents, determining a respective classification of a plurality of classifications, the plurality of classifications comprising a sensitive classification based on predetermined criteria; and encrypting particular data documents having the sensitive classification; determining that the trusted computer network is available by determining that the plurality of active network connections comprises the trusted computer network; and in response to determining that the trusted computer network is available, decrypting the particular data documents. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer configured to access a storage device, the computer comprising:
-
a processor; and a non-transitory, computer-readable storage medium storing computer-readable instructions that when executed by the processor cause the computer to perform; store a plurality of data documents; identifying a trusted computer network; monitoring a plurality of active network connections, at least one of which providing access to the trusted network; in response to monitoring the plurality of active network connections, determining that the trusted computer network is no longer available by determining that the plurality of active network connections no longer includes the trusted computer network; in response to determining that the trusted computer network is unavailable, securing sensitive data documents, wherein securing the sensitive data documents comprises; for each data document of the plurality of data documents, determining a respective classification of a plurality of classifications, the plurality of classifications comprising a sensitive classification based on predetermined criteria; and encrypting particular data documents having the sensitive classification; determining that the trusted computer network is available by determining that the plurality of active network connections comprises the trusted computer network; and in response to determining that the trusted computer network is available, decrypting the particular data documents. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product comprising:
-
a non-transitory computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code comprising; computer-readable program code configured to store a plurality of data documents; computer-readable program code configured to identify a trusted computer network; computer-readable program code configured to monitor a plurality of active network connections; computer-readable program code configured to determine that the trusted computer network is unavailable by determining that the plurality of active network connections does not comprise the trusted computer network; computer-readable program code configured to, in response to determining that the trusted computer network is unavailable, secure sensitive data documents, wherein securing the sensitive data documents comprises;
for each data document of the plurality of data documents, determining a respective classification of a plurality of classifications, the plurality of classifications comprising a sensitive classification based on predetermined criteria; and
encrypting particular data documents having the sensitive classification;
computer-readable program code configured to determine that the trusted computer network is available by determining that the plurality of active network connections comprises the trusted computer network; andin response to determining that the trusted computer network is available, decrypting the particular data documents. - View Dependent Claims (14, 15, 16, 17)
-
Specification