Location based disk drive access
First Claim
1. A method of providing data security for a computing device having a data storage drive, comprising:
- identifying with the computing device a predetermined geographical area within which access to the data storage drive of the computing device is permitted;
identifying with the computing device a geographical location of the computing device;
denying access to at least a portion of the data storage drive with the computing device when the identified geographical location of the computing device is outside of the identified geographical area;
permitting access to at least a portion of the data storage drive with the computing device when the identified geographical location of the computing device is within the identified geographical area;
determining with the computing device that the geographical location of the computing device is not able to be identified;
upon determining the geographical location of the computing device is not able to be identified, determining with the computing device an amount of movement of the computing device; and
denying access to at least a portion of the data storage drive with the computing device when the determined amount of movement exceeds a threshold value.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, systems, and devices are described for providing data security. In one method, data security is provided for a computing device having a data storage drive. A predetermined geographical area within which access to the data storage drive of the computing device is permitted may be identified. A geographical location of the computing device also may be identified. When the identified geographical location of the computing device is outside of the identified geographical area, access to at least a portion of the data storage drive may be denied. When the identified geographical location of the computing device is within the identified geographical area, access to the portion (or all) of the data storage drive may be allowed.
-
Citations
20 Claims
-
1. A method of providing data security for a computing device having a data storage drive, comprising:
-
identifying with the computing device a predetermined geographical area within which access to the data storage drive of the computing device is permitted; identifying with the computing device a geographical location of the computing device; denying access to at least a portion of the data storage drive with the computing device when the identified geographical location of the computing device is outside of the identified geographical area; permitting access to at least a portion of the data storage drive with the computing device when the identified geographical location of the computing device is within the identified geographical area; determining with the computing device that the geographical location of the computing device is not able to be identified; upon determining the geographical location of the computing device is not able to be identified, determining with the computing device an amount of movement of the computing device; and denying access to at least a portion of the data storage drive with the computing device when the determined amount of movement exceeds a threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computing device, comprising:
-
a data storage drive; a location component configured to; identify a geographical location of the computing device; and a controller configured to; deny access to at least a portion of the data storage drive when the geographical location of the computing device identified by the location component is outside of a predetermined geographical area within which access to the data storage drive of the computing device is permitted permit access to at least a portion of the data storage drive when the identified geographical location of the computing device is within the predetermined geographical area; determine that the geographical location of the computing device is not able to be identified; upon determining the geographical location of the computing device is not able to be identified, determine an amount of movement of the computing device; and denying access to at least a portion of the data storage drive when the determined amount of movement exceeds a threshold value. - View Dependent Claims (16, 17)
-
-
18. A system for providing data security for a computing device having a data storage drive, comprising:
-
a stored security policy for the computing device that identifies a predetermined geographical area within which access to the data storage drive of the computing device is permitted; a processor configured to; identify a current geographical location of the computing device; deny access to at least a portion of the data storage drive of the computing device when the current geographical location of the computing device is outside of the predetermined geographical area; permit access to at least a portion of the data storage drive when the identified geographical location of the computing device is within the predetermined geographical area; determine that the geographical location of the computing device is not able to be identified; upon determining the geographical location of the computing device is not able to be identified, determine an amount of movement of the computing device; and denying access to at least a portion of the data storage drive when the determined amount of movement exceeds a threshold value. - View Dependent Claims (19, 20)
-
Specification