Data security system and method for portable device
First Claim
1. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
- determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively;
permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
2 Assignments
0 Petitions
Accused Products
Abstract
The method, used with a portable computing device, secures security sensitive words, icons, etc. by determining device location within or without a predetermined region and then extracting the security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only in the presence of a predetermined security clearance and within certain geographic territories. A computer readable medium containing programming instructions carrying out the methodology for securing data is also described herein. An information processing system for securing data is also described.
467 Citations
146 Claims
-
1. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively;
permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively;
when said portable computing device is not beyond said predetermined region, permitting full or partial reconstruction of said data via said extracted data and remainder data in the presence of a predetermined security clearance.
-
-
48. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, extracting said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83)
-
-
84. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said security sensitive words, characters, data objects or icons extracted from said data to obtain extracted data and remainder data which is stored in said extract store and said remainder store, respectively, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
determining when said portable computing device is within a predetermined region based upon said current location data;
permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
-
-
85. A computer readable medium containing programming instructions for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, the programming instructions comprising:
-
determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively;
permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108)
-
-
109. A computer readable medium with programming steps for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, the programming steps comprising:
-
determining when said portable computing device is beyond a predetermined region based upon said current location data;
when said portable computing device is beyond said predetermined region, extracting said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store. - View Dependent Claims (110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123)
-
-
124. An information processing system for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
means for determining when said portable computing device is beyond a predetermined region based upon said current location data;
means for extracting, coupled to said means for determining, said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively;
means for permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region. - View Dependent Claims (125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145)
-
-
146. An information processing system for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
-
means for determining when said portable computing device is beyond a predetermined region based upon said current location data and generating a trigger;
means for extracting, upon said trigger when said portable computing device is beyond said predetermined region, said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store.
-
Specification