Data Security System and with territorial, geographic and triggering event protocol
First Claim
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising:
- storing separately sensitive content in secure data stores of said plurality of security data stores;
permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and
said storing or reconstruction based upon territorial protocol and a geographic location signal or a triggering event.
2 Assignments
0 Petitions
Accused Products
Abstract
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described.
377 Citations
28 Claims
-
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
storing separately sensitive content in secure data stores of said plurality of security data stores; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon territorial protocol and a geographic location signal or a triggering event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An information processing system for securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons,
means for storing separately sensitive content in secure data stores of said plurality of security data stores; -
means for permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said means for storing or means for reconstruction based upon territorial protocol and a geographic location signal or a triggering event.
-
-
28. A computer readable medium encoded with programming steps for securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
storing separately sensitive content in secure data stores of said plurality of security data stores; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon territorial protocol and a geographic location signal or a triggering event.
-
Specification