Protecting Assets on a Device
First Claim
1. A method for protecting data assets on a computing device, the method comprising:
- searching, by a data protection module run by a processor, for at least one data asset on the computing device;
identifying, by the data protection module run by the processor, the at least one data asset based on at least one attribute associated with the at least one data asset;
classifying the at least one data asset; and
generating a map using the classification of the data asset.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention are directed to systems and methods for protecting data assets on a device. In embodiments of the invention, a data protection module dynamically and statically searches for one or more data assets and identifies the data assets based on one or more security and privacy attributes. The data assets are classified based on a policy and protected using one or more protection mechanisms. Additionally, data assets are ranked and a security and privacy map is generated and maintained. The security and privacy map may include association of the data assets with their location, ranking, protection mechanism, etc. In some embodiments, a user interface is provided on the device for viewing and generating the policy and/or the security and privacy map.
257 Citations
20 Claims
-
1. A method for protecting data assets on a computing device, the method comprising:
-
searching, by a data protection module run by a processor, for at least one data asset on the computing device; identifying, by the data protection module run by the processor, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device comprising:
-
a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising; searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a server computer; and a computing device communicatively coupled to the server computer through a communications network, the computing device comprising a processor and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising; searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. - View Dependent Claims (19, 20)
-
Specification