×

System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device

  • US 8,782,084 B2
  • Filed: 03/31/2009
  • Issued: 07/15/2014
  • Est. Priority Date: 03/31/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product embodied on a non-transitory medium for performing operations, comprising:

  • initiating a data loss prevention (DLP) system provided on a device, the DLP system configured for preventing data leakage associated with personally identifying data associated with passwords specific to a user of the device, wherein the data is stored in a secured portion of a memory of the device in an encrypted form;

    determining a location of the device, which is configured for storing data, using a core location framework that is built into a core services layer of an operating system of the device, wherein the core location framework is configured to determine the location of the device based upon received signal information indicative of the location of the device;

    when the location of the device is determined;

    comparing the location to a list of predetermined geographic locations for which access to the data of the device is allowed, wherein the list includes specific buildings for which access to the data of the device is to be allowed;

    identifying a particular time of day for which access to the data is being requested; and

    allowing access to the data by decrypting the data from the secured portion of the memory, based on determining that the location is secure, and based on identifying that the particular time of day is authorized for accessing the data; and

    when the location of the device is not determined;

    requesting a predetermined key from the user;

    determining a correctness of the predetermined key from the user by comparing the predetermined key from the user to a predetermined key determined by the DLP system to indicate that the predetermined key from the user is correct;

    allowing access to the data by decrypting the data from the secured portion of the memory based on determining that the predetermined key from the user is correct, and based on identifying that the particular time of day is authorized for accessing the data; and

    blocking access to the data in response to determining that the predetermined key from the user is not correct and determining whether a number of times the user has incorrectly entered the predetermined key exceeds a threshold.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×