Data security system and with territorial, geographic and triggering event protocol
First Claim
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
- separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content;
permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and
said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; and
at least one of;
prior to storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores;
orconcurrent with storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores.
2 Assignments
0 Petitions
Accused Products
Abstract
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described.
151 Citations
23 Claims
-
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; and at least one of; prior to storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores;
orconcurrent with storing, at least one or more of tagging, labeling, or classifying said sensitive content in said secure data stores. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein said access controls are applied to respective secure data stores in at least one of the following manners; said access controls applied sequentially to respective secure data stores; said access controls applied concurrently to respective secure data stores; said access controls applied to respective secure data stores subsequent to application of a security protocol; said secure data stores are mapped and said access controls are applied to obtain the mapped secure data stores;
orsaid access controls are applied subsequent to an exchange of compensation or an exchange of data, said access controls applied to respective secure data stores subsequent to application of a hierarchical security protocol.
-
-
21. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event, and wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server effecting said storing of sensitive content in secure data stores of said plurality of security data stores; and said server permitting reconstruction of some or all of said data by controlling the application of said access controls to respective secure data stores.
-
-
22. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server effecting said storing of sensitive content in secure data stores of said plurality of security data stores.
-
-
23. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, each data store having a defined security level, said data potentially having sensitive content defined as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
separately storing sensitive content in secure data stores of said plurality of security data stores at the respective defined security level for said sensitive content; permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores; and said storing or reconstruction based upon (i) territorial protocol and a geographic location signal or (ii) a triggering event; wherein the method of securing data is deployed in a client-server computer system with at least one server computer and a plurality of secure data stores, said server operatively coupled to at least one client computer and said secure data stores over a communications network, said server permitting reconstruction of some or all of said data by controlling the application of said access controls to respective secure data stores.
-
Specification