×

Using multiple display servers to protect data

  • US 9,355,282 B2
  • Filed: 03/24/2010
  • Issued: 05/31/2016
  • Est. Priority Date: 03/24/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • executing, by a processing device, a non-secure display server that provides a non-secure environment for data presented in a non-secure application window of the non-secure display server;

    detecting a plurality of secure documents being opened;

    executing, by the processing device in view of a first secure document of the plurality of secure documents being opened, a first secure display server as a first client to the non-secure display server, wherein the first secure display server provides a first secure environment for data of the first secure document to be presented in a first secure application window of the first secure display server and has a first security level for a first category of secure documents to restrict unauthorized sharing of information between a plurality of secure environments;

    loading a first application, associated with the first secure document, as a client of the first secure display server;

    executing, by the processing device in view of a second secure document of the plurality of secure documents being opened, a second secure display server as a second client to the non-secure display server, wherein the second secure display server provides a second secure environment for data of the second secure document to be presented in a second secure application window of the second secure display server, and has a second security level for a second category of secure documents to restrict unauthorized sharing of information between a plurality of secure environments;

    loading a second application, associated with the second secure document, as a client of the second secure display server;

    receiving a user command to copy data from the secure application window running in the first secure environment of the first secure display server to the second secure application window running in the second secure environment of the second secure display server;

    determining whether the second application in the second secure display server is authorized to access a copy operation provided by the first secure display server in view of a policy and the first security level of the first secure display server;

    determining whether a user associated with the user command is an authenticated user in response to the policy indicating that the second application in the second secure display server is authorized to access the copy operation provided by the first secure display server; and

    in response to the user being an authenticated user and the second application in the second secure display server being authorized, copying the data from the first secure application window running in the first secure environment to the second secure application window running in the second secure environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×