×

Securing data on untrusted devices

  • US 9,536,083 B2
  • Filed: 05/28/2015
  • Issued: 01/03/2017
  • Est. Priority Date: 01/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • monitoring, by a first process executing on an operating system on a computing device, commands in an operating system command queue of the operating system,identifying, by the first process without stopping the operating system command queue, a command from a second process based on the monitoring, the command indicating an action on secure data, the identifying before the operating system obtains the command from the operating system command queue for execution, the second process executing on the operating system on the computing device, wherein identifying the command comprises;

    identifying an entry in the operating system command queue associated with a secure storage location,identifying a path on a computer-readable medium for the secure storage location or a process identifier of a software application accessing the secure data; and

    identifying the software application based on the entry;

    while the command remains in the operating system command queue, determining whether the command is permitted based on the action and a user credential, wherein the determining comprises;

    accessing an access rules data store comprising one or more rules associated with commands or user credentials;

    determining whether the command is permitted based on the command and the one or more rules; and

    providing an indication of whether the command is permitted or not; and

    responsive to the indication that the command is not permitted, removing, by the first process, the command from the operating system command queue before the operating system obtains the command from the operating system command queue for execution, the removing preventing the operating system from executing the command.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×