×

Securing data on untrusted devices

  • US 9,659,170 B2
  • Filed: 01/02/2015
  • Issued: 05/23/2017
  • Est. Priority Date: 01/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • identifying, by a first process executing in an execution environment on a computing device, a command in an execution environment command queue, the command from a second process executing in the execution environment and indicating an action on secure data, the identifying based on a process ID of the second process or a pathname in the command, and wherein the identifying;

    occurs before the execution environment obtains the command from the execution environment command queue for execution, andcomprises identifying an entry in the execution environment command queue associated with a secure storage location;

    while the command remains in the execution environment command queue, determining whether the command is permitted based on the action and a user credential, the determining comprising;

    accessing an access rules data store, the access rules data store comprising one or more rules associated with commands or user credentials; and

    determining whether the command is permitted based on the command and the one or more rules; and

    responsive to determining the command is not permitted, removing, by the first process, the command from the command queue before the execution environment obtains the command from the execution environment command queue for execution, the removing preventing the execution environment from executing the command.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×