Passive encryption of organization data
A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted onl...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Acharya Narendra S Semenko Alex M Basmov Innokentiy Novotney Peter J Bhagurkar Salil Arun Mehta Yogesh A Adam Preston Derek |
description | A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9900325B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9900325B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9900325B23</originalsourceid><addsrcrecordid>eNrjZFAPSCwuzixLVUjNSy6qLCjJzM9TyE9TyC9KT8zLrEoE81MSSxJ5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLClpYGBsZGpk5ExEUoAezUoAg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Passive encryption of organization data</title><source>esp@cenet</source><creator>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</creator><creatorcontrib>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</creatorcontrib><description>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180220&DB=EPODOC&CC=US&NR=9900325B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25568,76551</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180220&DB=EPODOC&CC=US&NR=9900325B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Acharya Narendra S</creatorcontrib><creatorcontrib>Semenko Alex M</creatorcontrib><creatorcontrib>Basmov Innokentiy</creatorcontrib><creatorcontrib>Novotney Peter J</creatorcontrib><creatorcontrib>Bhagurkar Salil Arun</creatorcontrib><creatorcontrib>Mehta Yogesh A</creatorcontrib><creatorcontrib>Adam Preston Derek</creatorcontrib><title>Passive encryption of organization data</title><description>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFAPSCwuzixLVUjNSy6qLCjJzM9TyE9TyC9KT8zLrEoE81MSSxJ5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLClpYGBsZGpk5ExEUoAezUoAg</recordid><startdate>20180220</startdate><enddate>20180220</enddate><creator>Acharya Narendra S</creator><creator>Semenko Alex M</creator><creator>Basmov Innokentiy</creator><creator>Novotney Peter J</creator><creator>Bhagurkar Salil Arun</creator><creator>Mehta Yogesh A</creator><creator>Adam Preston Derek</creator><scope>EVB</scope></search><sort><creationdate>20180220</creationdate><title>Passive encryption of organization data</title><author>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9900325B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Acharya Narendra S</creatorcontrib><creatorcontrib>Semenko Alex M</creatorcontrib><creatorcontrib>Basmov Innokentiy</creatorcontrib><creatorcontrib>Novotney Peter J</creatorcontrib><creatorcontrib>Bhagurkar Salil Arun</creatorcontrib><creatorcontrib>Mehta Yogesh A</creatorcontrib><creatorcontrib>Adam Preston Derek</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Acharya Narendra S</au><au>Semenko Alex M</au><au>Basmov Innokentiy</au><au>Novotney Peter J</au><au>Bhagurkar Salil Arun</au><au>Mehta Yogesh A</au><au>Adam Preston Derek</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Passive encryption of organization data</title><date>2018-02-20</date><risdate>2018</risdate><abstract>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9900325B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Passive encryption of organization data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T02%3A35%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Acharya%20Narendra%20S&rft.date=2018-02-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9900325B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |