Passive encryption of organization data

A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted onl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Acharya Narendra S, Semenko Alex M, Basmov Innokentiy, Novotney Peter J, Bhagurkar Salil Arun, Mehta Yogesh A, Adam Preston Derek
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Acharya Narendra S
Semenko Alex M
Basmov Innokentiy
Novotney Peter J
Bhagurkar Salil Arun
Mehta Yogesh A
Adam Preston Derek
description A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9900325B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9900325B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9900325B23</originalsourceid><addsrcrecordid>eNrjZFAPSCwuzixLVUjNSy6qLCjJzM9TyE9TyC9KT8zLrEoE81MSSxJ5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLClpYGBsZGpk5ExEUoAezUoAg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Passive encryption of organization data</title><source>esp@cenet</source><creator>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</creator><creatorcontrib>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</creatorcontrib><description>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180220&amp;DB=EPODOC&amp;CC=US&amp;NR=9900325B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25568,76551</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180220&amp;DB=EPODOC&amp;CC=US&amp;NR=9900325B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Acharya Narendra S</creatorcontrib><creatorcontrib>Semenko Alex M</creatorcontrib><creatorcontrib>Basmov Innokentiy</creatorcontrib><creatorcontrib>Novotney Peter J</creatorcontrib><creatorcontrib>Bhagurkar Salil Arun</creatorcontrib><creatorcontrib>Mehta Yogesh A</creatorcontrib><creatorcontrib>Adam Preston Derek</creatorcontrib><title>Passive encryption of organization data</title><description>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFAPSCwuzixLVUjNSy6qLCjJzM9TyE9TyC9KT8zLrEoE81MSSxJ5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLClpYGBsZGpk5ExEUoAezUoAg</recordid><startdate>20180220</startdate><enddate>20180220</enddate><creator>Acharya Narendra S</creator><creator>Semenko Alex M</creator><creator>Basmov Innokentiy</creator><creator>Novotney Peter J</creator><creator>Bhagurkar Salil Arun</creator><creator>Mehta Yogesh A</creator><creator>Adam Preston Derek</creator><scope>EVB</scope></search><sort><creationdate>20180220</creationdate><title>Passive encryption of organization data</title><author>Acharya Narendra S ; Semenko Alex M ; Basmov Innokentiy ; Novotney Peter J ; Bhagurkar Salil Arun ; Mehta Yogesh A ; Adam Preston Derek</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9900325B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Acharya Narendra S</creatorcontrib><creatorcontrib>Semenko Alex M</creatorcontrib><creatorcontrib>Basmov Innokentiy</creatorcontrib><creatorcontrib>Novotney Peter J</creatorcontrib><creatorcontrib>Bhagurkar Salil Arun</creatorcontrib><creatorcontrib>Mehta Yogesh A</creatorcontrib><creatorcontrib>Adam Preston Derek</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Acharya Narendra S</au><au>Semenko Alex M</au><au>Basmov Innokentiy</au><au>Novotney Peter J</au><au>Bhagurkar Salil Arun</au><au>Mehta Yogesh A</au><au>Adam Preston Derek</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Passive encryption of organization data</title><date>2018-02-20</date><risdate>2018</risdate><abstract>A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9900325B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Passive encryption of organization data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T02%3A35%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Acharya%20Narendra%20S&rft.date=2018-02-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9900325B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true