Fast Data Encryption Policy Compliance Based on Sector Mapping
A sector and strategy technology, applied in digital data protection, electrical digital data processing, special data processing applications, etc., can solve problems such as bruising users and inaccessible computers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] Discussed here is fast compliance with data encryption policies. A sector map of a storage volume used by the computing device may be generated, the sector map identifying one or more sectors of the storage volume and a signature of the contents of each of the one or more sectors. The sector map may be generated shortly after (or as part of) installing the operating system on the computing device, or alternatively, the sector map may be generated later, prior to activation of a policy for the computing device. The activated policy for the computing device indicates that content written by the computing device to the storage volume is encrypted after activation of the policy. When this policy is activated, the computing device encrypts the content written to the sectors of the storage volume. Also, when this policy is activated, the content of a particular sector may be either encrypted or unencrypted. Use a sector map to identify which sectors of a storage volume have...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 