Unlock instant, AI-driven research and patent intelligence for your innovation.

Fast Data Encryption Policy Compliance Based on Sector Mapping

A sector and strategy technology, applied in digital data protection, electrical digital data processing, special data processing applications, etc., can solve problems such as bruising users and inaccessible computers

Inactive Publication Date: 2015-12-02
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Computers may not be able to access certain corporate services until the policy is complied with, but instead wait for the storage device to encrypt (perhaps minutes or hours depending on storage device size) to use corporate services, potentially frustrating users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fast Data Encryption Policy Compliance Based on Sector Mapping
  • Fast Data Encryption Policy Compliance Based on Sector Mapping
  • Fast Data Encryption Policy Compliance Based on Sector Mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Discussed here is fast compliance with data encryption policies. A sector map of a storage volume used by the computing device may be generated, the sector map identifying one or more sectors of the storage volume and a signature of the contents of each of the one or more sectors. The sector map may be generated shortly after (or as part of) installing the operating system on the computing device, or alternatively, the sector map may be generated later, prior to activation of a policy for the computing device. The activated policy for the computing device indicates that content written by the computing device to the storage volume is encrypted after activation of the policy. When this policy is activated, the computing device encrypts the content written to the sectors of the storage volume. Also, when this policy is activated, the content of a particular sector may be either encrypted or unencrypted. Use a sector map to identify which sectors of a storage volume have...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.

Description

Background technique [0001] Computers can be used in different settings, sometimes following specific policies. For example, when corporate data such as e-mail is accessed from a personal computer, corporate policy may state that the personal computer must encrypt corporate data stored on the personal computer's storage device in order to authorize access to the corporate data. Until the policy is complied with, computers may not be able to access certain corporate services, but instead wait for the storage device to encrypt (perhaps minutes or hours depending on the size of the storage device) to use corporate services, potentially frustrating users. Contents of the invention [0002] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is intended to be neither to identify key features or essential features of the claimed subject matter, nor to limit the scope of the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F12/1408G06F12/14G06F21/602G06F21/6218G06F16/2237G06F3/0623G06F3/0644G06F3/0659G06F3/0673
Inventor I.巴斯莫夫M.B.G.奈斯特伦A.M.塞门科D.M.麦克尔弗D.李
Owner MICROSOFT TECH LICENSING LLC