Method and system for ensuring inaccessibility of sensitive data
A sensitive data and data source technology, applied in the field of biological sample analysis system, can solve the problem that the system and method cannot provide any protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] figure 1 A distributed analysis system 100 is shown for ensuring that sensitive data stored in a storage medium of a portable device 104 of a user 102 is not accessed by unauthorized persons. Sensitive data stored in the storage medium of the portable device 104 of the user 102 is ensured not to be accessed by unauthorized persons by the portable device automatically deleting the sensitive data from its storage medium when the user 102 leaves the secure perimeter 110 . A security perimeter is here considered a geographic area within which sensitive data stored on a portable device is considered safe.
[0070] The system includes a server 120 with a data processing unit 122 and a configuration unit 124 . The server also includes applications 128 that interface with applications running on the portable device. The operator 126 can use the configuration unit to configure some rules, which are stored in the server or in the portable device, and used to perform data deleti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


