Unlock instant, AI-driven research and patent intelligence for your innovation.

Stay Data Protected with Policies

A data protection and data technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as data leakage

Active Publication Date: 2019-07-16
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can be frustrating for users as data they expect to remain secret may be compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stay Data Protected with Policies
  • Stay Data Protected with Policies
  • Stay Data Protected with Policies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Keeping data protected with policies is discussed in this article. Data files are encrypted based on keys associated with the entity (also known as the owner of the data) that sets the data protection policies that control access to the data files. A data protection policy identifies various restrictions on how data in a data file may be used, such as the configuration or settings that a computing device will have to access the cleartext data, how applications may use the cleartext data, and the like. The data files have corresponding metadata that identifies the owner of the data. Processes that are running instances of applications that are allowed to access the data are also associated with the identifier of the owner of the data. These identifiers of the owner of the data and the data protection policy are used by the operating system of the computing device to protect the data according to the data protection policy. The operating system allows a process only if ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The data files are encrypted based on keys associated with entities setting data protection policies that control access to the data files. The data protection policy identifies various restrictions on how encrypted data and plaintext data in the data file may be used. The data file has corresponding metadata identifying the entity that set the data protection policy, and processes of running instances of applications that are allowed to access the plaintext data are also associated with an identifier of the entity. These identifiers of the entity and the data protection policy are used by the computing device's operating system to protect the data in accordance with the data protection policy, including causing the protection to be transmitted to other devices along with the protected data ; Alternatively, prevent protected data from being transmitted to other devices.

Description

Background technique [0001] With the development of computing technology, computers have become increasingly common in our lives. People often have multiple different computers, including laptops, tablets, smartphones, etc., and frequently share data across the multiple computers. This has led to situations where it is desirable to keep certain data, such as confidential data, protected via encryption of the data. While encrypting data has many benefits, it is not without its problems. One such problem is that often applications need to have access to unencrypted data in order to perform operations on the data. Depending on the particular application accessing the data, allowing application access to unencrypted data may make the unencrypted data vulnerable to disclosure. This can be frustrating for users as data they expect to remain secret may be compromised. Contents of the invention [0002] This Abstract is provided to introduce a selection of concepts in a simplifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6281G06F2221/2107H04L63/0853H04L63/20
Inventor P.D.亚当N.S.阿查亚I.巴斯莫夫O.T.尤雷彻Y.A.梅塔A.M.塞门科
Owner MICROSOFT TECH LICENSING LLC