Stay Data Protected with Policies
A data protection and data technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] Keeping data protected with policies is discussed in this article. Data files are encrypted based on keys associated with the entity (also known as the owner of the data) that sets the data protection policies that control access to the data files. A data protection policy identifies various restrictions on how data in a data file may be used, such as the configuration or settings that a computing device will have to access the cleartext data, how applications may use the cleartext data, and the like. The data files have corresponding metadata that identifies the owner of the data. Processes that are running instances of applications that are allowed to access the data are also associated with the identifier of the owner of the data. These identifiers of the owner of the data and the data protection policy are used by the operating system of the computing device to protect the data according to the data protection policy. The operating system allows a process only if ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


