RussianPatents.com

Managing confidentiality for monitored devices. RU patent 2506704.

Managing confidentiality for monitored devices. RU patent 2506704.
IPC classes for russian patent Managing confidentiality for monitored devices. RU patent 2506704. (RU 2506704):

H04L12/24 - Arrangements for maintenance or administration
Another patents in same IPC classes:
Lighting control network Lighting control network / 2502202
Disclosed is a control system which comprises a controlled device which is controlled by a controller, having receiving means for receiving control signals, and having a first, second and third storage locations for storing a personal identifier (ID) or address (PID), network ID (NID), and the ID (RCID) of a remote control device, respectively; at least one user-controlled remote control device for transmitting control signals. A control signal comprises a target address code, a network ID code, a sender address code and a command code. Normally, the controller only responds to control signals if target address code, network ID code, and sender address code match the information in memory. The controller is capable of operating in a NO NETWORK mode, in which the controller responds to a reset command irrespective of target address code, the network ID code, and the sender address code.
Method and system for preventing service misconnection in ason network Method and system for preventing service misconnection in ason network / 2500076
Method of preventing service misconnection in an automatically switched optical network comprises the following steps: A) the control plane configures service error prevention information in a transport plane; B) upon detecting a misconnection, the transport plane sends a misconnection warning message to the control plane based on said service error prevention information; C) after receiving the described misconnection warning message, the control plane obtains a policy to prevent the service error resulting in the misconnection warning signalling, and performs the corresponding error prevention operation; wherein the described error prevention policy is a rerouting policy or a secure switching policy, and the error prevention information of the initial connection is referenced to in the new service connection.
Method and apparatus for realising optical channel data unit shared protection ring Method and apparatus for realising optical channel data unit shared protection ring / 2497290
Invention can be used to realise an optical channel data unit (ODU) shared protection ring (SPRing). The method includes steps where: a first ODU of a first service transmitted in an optical line is taken as a protection granularity, where the first ODU is an ODUk that is directly multiplexed to the optical line; the first ODU is monitored, and a monitoring result is obtained; when the monitoring result indicates a failure, switching is performed through cross-connection of a second ODU of the first service, where the second ODU is an ODUm that is multiplexed to the first ODU, and m is smaller than or equal to k.
Method for interaction of terminal client device with server over internet with high level of security from ddos attack and system for realising said method Method for interaction of terminal client device with server over internet with high level of security from ddos attack and system for realising said method / 2496136
Method involves generating a request from a terminal client device to obtain a server IP address, checking the server certificate and the client certificate, generating one or more IP address tables in form of binary codes, setting up a secure connection, transmitting the generated table to the terminal client device; transmission of data packets between the terminal client device and the server is carried out with variation of the sever IP address selected from the IP address table. The system includes a terminal client device, a data server, a domain name server, a secure connection server, two routers and a unit which generates an IP address table in form of binary codes and varies the IP address on the table assigned for each connection.
Method and system for scheduling data selection for transmission over data network Method and system for scheduling data selection for transmission over data network / 2495533
System for scheduling data selection for transmission in a data network includes a plurality of daughter elements as well as a credit allocator and a transmission selector. The transmission selector is communicatively connected to the credit allocator, wherein each credit can be used to transmit data. The credit allocator operates to provide credits to one of allowable daughter elements and daughter elements having a negative credit counter. The credit allocator also operates to maintain a credit balance which represents the available total volume of unallocated credits, and subtracts the provided credits from the credit balance. The transmission selector operates to select one allowable and operable daughter element for extraction from a queue and add credits to the credit balance in accordance with the amount of data selected for extraction from the queue.
Targeted queries using oma dm protocol Targeted queries using oma dm protocol / 2494554
Disclosed are various technologies and techniques for extending the functionality of the open mobile alliance (OMA) device management (DM) protocol. An addition is made to the OMA DM protocol that enables the server to specify node filtering criteria as part of a query to a target node on a mobile device to indicate a sub-set of the device management data for the target node that should be returned. As another variation, a modification is made to the OMA DM protocol that enables the server to specify what attributes should be selected on the mobile device in one parameter of a target URI of the Get command, and what format the device management data should be returned in as another parameter of the target URI of the Get command.
System and method of implementing policy of providing network device System and method of implementing policy of providing network device / 2493660
Computer executable method of managing resources of a data processing and storage centre for implementing a policy of providing a network device with respect to the data processing and storage centre includes a step of issuing one data processing and storage centre resource supplier commands which instruct said supplier to limit provision of data processing and storage centre resources. The method also includes a step of receiving a request for providing data processing and storage centre resources to a network device, said request including information defining the data processing and storage centre resource. Furthermore, according to the method, an indication that the network device is authorised to receive data processing and storage centre resources from said supplier is received.
System for household electric appliances and its functioning method System for household electric appliances and its functioning method / 2484522
System contains a selector device designed so that to enable the input command receipt for malfunction diagnostics fulfilment; a memory device designed so that to enable storage of product information with regard to the household electric appliance for malfunction diagnostics purposes; a controller designed so that to enable upload of product information stored in the memory device as well as for generation and output of a control signal including product information and for control of the conversion device; a conversion device designed so that to enable the control signal conversion into an acoustic signal and such acoustic signal output; and an input device designed so that to enable output of a sonic signal corresponding to the acoustic signal.
Service charging method and system, network access server and protocol information analysing device Service charging method and system, network access server and protocol information analysing device / 2483358
Service charging method involves receiving a service packet, obtaining a protocol identifier from the service packet based on which the need to perform analysis of protocol information in the service packet is determined; determining protocol information analysis involves performing analysis, obtaining charge information and service charging in accordance with the charge information and the predetermined charging procedure, otherwise traffic or duration and traffic of the service packet are counted and charging is performed in accordance with the traffic or duration and traffic, as well as with the predetermined charging procedure. The system which enables to carry out the method comprises a network access server, a protocol information analysing device and a charging subsystem.
System and device of microwave communication and method of connection in system System and device of microwave communication and method of connection in system / 2480927
Multiple transmitting modules in a module in a room are in a switched manner connected with modules outside the room by means of the cross-connection function. Besides, each transmitting module has a function of bidirectional branching. Typically, each of the transmitting modules controls an IP-address of another transmitting module and detects an adjacent transmitting module on the basis of an IP-address.
Method for recognition of functions from service, administration and operation functions set in passive optical ethernet network Method for recognition of functions from service, administration and operation functions set in passive optical ethernet network / 2262806
Method includes assigning identification data for identification of optical network nodes using optical linear terminus in accordance to their registration requests, and initiating, using optical linear terminus, operation of recognition relatively to functions of network nodes by transferring first information messages about functions set; by optical linear terminus from network nodes second information messages about functions set are received, meant for providing information about functions of network nodes, which received first information messages about set of functions.
Method for accessing finite point from one region to other in ip-network system Method for accessing finite point from one region to other in ip-network system / 2272361
Proposed method involves access to finite point from one region to other in IP-network in compliance with pseudonyms using E.164 pseudonym that incorporates unique prefix of region in IP-network system and unique number of mentioned finite point at its controller, as well as extraction of E-164 pseudonym prefix point being called from calling point in the course of direct access, whereupon request is conveyed to called finite point controller for converting IP-address of called finite point.
Method for dispatching scanning of devices for reading data Method for dispatching scanning of devices for reading data / 2293444
Method includes following stages: sorting of serviced devices in accordance to their types, sorting various data types of each device with generation of various modules and assignment of priority attribute and scanning periodicity attribute to each module; separation of serviced devices on two groups: group, consisting of devices subject to scanning and group consisting of devices, connection status of which it is necessary to determine; periodic scanning of each module of group, consisting of devices subject to scanning, in accordance to its priority and period of scanning, while it is possible to set various periods of scanning and to use various scanning algorithms depending on data changing speed, and also scanning algorithms may be altered in real time depending on condition of devices.
Method for controlling phone messages and linked equipment in local area networks, supporting transmission of speech and data in accordance to integrated method Method for controlling phone messages and linked equipment in local area networks, supporting transmission of speech and data in accordance to integrated method / 2296429
Method for controlling phone messages and linked equipment includes installation in central processing device or network server of software meant for controlling, monitoring and controlling phone messages and linked equipment. Method includes activation of software with usage of standard Internet browser for dispatching commands and for exchanging data via network by means of direct interaction with graphic elements on visualization means of peripheral computers of local area network. Software makes possible continuous visual monitoring of status of phone message currently being executed, or other messages, arriving or taken for storage.
Method and associated system and routine product for updating network server programming conditions Method and associated system and routine product for updating network server programming conditions / 2304353
Low level of current process is replaced by high level of updated process, low-level packets are checked for their relevance to transactions executed already at high level of current process or to new transactions, packets are processed at high level of current process, new transaction packets are processed at high level of updated process, high-level transactions are checked for completion, and interaction channel is closed.
Method affording transmission of information about communication line condition in network Method affording transmission of information about communication line condition in network / 2304849
Proposed method includes following steps: service device finds out if there is any fault in communication line; if this is the case, service device transfers information about fault in communication line to distant service device by means of control frame through servicing circuit; distant service device responds by disconnecting communication line of access point from distant user, faulty single-rank center user communicates with distant user through standby network. Upon elimination of mentioned fault service device sends information about this fact to distant service device to transfer communications between user and remote user to network.
Method for dynamically configuring a network equipment port Method for dynamically configuring a network equipment port / 2305906
In accordance to the invention, database (26) of central control data, connected to server (24) of dynamic host configuration protocol, supports templates with records of network equipment parameters for settings of its physical port (21) and provided services. As a result, it is possible to dynamically update port settings by transferring parameter records from server (24) of dynamic host configuration protocol. Parameter settings are updated in intermediate device (20).
Method, system and device for controlling and managing transmission of data in communication networks Method, system and device for controlling and managing transmission of data in communication networks / 2313185
Method includes stages for dispatching access request by user terminals to gate, where gate reads each access request, modifies access rule in firewall to allow access of each user terminal, which requests access on basis of authorized IP-address of each user terminal, and simultaneously manages transmission of data between user terminals and second communication network in aforementioned firewall.
Method for servicing voice calls in a communication network Method for servicing voice calls in a communication network / 2317645
In accordance to the invention, when a client initiates voice connection to operation of call processing center, by activation of software for servicing voice calls of Internet-page, IP-address of the client is determined, on basis of which language zone association is determined for the client and client call is routed to the group of operators speaking on client language, while, additionally, with detection of client language the client is identified and URL-address of call page is determined, on basis of this data requirements are set for qualification of operator, to whom the call is routed. On the Internet-page a panel is indicated with information about operators who service voice calls from given page on client language and have professional knowledge in the area of information published on the page. In case when no free operators are available, size of response waiting queue is displayed. Information on the panel is displayed without conduction of a call by the client and renewed after a specific time interval.
Method and system for transmitting notifications to users of a delivery system Method and system for transmitting notifications to users of a delivery system / 2321181
In accordance to the invention, different events in delivery system are used for calling different modules having appropriate functions. Modules generate notification transmission tasks for transmitting notifications to central mailing component. The mailing component generates notifications which match the tasks, accessing at least one database with data about users, and mails the notifications to users through a network gate.

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to data security systems. The apparatus, method, system and computer-readable medium for protecting confidential data also enable to monitor or track electronic devices which are shared for commercial and confidential purposes, through arbitrary encryption of data transmitted from the device being monitored to a computer at a remote location, wherein data transmission can be intended for tracking, monitoring, back up of data or for return in case of loss or storage.

EFFECT: high efficiency of data protection.

15 cl, 5 dwg

 

THE LEVEL OF TECHNOLOGY

The present disclosure refers to protect the privacy of users at the same time providing possibility of electronic tracking devices.

Portable computers and increasingly other electronic devices such as cell phones, PDAs (PDAs), smart phones (such as BlackBerry™, iphonetm), memory cards, personal media device (e.g. iPod™), gaming devices and personal computers, remotely monitored, so that they can be returned in the event of theft. Such monitoring may be exercised by sending information about the location of the remote location, or the mail server.

Ownership information, as expected, is stored on electronic devices such as personal computers, laptops or personal digital assistants, and the need to protect such a right of ownership or critical data, and the return of such devices if they are lost or stolen, is self-evident. However, while ensuring the protection of such devices and/or data should be taken into account and the privacy of users of such devices.

THE ESSENCE OF THE INVENTION

This entity is not exhaustive review aimed at determination of the boundaries of the subject of the invention is described and claimed in the materials of this application. Entity represents aspects of the subject of the invention in a simplified form to provide them with a basic understanding as an introduction to the detailed description of which is presented next.

In many cases, the employer will want to keep track of all portable computers (or other electronic device)issued its servants. For confidentiality reasons, some officials may be against the tracking 24/7 portable computer, so as personal location and collection of personal historical locations considered confidential information. This is particularly important in case, if the employer gave the clerk of the permit personal use of a laptop outside. There is an interest, whether the monitoring by the employer or monitoring exercises a third party, such as a security company.

The subject of the invention described in the materials of this application, provides system and the method of conditional encrypt the data sent from a device that is tracked to a computer in a remote location. Data transfer can be used for tracking, monitoring, data backup or to return in case of loss or theft.

In one of the variants of implementation there are several aspects of encryption. To prevent unauthorized access to confidential data is encrypted before transmission to a remote location, and cannot be decrypted without the secret key. Whether your data is encrypted before transmission to a remote location, may depend on whether they are confidential or commercial data, the definition of which may depend on certain conditions. Conditions may be temporary, such that for the data generated during some hours of the day (such as working hours), the data is considered attributable to work, and not encrypted before transmission, or pre-encrypted, and can be decrypted in a remote location, using the decryption key, job related. For the data generated in other times, such as after hours, the data may be considered confidential and encrypted before transmission. In a preferred embodiment confidential data can be decrypted only with the consent of the user of this device, using the secret decryption key.

Transmitted data are typically location information, or information relevant to a location, such as the addresses of the Internet Protocol (IP), GPS (global positioning system), power Wi-Fi signal, the signal strength, mobile towers times in these locations, the time spent in these locations, indication and identification marks for the device, but also can include visited web sites, keystrokes, emails, software version, run the software specifications device, mouse movements, and files or further information are created, deleted, copied, transferred, open, marked elected and/or modified files. However, as will be easily understandable to specialists in the field of technology, opened the subject of the invention can equally be used to protect confidential data, created, using the device for the co-confidential and commercial use, or in conjunction with information about the location or information relevant to a location, or separately. Other sensitive data that may be protected include, for example, data use, websites visited, played video and audio files, download, keystrokes, snapshots screens, emails, files and other sensitive data.

DESCRIPTION OF DRAWINGS

For a more complete understanding of the nature and benefits of disclosure of the subject of the invention, as well as the preferred usage, you should refer to the subsequent detailed description, read in conjunction with the accompanying drawings. For drawings these reference numbers denote such or similar stages and parts.

Figure 1 is a schematic of a functional block diagram of the system and the method of conditional encrypt data in accordance with the way of the implementation of the disclosed the object of the invention built into the laptop computer.

Figure 2 is a functional scheme the sequence of operations are schematically represents undertaken after theft workflow system and method of conditional encrypt data in accordance with the variants of implementation of disclosure of the subject of the invention.

Figure 3 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with the variants of implementation of disclosure of the subject of the invention.

Figure 4 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with alternative variants of implementation of disclosure of the subject of the invention.

Figure 5 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with the additional alternatives for the implementation of disclosure of the subject of the invention.

A DETAILED DESCRIPTION OF THE SPECIFIC OPTIONS FOR THE IMPLEMENTATION OF

A. Terminology

Agent, as used in the materials of this application, is the agent software, hardware or software and hardware, which ideally is a permanent and invisible, and that is permanently stored in a computer or other electronic device. Agent preferably provides servicing functionality that require communication with the remote server. Agent resistant and may be able to support and/or provision of different services, such as deleting data, firewall protection, data encryption, location tracking, notification messages, and equipment and software updates. Illustrative way of implementing agent found in commercially available product Computrace Agent™. The technology that underlies the Computrace Agent™, was discovered and patented in the U.S. and other countries, patents which in most cases were assigned by Absolute Software Corporation. See, for example, US patents№ 5715174; 5764892; 5802280; 6244758; 6269392; 6300863; and 6507914, and related foreign patents. Details of permanent functional assignments agent disclosed in publications of patent applications U.S. № US 2005/0216757 and US 2006/0272020. Technical disclosure of these documents are included in materials of this description by reference as if fully set forth. It is possible to use the agent for the equivalent of the Computrace Agent™, or, less preferably, an alternative agent with less functionality. For purposes of this disclosure minimum functional sign of the agent is to contribute to the implementation of the connection between the electronic device and monitoring centre. Communication can be initiated by the agent, the monitoring centre or both.

Host is an electronic device to be protected, that is typically intended for joint commercial and confidential use. Examples of hosts include portable computer, compact computer or smart phone. The agent is stored permanently in the host.

Monitoring centre - is protected server or another computer or server is associated with the agent or which sends the message. This can be a mail server, or can be the distribution of servers or other computers. For example, assuming that the host is available for Internet connection, the agent may call centre monitoring in some selected suitable interval to inform the location of the host, download software updates, if any, and restore any security modules that are, or should be installed on the host. The options for implementing disclosed in the materials of this application, the agent will load the remote storage location in the centre of monitoring, information about the location and/or any other data required for the transfer. Communication with the center of monitoring can take place, for example, through wired or wireless telephone network, WIFI, WIMAX, cable, or satellite.

Encryption - it is Generally assumed that any data transmitted between remote devices, such as the host and monitoring centre, is encrypted during transmission. However, in this document, unless the context requires reverse, encryption term generally refers to a conventional level of encryption that may be confidential encrypted or commercial encryption, and not to the typical encryption used during transmission. Moreover, the term «encryption» in the materials of this application is mainly used to confidential data (including information of a confidential location and/or any other confidential data, required for transfer), transferred and will remain encrypted and cannot be decrypted on the remote center for storage, if not given a secret decryption key. The term «encryption» also refers to the user of the host that owns the confidential data, which has the ability to control whether to encrypt sensitive data, when they are transmitted or copied to the remote location. Confidential data can also refer to personal data. Commercial data may also refer to the corporate data, data of the company or not personal data.

Detailed descriptions are presented mainly in terms of methods or processes, symbolic representations of operations, functionality and features of the invention. These describe the way and views are tools used by experts in the field of technology for more efficient transmission of the essence of their work to other experts in the art. Method or process implemented software, here and in General, conceived which is self-consistent sequence of steps leading to the desired result. These stages include the physical manipulation of the physical quantities. Often, but not necessarily, these values take the form of electrical or magnetic signals suitable for storage, transmission, combine, compare and manipulate otherwise. In the future, will be taken into account that the distinction between hardware, software and firmware is not always clear, the specialists in this field of technology it is clear that the processes implemented by the software can be implemented in hardware, software and hardware or software in the form of coded commands, such as firmware and/or stored program commands. In General, if not stated otherwise, all single elements may be in the plural and Vice versa, without loss of generality. The use of the masculine gender may refer to the masculine, feminine or both genera.

B. Approximate variant of the implementation of the

A block diagram of the preferred alternative implementation is shown in figure 1. Electronic device 1 host, such as a laptop computer that contains the agent 2, which can regularly, at sporadic intervals, by chance, and/or according runs to communicate with remote storage 12 in the middle of 3 monitoring through Internet 4 through other telecommunications networks or their combinations. Messaging SMS (short message Service), for example, can be used for all or some of executing the connection.

Agent 2 promptly joined to mechanism 5, containing a computer-readable commands in memory 6, which encrypts data 7 the company and/or confidential data 8 to transfer, according to the rules of 9 encryption, also stored in the memory of 6. One or more of encryption keys, for example, 10 key companies and the secret key, 11, can be stored for 6 electronic device 1. The memory of the 6 can be divided into parts and/or different types of memory, so that, for example, contribute to the separate data retention 7 of the company and confidential data in 8 different locations. In a typical application, a user device 1 may establish a confidential directory or folder in memory, 6 which any data that is identified as confidential data 8, can be separated from the data 7 the company.

Device 1 host also contains the device of 15 defining the location, such as a device GPS and A-GPS, or some other device that performs positioning. Device 15 positioning can be held in memory 6 electronic device 1, or it can be a component or module separate from 6 memory, as shown in figure 1. Can be one, two or more devices 15 positioning, each of which operates on different principles or one acts as a backup for the other. Electronic device 1 is usually contains a device 16 for processing processing of the commands contained in the memory of 6, and read/write data in it and from it by bus 18, and interface 19 to 4 Internet or another network connection. Note that the device 1, which connects with the Internet 4 may in some cases be considered as part of the Internet 4.

Agent 2 sends data 7, 8, which may include information about the location, the center of the 3 monitoring and/or remote device(s) 12 storage regularly, at sporadic intervals, by chance, and/or according runs. This transfer of data between the agent 2 and center 3 monitoring can be explicitly to the user. Before sending sensitive data about the location (that is, the location data is written to or gathered outside store, 8 confidential data may be encrypted, and the company data about the location of the repository 7 data of the company may remain unencrypted. Location data in your repositories 7,8 data may be present only briefly in the electronic unit 1.

In the middle of 3 monitoring two types of data 7a, 8A can be stored together or can be stored in separate databases after sorting through the sorting unit 25. For example, data 7 the company, which is not encrypted, can be marked as such in the unit 1, or can be identified as such in the middle of 3 monitoring, and then stored in a repository 7a data. Sensitive data 8, which is encrypted before it is sent, can be marked as such in the unit 1, or can be identified as such in the middle of 3 monitoring, and then stored in a repository 8A data. RBS 12 may remain in the buildings of the company, a commercial company, which owns electronic device 1, or in the building of the third party security company, or it may be on another computer or server, or distributed in multiple computers or servers. If the data 7a of the companies that are stored encrypted (excluding temporary encryption during transmission), the company will have access to them, but not be able to decode sensitive data 8A without providing access to a secret key 11a decryption. It is possible that the encryption mechanism 5 encrypts as data 7 the company and sensitive data 8 before sending them through the agent 2 remote repository 12, in this case, the administrator in the company will need a key 10A decrypt the company to convert data 7a in a meaningful (non-encrypted) format. In any case sensitive data 8, transmitted or copied encrypted using the secret encryption key 11 or password that is known only to the user of an electronic device 1. The company does not have access to your secret key 11 and cannot interpret the data 8A, which are confidential and kept in the center of 3 monitoring.

Centre 3 monitoring can be a server, which contains the interface 23 to the network 4, bus 14, by which the associated components internal to the server, and device 13 processing for handling computer-readable commands in a remote location 12. Examples of commands may be used to sort the incoming data in the sorting module 25, a program that allows you to enter the encryption keys, the program used to access the data, and so on. Also in remote storage 12 encrypted confidential data 8A may be stored, as well as data 7a of the company that may be encrypted or not encrypted. Communication lines 20, 21 between electronic device 1, network 4 and center 3 monitoring can be wired, wireless or cable.

If the user wants to access the confidential data 8A, for example, after theft of the electronic device 1, he can access a remote repository of 12 using terminal 30 through the Internet 4. Data can be downloaded to the terminal 30, and the decryption key user 11a may be used to decrypt the data 8A. The first password can be used to extract sensitive data 8A, and the second password or key 11a decryption can be used to decrypt sensitive data 8A. Alternatively, key 11a decryption may be granted center 3 monitoring to decrypt sensitive data 8A.

The options for implementing, where the provision of the secret key to reveal the historical location data or other confidential information, the use of third-party security company may be preferable to employees who did not want any confidential information became available to their employer.

May exist a set of rules, through which encrypts sensitive data 8. Figure 3 shows that after the agent is loaded 49, he shall assure the availability of 50 encryption mechanism. The encryption mechanism 5 then checks 51 times of the day and extracts 52 rule 9 encryption to determine 53, encrypt sensitive data 8 or not. Just as an example, a simple rule could be that the data 7,8 not encrypted between 9:00 and 17:00, Monday to Friday. This example assumes that if the data as confidential in fact or attributable to work by their nature, they all will be treated as data 7 during office hours. In working hours no encryption 55 and data 7 company (containing all the data 7,8) transmitted 56 to a remote repository 12. RBS 12 can be placed in the center of the 3 monitoring in the buildings, where the user works, or may be in a different place. Once the data is transferred to 56, the process returns to the beginning of the cycle stage 51 checking time, so more data can be transmitted from time to time, after a specified delay or after other data will be formed. Outside of this time, that is, outside the ordinary working time, all the data is assumed to be confidential data 8 and encrypted using the secret key 11 and/or password, known only to the user of an electronic device 1. Sensitive data 8 encrypted 54 and transmitted 56 remote tool 3 storage. Once the data is transferred to 56, the process returns to the beginning of the cycle stage 51 checking time, so more data can be transmitted after a delay.

As an exception can be installed other periods of time in the schedule, such as described above, and changes can be made, for example, during vacations. Rules, including rules relating to periods may be changed or updated through the agent 2 during communication with the monitoring center. For example, in the case of theft, amended rule to stop all encryption of sensitive data can communicate through an agent 2 module 9 of the rules of encryption. This option may eliminate the need for the user to supply a secret key 11a decrypt staff on return.

Commercial data or data 7 companies can be encrypted using a key 10 is only known to a commercial enterprise, company, owner / administrator of the electronic device 1. Alternatively, you might have a different encryption process for data storage company, which occurs in a remote location 3 monitoring. Thus, the user will not have access to key of the company.

Application of the rules of 9 may in some options for implementing depend on a user can enter a password. As shown in figure 4, after the electronic device reboots 60, it asks 62 user to enter a password. 63 the password is entered correctly, rule 9 shall apply 64, and sensitive data 8 encrypted with the secret key 11. If 63 password is entered incorrectly 65 or entered, 8 data not encrypted with the private key 11, because in this case the device 1 was stolen, or the user wants to use the device for tasks related to work. Encrypted data or not, they are passed 68 to a remote repository 3. After the transfer of 68 system returns to the top of the loop 69 in the process, from time to time, regularly or as and when necessary, other data can be communicated.

In an alternate embodiment data 7 the company and sensitive data 8 default is not encrypted. The user has the chance to enter the password when he wants to use the device 1 for confidential purposes that would cause that data sent to and from a remote repository 12, will be encrypted in advance, but only within the specified period of time. With reference to figure 5, device 1 is configured to receive 70 password. When you enter a valid password device 1 asks the user to choose the period of confidentiality that may be the choice of a set of standardized periods, such as, for example, 30 minutes 6 hours and 1 week. There are other periods of time, and the user might be able to input any time up to a predetermined maximum. Unit 1 will receive 72 enter the required time period privacy of the user, and then monitors 74 expired or not a given period of time. During the selected period all figures 8 encrypted 76 using the secret key 11, as in the assumption that all use of electronic devices during this period of time is meant for sensitive data 8. Encrypted data is then passed 78 to a remote repository 12. If 74 period of time privacy expired 77, data is not encrypted using the secret key, as in the assumption that the data created after this period of time are the data of the 7 companies that are passed 78 to a remote repository 12 without encryption (or encrypted using the key of the 10 companies). After the transfer of 78 data, encrypted or not, the process returns to the beginning of the step-74, from time to time could be checked is expired the period of confidentiality, and can be transferred to other data.

Approximate rules

The following are examples of rules that can be used for encryption using the private key of the user:

1. Always encrypted. After stealing the user provides the key. This case would be suitable if the data recorded on location.

2. Always encrypted. Decryption of data is possible after both the user and the owner can provide their relevant parts of the composite key.

3. Encryption takes place according to the secret key in the time periods outside regular working hours.

4. As approximate rule (3), but this rule can be modified to account for vacation and variable working time.

5. As approximate rule (3), but may be activated only when the user enters a password when you restart or blocked.

6. Encryption takes place according to the secret key has temporarily at the user's request, as the embodiment according to figure 5. The desired time frame privacy can be entered by the user or may be fixed. It may be a different period, depending on the time of day. For example, during the second Breakfast, it can be 20 minutes. In the evening it can be 5 hours. At the weekend he can be for the whole day.

Alternatives and variations

Stages in the figures can be performed in a different order than the order, illustrated, or they can be combined where shown separately.

Signal (such as an audible or visual signal the pop-up message generated by the device) that the period of the secret encryption completed or is nearing its end, may be formed by the agent and delivered to a user. This can be disguised as a signal that does not give him any idea that the device is installed some form of monitoring of protection.

User password for the encryption agent may be removed from the device at the end of each period encryption. This will prevent attempt thief use it to encrypt the data on the location, to conceal his whereabouts.

When providing security company user's private key system can be configured to only decrypt data, separated for a specific period of time in the past, such as a two weeks. This can be configured by regularly delete old data from a remote storage device. Alternatively, the secret encryption key can be used as a function of time, so that the decryption key can unlock only the current and future data, but not historical data.

Sensitive data and company data need not be passed as soon as they are created. They can be locally stored in the electronic unit 1 in their respective repositories 7,8 data will not be available until the connection between the device 1 and center 3 monitoring, or until it is time for the agent to initiate or answer center 3 monitoring.

1. Method that runs user computing device, to enable monitoring of location of the user of a computing device from a remote location, the method contains the stages at which: get location data reflecting the current location of the user of a computing device; determined on the basis of the rule of conditional data encryption, modified or updated while communicating with the remote system monitoring whether to encrypt the data on the location, using the secret key of a user, the user of a computing device; when satisfied the definition encrypt data on the location, with a private key, encrypts the data on the location, using a secret key for the formation of the encrypted data on the location and transmit the encrypted data on the location of the network to the monitoring system; and when satisfied the definition does not encrypt data on the location, with a private key, transmit position data over the network to the monitoring system with no data encryption on the location of the secret key, the method is executed under running code, executable user computing device.

2. The method according to claim 1, additionally contains a stage at which to take the transfer from the remote system monitoring, which instructs the user computing device to terminate the encryption using a secret key.

3. The method according to claim 1, further comprising stages: accept authentication from the user, and as a result of the mentioned authentication, specify encrypt location data using a secret key over a predefined interval.

4. The method of claim 3, in which a predefined interval selected by the user.

5. The method according to claim 1 in which the determination is based, at least partially, on the time of day, associated with the location.

6. The method according to claim 5, in which the determination is based additionally on the day of the week associated with the location.

7. The method according to claim 5, in which the determination is based additionally on the date associated with the location.

8. The method according to claim 1, additionally contains a stage at which transmit data applications to the above monitoring system to provide the above-mentioned data applications remotely be backed up, in fact the application data is different from that referred to location data.

9. The method according to item 8, additionally contains a stage on which is determined on the basis of the operation of rule conditional data encryption, encrypt data applications, by using the secret key, before transmission to the monitoring system.

10. The method of claim 9, in which the determination is based at least partially on the time of day, associated with the application data.

11. The method according to paragraph 10, in which the determination is based additionally on the day of the week associated with the location.

12. Computer-readable media, which holds the code that instructs the user computing device to perform a way that includes the stages of getting data about the location, reflecting the current location of the user of a computing device; a definition based on the rule action conditional data encryption, modified or updated during a connection with a remote system monitoring whether to encrypt the location data using the private key of the user the user of a computing device; when satisfied the definition encrypt location data using a secret key encryption location data using a secret key for the formation of the encrypted data on the location, and transfer encrypted data on the location of the network to the monitoring system; and when satisfied the definition does not encrypt data on the location, with a private key, transmission of location data over the network to the monitoring system with no data encryption on the location of the secret key.

13. System to protect sensitive data during the monitoring of the electronic device, the system contains: A. remote system monitoring; b. an electronic device that contains a processor, memory, and permanently stored data, and network interface; C. cryptographic module, installed in the above-mentioned electronic device; and (d. rule conditional encryption stored in the mentioned device; said the device is configured for: i. determine what data is sensitive data or non-confidential data in accordance with the rule, modified or renewed during communications with a remote monitoring system; ii. encryption of sensitive data; and iii. transmission of non-sensitive data and encrypted confidential data to a remote system monitoring through a network interface.

14. System on item 13, in which the said device is configured to automatically detect whether the data is sensitive data or non-confidential data, based on the schedule.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.