RussianPatents.com
|
Managing confidentiality for monitored devices. RU patent 2506704. |
|||||||||||||||||||||
IPC classes for russian patent Managing confidentiality for monitored devices. RU patent 2506704. (RU 2506704):
|
FIELD: radio engineering, communication. SUBSTANCE: invention relates to data security systems. The apparatus, method, system and computer-readable medium for protecting confidential data also enable to monitor or track electronic devices which are shared for commercial and confidential purposes, through arbitrary encryption of data transmitted from the device being monitored to a computer at a remote location, wherein data transmission can be intended for tracking, monitoring, back up of data or for return in case of loss or storage. EFFECT: high efficiency of data protection. 15 cl, 5 dwg
THE LEVEL OF TECHNOLOGY The present disclosure refers to protect the privacy of users at the same time providing possibility of electronic tracking devices. Portable computers and increasingly other electronic devices such as cell phones, PDAs (PDAs), smart phones (such as BlackBerry™, iphonetm), memory cards, personal media device (e.g. iPod™), gaming devices and personal computers, remotely monitored, so that they can be returned in the event of theft. Such monitoring may be exercised by sending information about the location of the remote location, or the mail server. Ownership information, as expected, is stored on electronic devices such as personal computers, laptops or personal digital assistants, and the need to protect such a right of ownership or critical data, and the return of such devices if they are lost or stolen, is self-evident. However, while ensuring the protection of such devices and/or data should be taken into account and the privacy of users of such devices. THE ESSENCE OF THE INVENTION This entity is not exhaustive review aimed at determination of the boundaries of the subject of the invention is described and claimed in the materials of this application. Entity represents aspects of the subject of the invention in a simplified form to provide them with a basic understanding as an introduction to the detailed description of which is presented next. In many cases, the employer will want to keep track of all portable computers (or other electronic device)issued its servants. For confidentiality reasons, some officials may be against the tracking 24/7 portable computer, so as personal location and collection of personal historical locations considered confidential information. This is particularly important in case, if the employer gave the clerk of the permit personal use of a laptop outside. There is an interest, whether the monitoring by the employer or monitoring exercises a third party, such as a security company. The subject of the invention described in the materials of this application, provides system and the method of conditional encrypt the data sent from a device that is tracked to a computer in a remote location. Data transfer can be used for tracking, monitoring, data backup or to return in case of loss or theft. In one of the variants of implementation there are several aspects of encryption. To prevent unauthorized access to confidential data is encrypted before transmission to a remote location, and cannot be decrypted without the secret key. Whether your data is encrypted before transmission to a remote location, may depend on whether they are confidential or commercial data, the definition of which may depend on certain conditions. Conditions may be temporary, such that for the data generated during some hours of the day (such as working hours), the data is considered attributable to work, and not encrypted before transmission, or pre-encrypted, and can be decrypted in a remote location, using the decryption key, job related. For the data generated in other times, such as after hours, the data may be considered confidential and encrypted before transmission. In a preferred embodiment confidential data can be decrypted only with the consent of the user of this device, using the secret decryption key. Transmitted data are typically location information, or information relevant to a location, such as the addresses of the Internet Protocol (IP), GPS (global positioning system), power Wi-Fi signal, the signal strength, mobile towers times in these locations, the time spent in these locations, indication and identification marks for the device, but also can include visited web sites, keystrokes, emails, software version, run the software specifications device, mouse movements, and files or further information are created, deleted, copied, transferred, open, marked elected and/or modified files. However, as will be easily understandable to specialists in the field of technology, opened the subject of the invention can equally be used to protect confidential data, created, using the device for the co-confidential and commercial use, or in conjunction with information about the location or information relevant to a location, or separately. Other sensitive data that may be protected include, for example, data use, websites visited, played video and audio files, download, keystrokes, snapshots screens, emails, files and other sensitive data. DESCRIPTION OF DRAWINGS For a more complete understanding of the nature and benefits of disclosure of the subject of the invention, as well as the preferred usage, you should refer to the subsequent detailed description, read in conjunction with the accompanying drawings. For drawings these reference numbers denote such or similar stages and parts. Figure 1 is a schematic of a functional block diagram of the system and the method of conditional encrypt data in accordance with the way of the implementation of the disclosed the object of the invention built into the laptop computer. Figure 2 is a functional scheme the sequence of operations are schematically represents undertaken after theft workflow system and method of conditional encrypt data in accordance with the variants of implementation of disclosure of the subject of the invention. Figure 3 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with the variants of implementation of disclosure of the subject of the invention. Figure 4 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with alternative variants of implementation of disclosure of the subject of the invention. Figure 5 is the functional scheme of sequence of operations are schematically represents the encryption system and method of conditional encrypt data in accordance with the additional alternatives for the implementation of disclosure of the subject of the invention. A DETAILED DESCRIPTION OF THE SPECIFIC OPTIONS FOR THE IMPLEMENTATION OF A. Terminology Agent, as used in the materials of this application, is the agent software, hardware or software and hardware, which ideally is a permanent and invisible, and that is permanently stored in a computer or other electronic device. Agent preferably provides servicing functionality that require communication with the remote server. Agent resistant and may be able to support and/or provision of different services, such as deleting data, firewall protection, data encryption, location tracking, notification messages, and equipment and software updates. Illustrative way of implementing agent found in commercially available product Computrace Agent™. The technology that underlies the Computrace Agent™, was discovered and patented in the U.S. and other countries, patents which in most cases were assigned by Absolute Software Corporation. See, for example, US patents№ 5715174; 5764892; 5802280; 6244758; 6269392; 6300863; and 6507914, and related foreign patents. Details of permanent functional assignments agent disclosed in publications of patent applications U.S. № US 2005/0216757 and US 2006/0272020. Technical disclosure of these documents are included in materials of this description by reference as if fully set forth. It is possible to use the agent for the equivalent of the Computrace Agent™, or, less preferably, an alternative agent with less functionality. For purposes of this disclosure minimum functional sign of the agent is to contribute to the implementation of the connection between the electronic device and monitoring centre. Communication can be initiated by the agent, the monitoring centre or both. Host is an electronic device to be protected, that is typically intended for joint commercial and confidential use. Examples of hosts include portable computer, compact computer or smart phone. The agent is stored permanently in the host. Monitoring centre - is protected server or another computer or server is associated with the agent or which sends the message. This can be a mail server, or can be the distribution of servers or other computers. For example, assuming that the host is available for Internet connection, the agent may call centre monitoring in some selected suitable interval to inform the location of the host, download software updates, if any, and restore any security modules that are, or should be installed on the host. The options for implementing disclosed in the materials of this application, the agent will load the remote storage location in the centre of monitoring, information about the location and/or any other data required for the transfer. Communication with the center of monitoring can take place, for example, through wired or wireless telephone network, WIFI, WIMAX, cable, or satellite. Encryption - it is Generally assumed that any data transmitted between remote devices, such as the host and monitoring centre, is encrypted during transmission. However, in this document, unless the context requires reverse, encryption term generally refers to a conventional level of encryption that may be confidential encrypted or commercial encryption, and not to the typical encryption used during transmission. Moreover, the term «encryption» in the materials of this application is mainly used to confidential data (including information of a confidential location and/or any other confidential data, required for transfer), transferred and will remain encrypted and cannot be decrypted on the remote center for storage, if not given a secret decryption key. The term «encryption» also refers to the user of the host that owns the confidential data, which has the ability to control whether to encrypt sensitive data, when they are transmitted or copied to the remote location. Confidential data can also refer to personal data. Commercial data may also refer to the corporate data, data of the company or not personal data. Detailed descriptions are presented mainly in terms of methods or processes, symbolic representations of operations, functionality and features of the invention. These describe the way and views are tools used by experts in the field of technology for more efficient transmission of the essence of their work to other experts in the art. Method or process implemented software, here and in General, conceived which is self-consistent sequence of steps leading to the desired result. These stages include the physical manipulation of the physical quantities. Often, but not necessarily, these values take the form of electrical or magnetic signals suitable for storage, transmission, combine, compare and manipulate otherwise. In the future, will be taken into account that the distinction between hardware, software and firmware is not always clear, the specialists in this field of technology it is clear that the processes implemented by the software can be implemented in hardware, software and hardware or software in the form of coded commands, such as firmware and/or stored program commands. In General, if not stated otherwise, all single elements may be in the plural and Vice versa, without loss of generality. The use of the masculine gender may refer to the masculine, feminine or both genera. B. Approximate variant of the implementation of the A block diagram of the preferred alternative implementation is shown in figure 1. Electronic device 1 host, such as a laptop computer that contains the agent 2, which can regularly, at sporadic intervals, by chance, and/or according runs to communicate with remote storage 12 in the middle of 3 monitoring through Internet 4 through other telecommunications networks or their combinations. Messaging SMS (short message Service), for example, can be used for all or some of executing the connection. Agent 2 promptly joined to mechanism 5, containing a computer-readable commands in memory 6, which encrypts data 7 the company and/or confidential data 8 to transfer, according to the rules of 9 encryption, also stored in the memory of 6. One or more of encryption keys, for example, 10 key companies and the secret key, 11, can be stored for 6 electronic device 1. The memory of the 6 can be divided into parts and/or different types of memory, so that, for example, contribute to the separate data retention 7 of the company and confidential data in 8 different locations. In a typical application, a user device 1 may establish a confidential directory or folder in memory, 6 which any data that is identified as confidential data 8, can be separated from the data 7 the company. Device 1 host also contains the device of 15 defining the location, such as a device GPS and A-GPS, or some other device that performs positioning. Device 15 positioning can be held in memory 6 electronic device 1, or it can be a component or module separate from 6 memory, as shown in figure 1. Can be one, two or more devices 15 positioning, each of which operates on different principles or one acts as a backup for the other. Electronic device 1 is usually contains a device 16 for processing processing of the commands contained in the memory of 6, and read/write data in it and from it by bus 18, and interface 19 to 4 Internet or another network connection. Note that the device 1, which connects with the Internet 4 may in some cases be considered as part of the Internet 4. Agent 2 sends data 7, 8, which may include information about the location, the center of the 3 monitoring and/or remote device(s) 12 storage regularly, at sporadic intervals, by chance, and/or according runs. This transfer of data between the agent 2 and center 3 monitoring can be explicitly to the user. Before sending sensitive data about the location (that is, the location data is written to or gathered outside store, 8 confidential data may be encrypted, and the company data about the location of the repository 7 data of the company may remain unencrypted. Location data in your repositories 7,8 data may be present only briefly in the electronic unit 1. In the middle of 3 monitoring two types of data 7a, 8A can be stored together or can be stored in separate databases after sorting through the sorting unit 25. For example, data 7 the company, which is not encrypted, can be marked as such in the unit 1, or can be identified as such in the middle of 3 monitoring, and then stored in a repository 7a data. Sensitive data 8, which is encrypted before it is sent, can be marked as such in the unit 1, or can be identified as such in the middle of 3 monitoring, and then stored in a repository 8A data. RBS 12 may remain in the buildings of the company, a commercial company, which owns electronic device 1, or in the building of the third party security company, or it may be on another computer or server, or distributed in multiple computers or servers. If the data 7a of the companies that are stored encrypted (excluding temporary encryption during transmission), the company will have access to them, but not be able to decode sensitive data 8A without providing access to a secret key 11a decryption. It is possible that the encryption mechanism 5 encrypts as data 7 the company and sensitive data 8 before sending them through the agent 2 remote repository 12, in this case, the administrator in the company will need a key 10A decrypt the company to convert data 7a in a meaningful (non-encrypted) format. In any case sensitive data 8, transmitted or copied encrypted using the secret encryption key 11 or password that is known only to the user of an electronic device 1. The company does not have access to your secret key 11 and cannot interpret the data 8A, which are confidential and kept in the center of 3 monitoring. Centre 3 monitoring can be a server, which contains the interface 23 to the network 4, bus 14, by which the associated components internal to the server, and device 13 processing for handling computer-readable commands in a remote location 12. Examples of commands may be used to sort the incoming data in the sorting module 25, a program that allows you to enter the encryption keys, the program used to access the data, and so on. Also in remote storage 12 encrypted confidential data 8A may be stored, as well as data 7a of the company that may be encrypted or not encrypted. Communication lines 20, 21 between electronic device 1, network 4 and center 3 monitoring can be wired, wireless or cable. If the user wants to access the confidential data 8A, for example, after theft of the electronic device 1, he can access a remote repository of 12 using terminal 30 through the Internet 4. Data can be downloaded to the terminal 30, and the decryption key user 11a may be used to decrypt the data 8A. The first password can be used to extract sensitive data 8A, and the second password or key 11a decryption can be used to decrypt sensitive data 8A. Alternatively, key 11a decryption may be granted center 3 monitoring to decrypt sensitive data 8A. The options for implementing, where the provision of the secret key to reveal the historical location data or other confidential information, the use of third-party security company may be preferable to employees who did not want any confidential information became available to their employer. May exist a set of rules, through which encrypts sensitive data 8. Figure 3 shows that after the agent is loaded 49, he shall assure the availability of 50 encryption mechanism. The encryption mechanism 5 then checks 51 times of the day and extracts 52 rule 9 encryption to determine 53, encrypt sensitive data 8 or not. Just as an example, a simple rule could be that the data 7,8 not encrypted between 9:00 and 17:00, Monday to Friday. This example assumes that if the data as confidential in fact or attributable to work by their nature, they all will be treated as data 7 during office hours. In working hours no encryption 55 and data 7 company (containing all the data 7,8) transmitted 56 to a remote repository 12. RBS 12 can be placed in the center of the 3 monitoring in the buildings, where the user works, or may be in a different place. Once the data is transferred to 56, the process returns to the beginning of the cycle stage 51 checking time, so more data can be transmitted from time to time, after a specified delay or after other data will be formed. Outside of this time, that is, outside the ordinary working time, all the data is assumed to be confidential data 8 and encrypted using the secret key 11 and/or password, known only to the user of an electronic device 1. Sensitive data 8 encrypted 54 and transmitted 56 remote tool 3 storage. Once the data is transferred to 56, the process returns to the beginning of the cycle stage 51 checking time, so more data can be transmitted after a delay. As an exception can be installed other periods of time in the schedule, such as described above, and changes can be made, for example, during vacations. Rules, including rules relating to periods may be changed or updated through the agent 2 during communication with the monitoring center. For example, in the case of theft, amended rule to stop all encryption of sensitive data can communicate through an agent 2 module 9 of the rules of encryption. This option may eliminate the need for the user to supply a secret key 11a decrypt staff on return. Commercial data or data 7 companies can be encrypted using a key 10 is only known to a commercial enterprise, company, owner / administrator of the electronic device 1. Alternatively, you might have a different encryption process for data storage company, which occurs in a remote location 3 monitoring. Thus, the user will not have access to key of the company. Application of the rules of 9 may in some options for implementing depend on a user can enter a password. As shown in figure 4, after the electronic device reboots 60, it asks 62 user to enter a password. 63 the password is entered correctly, rule 9 shall apply 64, and sensitive data 8 encrypted with the secret key 11. If 63 password is entered incorrectly 65 or entered, 8 data not encrypted with the private key 11, because in this case the device 1 was stolen, or the user wants to use the device for tasks related to work. Encrypted data or not, they are passed 68 to a remote repository 3. After the transfer of 68 system returns to the top of the loop 69 in the process, from time to time, regularly or as and when necessary, other data can be communicated. In an alternate embodiment data 7 the company and sensitive data 8 default is not encrypted. The user has the chance to enter the password when he wants to use the device 1 for confidential purposes that would cause that data sent to and from a remote repository 12, will be encrypted in advance, but only within the specified period of time. With reference to figure 5, device 1 is configured to receive 70 password. When you enter a valid password device 1 asks the user to choose the period of confidentiality that may be the choice of a set of standardized periods, such as, for example, 30 minutes 6 hours and 1 week. There are other periods of time, and the user might be able to input any time up to a predetermined maximum. Unit 1 will receive 72 enter the required time period privacy of the user, and then monitors 74 expired or not a given period of time. During the selected period all figures 8 encrypted 76 using the secret key 11, as in the assumption that all use of electronic devices during this period of time is meant for sensitive data 8. Encrypted data is then passed 78 to a remote repository 12. If 74 period of time privacy expired 77, data is not encrypted using the secret key, as in the assumption that the data created after this period of time are the data of the 7 companies that are passed 78 to a remote repository 12 without encryption (or encrypted using the key of the 10 companies). After the transfer of 78 data, encrypted or not, the process returns to the beginning of the step-74, from time to time could be checked is expired the period of confidentiality, and can be transferred to other data. Approximate rules The following are examples of rules that can be used for encryption using the private key of the user: 1. Always encrypted. After stealing the user provides the key. This case would be suitable if the data recorded on location. 2. Always encrypted. Decryption of data is possible after both the user and the owner can provide their relevant parts of the composite key. 3. Encryption takes place according to the secret key in the time periods outside regular working hours. 4. As approximate rule (3), but this rule can be modified to account for vacation and variable working time. 5. As approximate rule (3), but may be activated only when the user enters a password when you restart or blocked. 6. Encryption takes place according to the secret key has temporarily at the user's request, as the embodiment according to figure 5. The desired time frame privacy can be entered by the user or may be fixed. It may be a different period, depending on the time of day. For example, during the second Breakfast, it can be 20 minutes. In the evening it can be 5 hours. At the weekend he can be for the whole day. Alternatives and variations Stages in the figures can be performed in a different order than the order, illustrated, or they can be combined where shown separately. Signal (such as an audible or visual signal the pop-up message generated by the device) that the period of the secret encryption completed or is nearing its end, may be formed by the agent and delivered to a user. This can be disguised as a signal that does not give him any idea that the device is installed some form of monitoring of protection. User password for the encryption agent may be removed from the device at the end of each period encryption. This will prevent attempt thief use it to encrypt the data on the location, to conceal his whereabouts. When providing security company user's private key system can be configured to only decrypt data, separated for a specific period of time in the past, such as a two weeks. This can be configured by regularly delete old data from a remote storage device. Alternatively, the secret encryption key can be used as a function of time, so that the decryption key can unlock only the current and future data, but not historical data. Sensitive data and company data need not be passed as soon as they are created. They can be locally stored in the electronic unit 1 in their respective repositories 7,8 data will not be available until the connection between the device 1 and center 3 monitoring, or until it is time for the agent to initiate or answer center 3 monitoring. 1. Method that runs user computing device, to enable monitoring of location of the user of a computing device from a remote location, the method contains the stages at which: get location data reflecting the current location of the user of a computing device; determined on the basis of the rule of conditional data encryption, modified or updated while communicating with the remote system monitoring whether to encrypt the data on the location, using the secret key of a user, the user of a computing device; when satisfied the definition encrypt data on the location, with a private key, encrypts the data on the location, using a secret key for the formation of the encrypted data on the location and transmit the encrypted data on the location of the network to the monitoring system; and when satisfied the definition does not encrypt data on the location, with a private key, transmit position data over the network to the monitoring system with no data encryption on the location of the secret key, the method is executed under running code, executable user computing device. 2. The method according to claim 1, additionally contains a stage at which to take the transfer from the remote system monitoring, which instructs the user computing device to terminate the encryption using a secret key. 3. The method according to claim 1, further comprising stages: accept authentication from the user, and as a result of the mentioned authentication, specify encrypt location data using a secret key over a predefined interval. 4. The method of claim 3, in which a predefined interval selected by the user. 5. The method according to claim 1 in which the determination is based, at least partially, on the time of day, associated with the location. 6. The method according to claim 5, in which the determination is based additionally on the day of the week associated with the location. 7. The method according to claim 5, in which the determination is based additionally on the date associated with the location. 8. The method according to claim 1, additionally contains a stage at which transmit data applications to the above monitoring system to provide the above-mentioned data applications remotely be backed up, in fact the application data is different from that referred to location data. 9. The method according to item 8, additionally contains a stage on which is determined on the basis of the operation of rule conditional data encryption, encrypt data applications, by using the secret key, before transmission to the monitoring system. 10. The method of claim 9, in which the determination is based at least partially on the time of day, associated with the application data. 11. The method according to paragraph 10, in which the determination is based additionally on the day of the week associated with the location. 12. Computer-readable media, which holds the code that instructs the user computing device to perform a way that includes the stages of getting data about the location, reflecting the current location of the user of a computing device; a definition based on the rule action conditional data encryption, modified or updated during a connection with a remote system monitoring whether to encrypt the location data using the private key of the user the user of a computing device; when satisfied the definition encrypt location data using a secret key encryption location data using a secret key for the formation of the encrypted data on the location, and transfer encrypted data on the location of the network to the monitoring system; and when satisfied the definition does not encrypt data on the location, with a private key, transmission of location data over the network to the monitoring system with no data encryption on the location of the secret key. 13. System to protect sensitive data during the monitoring of the electronic device, the system contains: A. remote system monitoring; b. an electronic device that contains a processor, memory, and permanently stored data, and network interface; C. cryptographic module, installed in the above-mentioned electronic device; and (d. rule conditional encryption stored in the mentioned device; said the device is configured for: i. determine what data is sensitive data or non-confidential data in accordance with the rule, modified or renewed during communications with a remote monitoring system; ii. encryption of sensitive data; and iii. transmission of non-sensitive data and encrypted confidential data to a remote system monitoring through a network interface. 14. System on item 13, in which the said device is configured to automatically detect whether the data is sensitive data or non-confidential data, based on the schedule.
|
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |