Browse Prior Art Database

Algorithm to protect files stored in specific location of hard drive from security risks associated with unsecure wifi.

IP.com Disclosure Number: IPCOM000241173D
Publication Date: 2015-Apr-01
Document File: 2 page(s) / 66K

Publishing Venue

The IP.com Prior Art Database

Abstract

Algorithm to protect files stored in a specific location of a hard drive from security risks associated with unsecured wifi.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 01 of 2

Algorithm to protect files stored in specific location of hard drive from security risks associated with unsecure wifi.

When an employee is working with sensitive information on a day-to-day basis it is important to protect data on the employee's device once the employee is off-site. Data accessed from within applications, like a mailing system for example, is generally well protected by mechanisms enforced by the application itself, for example Virtual Private Network (VPN) client, to authenticate to the firewall before accessing mail applications or any other sensitive application data. However, data stored as documents directly on the employee's hard drive is not protected from security risks that the employee's device is exposed to once connected to the internet via an insecure connection.

    For example, Bob is working in the Research department of an IT company. He is working on writing a paper on his team's latest discoveries. This information is not yet completed but is already highly confidential. Bob stores his drafts on his hard drive. Bob goes to another country for a conference and wants to check his personal social networking account from his work device. He connects to the internet via wifi at his hotel. The wifi in the hotel is unsecured, and the moment Bob connects to it, even if Bob has his firewall and antivirus protection on, he is still putting his information under risk - as long as his laptop is on and connected to an unsecured connection, any hacker can access it remotely and copy / damage files with sensitive information.

    This idea protects Bob in the scenario above by locking the location on the hard drive where confidential files are stored from the very moment when Bob is trying to connect to an unsecured / not company approved network.

    This idea protects company data stored on a user's work device by locking up a specific location on the device hard drive once the user is trying to connect to the internet via an unsecured / not company approved connection.

    Once the specified location on the hard drive is locked, all attempts to write to or read from this location are blocked. The specific location on the hard drive is unlocked once the user connects to the company approved network, providing that there were no security treats discovered on the device.

Implementation:

    One possible implementation for this idea is a folder protection Agent installed on a user work device. This agent would start as soon as t...