GB2516680A - Improving data security - Google Patents

Improving data security Download PDF

Info

Publication number
GB2516680A
GB2516680A GB1313556.1A GB201313556A GB2516680A GB 2516680 A GB2516680 A GB 2516680A GB 201313556 A GB201313556 A GB 201313556A GB 2516680 A GB2516680 A GB 2516680A
Authority
GB
United Kingdom
Prior art keywords
user
computer
data
data associated
detector module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1313556.1A
Other versions
GB201313556D0 (en
GB2516680B (en
Inventor
Terence Paul Stevens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TSI SOFTWARE Ltd
Original Assignee
TSI SOFTWARE Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TSI SOFTWARE Ltd filed Critical TSI SOFTWARE Ltd
Priority to GB1313556.1A priority Critical patent/GB2516680B/en
Publication of GB201313556D0 publication Critical patent/GB201313556D0/en
Publication of GB2516680A publication Critical patent/GB2516680A/en
Application granted granted Critical
Publication of GB2516680B publication Critical patent/GB2516680B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

Sending a notification to alert a user when or if they have not removed their data from a computer, for example during a session using a communal workstation they may have forgotten to remove a memory stick, pen drive, compact disc or forgotten to remove temporary files or data cached temporarily in local memory. The user data is detected as being present at the end of a user session, for example during log off or shut down, and a user is sent a message to their phone, email account, etc.

Description

IMPROVING DATA SECURITY
Field of the invention
The preseno invention relates to a system for improving data security for data associated with a user, particularly in relation to user data stored on removable media.
Background of the invention
There are occasions when a user may need to use a public or shared computer, for example within a school or university environment. Often access may be required to data specific to than user (such as a text or other type of document, for example edited using a word processor that is running on the computer) The user typically needs to retain such data, for example to keep a record of work that was undcrtakon or to transfcr thc work olscwhoro (for cxamplc to submit it or to work on it later on a different computer, and so on) Various merhods exist for sharing and storing data, but one of the most convenient is using a removable storage medium that can be accessed by the computer, such as a USB memory stick' which can be plugged into a USB interface of the computer and provides access to storage (typically flash memory and the like) contained within the physical device, though other forms of read-only and re-writeable storage media are also possible to use, such as optical discs, external hard drives, and so on. Yet further possibilities exist for syncing' part of the storage device or memory integral to the computer with remote data storage, for example using cloud' services; this can create a persistent local copy of the remote user data.
Though the above-mentioned methods can make it much easier to access user data on a public computer (or similar) , the onus is upon the user to remember to remove the relevant user data when they have finished using the computer. Other than the possibility of physical loss or theft of a removable storage devioe (such as a USB memory stick) , there is the possibility of losing the underlying user data, or of unauthorised access to the user data, which may both have serious consequences.
The presenc invention seeks to address these and
related problems in the prior art.
Summary of the invention
According ro preferred embodiments of the present invention, there is provided a system for improving data security for daca associated with a user, comprising: a computer operable under the control of the user to process the data associated with the user, and to make said data associated with the user inaccessible to the computer after use; a usage derector module for detecting when the user is no longor using tho computor; a data dotoctor modulo for detecting whether the data associated with the user is accessible to the computer; and a notification module for transmitting norification data to a device associated with the user if the usage detector module detects that the user is no longer using the computer and the data detector module detects that the data associated with the user is still accessible to the computer.
The system thus improves the security of the user data, and may in particular assist in preventing the loss of user data (as is explained in more detail below) The usage detector and data detector may be provided in separate software and/or hardware modules, or may be provided in any appropriate combination of software and/or hardware. The detectors may be provided in a single physical or other location (such as in the computer, in a single application or system utility, and so sri) or may be divided as appropriate between different locations (for example including remote elements, or an appropriate combination of system and applicatinn software modules and physical modules) The data detector may for example respond to a ohange, for example reacting to a system event relating to the deletion of data or removal of a storage device or storage medium, and at chat time determining if the relevant data is still present, or it may for example periodically (or otherwise) poll, for example in response to an external request if the process is externally managed (see below), to see if the data is still present.
All or parc of the usage detector module, data detector module and notification module may be provided as part of an operating system, or otherwise pre-installed and/or embedded within a computer system.
The computer may make the data associated with the user inaccessible to the computer after use in response to a user input or requesr (which the user may fail to carry out, for oxamplo bocauso of forgotfulnoss) / or as part of an automated process that may for example be triggered by certain events or conditions (which may in certain circumstances not occur, for example due to an error or unusual operating conditions) Preferably the computer provides access in the form of a user session, and the usage detector module is operable to monitor changes in the user session. The user session may for example be initiated by a user logging in, turning on or restarting the computer (and so on) or by inserting any relevant media or authentication device, and so on. The user session may for example be ended by a user logging off, powering down, switching off, or removing any relevant media or authentication device, and so on.
The usage detector module may monitor system events, such as log off or power down events, and the like. The data detector module may do likewise, or may be invoked by the usage detector module (or or vice versa, or by another entity such as an external controlling entity) . The usage detector module may operate as a separate entity or physical device and may for example be able to determine when the computer is physioally powered off, or may otherwise poll the computer on a periodic (or prompted) basis rather than responding to relevant events.
It is possible also for an alert or notification to be generated locally when a user session ends, for example using audio and/or visual outputs of the computer to attract the attention of the user, for example to warn them to cancel a logout or shutdown sequence and/or to remind them to remove their data before leaving, but this approach can have limited effect, for example because a user may not be the person ending their user session (for example if they have forgotten cc log out or shut down), or the computer may restart or shut down without following the usual procedure or sending the usual events (for example in the event of a software crash or power outage) . The embodiment in which the computer state is polled (for example remotely, and optionally in addition to rosponding to particular ovonts) can be useful in the case when the end of the session was not detected for reasons such as those given above.
In one embodiment the usage detector module may rely on physical detection of use (or otherwise determining if a session is active or continuing), for example using any appropriate means (such as infra-red detection, REID tag detection, and so on) to detect whether a user is within a particular proximity of the computer. The detector may detect that a particular user is present, or that any user has (for example) maintained a continuous presence at the computer.
Typically, the data associated with the user is stored on a removable storage medium, and the computer includes an interface for accessing the removable storage medium. The data may be copied to the computer before or during processing of the data. The removable storage medium may for example be a CD, DVD, Blu-Ray disc and the like, in which case the computer interface may include an appropriate CD, DVD, Blu-Ray and so on device. It may be any appropriate type of read-ooly or read/writeable medium. Making the data inaccessible to the user may in this case including ejecting or otherwise physically or virtually removing the removable storage medium from the computer (the medium need not be physically connected to the computer and may for example be connected via a network or the like) Tn an alternative embodiment (or an additional feature in the previous embodiment) the data associated with the user may be stored within the computer, for example on a hard disk, solid state device, or in volatile memory (such as RAM), and the like, and may for example be transferred to the computer via a network before being processed by the computer. Making the data inaccessible to the user in this case may include any appropriate combination of deleting the data, (re)enorypting the data, and/or transmitting a command to delete the data.
In one embodiment the removable storage medium is containcd within a rcmovablc storago dovico. Tho rcmovablo storage device cypically will communicate with the computer interface using an appropriate data standard, such as OJSB, FireWire (RIM) , and so on, and typically requires only a data interface and/or appropriate connectors rather than requiring a device in the computer for reading the storage medium. The storage medium may be a USB (or other format) memory stick' and the like. The device may use wired or wireless protocols, for example including Bluetooth (RIM) and Wi-Fi (RTN) protocols in the latter case.
In this case making the data inaccessible to the computer may include unmounting, (re)encrypting the data stored thereon, or physically removing the removable storage device.
In a further embodiment, the computer may access a remote storage device via a network (such as the Internet or other WAN, or a LAN), and it may be desired to delete the remote data after use in case it is accessible by a future user of the computer.
In the above embodiment, the removable storage medium preferably includes user identification data associated with the user, in which case the notification module processes the user identification data to determine at least one destination address for transmission of the notification data.
The user identification data may be one of a number sequence, an account (or other) name, or any other data identifying a particular user or user device, such as a network (or other) address of a user device, for example (that is, the user identification data may be essentially the same as the destination address, simplifying the processing) . The notification data may be data for accessing an APT or RPC, or may be a message such as an e-mail, SMS message or other format of instant' (or otherwise) message or notification, and so on.
The user identification data may be a computer file, proforably a toxt fib for oasy oditing and/or rocovcry, or may be part of a file, or otherwise embedded in the storage medium. It may be encrypted and/or authenticated for data protection or orher purposes. The user identification data may for example include a digital signature.
The notification module is preferably operable (or programmed) to access a database including a plurality of user records, to select a user record corresponding to the user identification data, and to select from the selected user record said at least one destination address.
The removable storage medium may include executable code which, when executed by the computer, causes the computer to provide at least one of the usage detector module, the data detector module and the notification detector module. The executable code may, as appropriate and where possible, automatically be executed by the computer, for example using existing operating system conventions, such as autoplay' files on ODs and DVDs, and so on. Thus, by providing the relevant software code on the removable storage medium, the computer need not be specially programmed or prepared prior to use of the removable storage medium. The executable oode may alternatively or additionally enable downloading of the relevant oode from an external source, such as a server accessed via the Internet, allowing the software to be updated as appropriate.
The sytem may further comprise a server accessible to the computer and incorporating at least part of at least one of the usage derector module, the data detector module and the notification module. The server may for example be accessible via rhe Internet or any other appropriate network or data link. The server preferably communicates with the computer (or vice versa) using an appropriate application programming interface (API) or set of remote procedure calls (RPC) and the like.
The server may initiate communications with the computer (for example when polling a series of computers registered with the server) or vice versa (for example on roccipt of rolovant oyotom ovonto or uoor input), and tho decision or request to notify the user device may be taken either by the computer or the server, for example depending on the exact distribution of modules or parts of modules between the two.
The notification module may for example be fully embodied in the server, and the data detector module may for example be partially embodied in the server, in an instance where the server periodically polls a computer to determine usage (for example in a LAN embodiment or an embodiment using relatively dumb' terminals).
In an alternative embodiment, more than one server is provided, and functionality is distributed across the servers and/or computer as appropriate. For example one server could maintain a correspondence between user IDs and user network addresses or phone numbers and the like, and a different server could handle communication with the computer(s) to determine when data is at risk of loss.
The server(s) may also allow the updating or installing of relevant sofoware on the computer or removable storage medium as aforesaid (when present and appropriate) With particular (though not exclusive) regard to embodiments in which the user data is stored or copied within or otherwise locally to the computer, the system may further comprise a backup module for transmitting the data associated with the user to a secure location if the usage detector module detects that the user is no longer using the computer and the data detector module detects that the data associated with the user is still accessible to the computer. Thus The user data can be safeguarded in the event that the user is not able to retrieve the data before it is removed or deleced. The backup module may be provided in addition to the notification module (and may be embodied in the same portion of executable code and the like) or may, in an alternative embodiment, be provided instead of the notification modulo (in tho ovcnt, for oxamplo, that thoro is no physical medium to recover) Tn a related aspect of the invention there is provided a method of improving data security for data associated with a user, for use with a computer operable under the control of the user to process the data associated with the user, and to make said data associated with the user inaccessible to the computer after use, the method comprising: detecting when the user is no longer using the computer; detecting whether the data associated with the user is accessible to the computer; and causing notification data to be transmitted to a device associated with the user if it is detected that the user is no longer using the computer and it is detected chat the data associated with the user is still accessible to the computer.
Additional method steps are provided corresponding (at least and where applicable) to the above-mentioned features of the system as aforesaid.
Tn a further aspect of the invention there is provided a computer readable medium embodying computer program code which, when executed by a ccmputer, causes the computer to carry out a method as aforesaid.
The computer readable medium may be a removable storage medium, in which case it may further comprise the aforesaid data associated with the user.
The storage medium may further include user identification data as aforesaid.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The materials, methods, and examples provided herein are illustrative only and not intended to be limiting.
Tmplementanion of the method and system of the present invention involves performing or completing certain selected tasks or stages manually, automatically, or a combination thereof. Moreover, according to actual instrumentation and oguipmont of proforrod ombodimcnto of tho mothod and systom of the present invention, several selected stages could be implemented by hardware or by software on any operating system of any firmware or a combination thereof. For example, as hardware, selected stages of the invention could be implemented as a chip or a circuit. As software, selected stages of the invention could be implemented as a plurality of software instructions being executed by a computer using any suitable operating system. In any case, selected stages of the method and system of the invention could be described as being performed by a data processor, such as a compucing platform for executing a plurality of instructions.
Although various aspects and embodiments of the present invention have been described separately above, any of the aspects and fearures of the present invention can be used in conjunction with any other aspect, embodiment or feature where appropriace. For example apparatus features may where appropriate be interchanged with method features. References to single entities should, where appropriate, be considered -10 -generally applicable to multiple entities and vice versa.
Unless otherwise stated herein, no feature desoribed herein should be oonsidered to be inoompatible with any other, unless such a combination is clearly and inherently incompatible. Accordingly, it should generally be envisaged that each and every separate feature disclosed in the introduction, description and drawings is combinable in any appropriate way with any other unless (as noted above) explicitly or clearly incompatible.
Brief description of the drawings
The invention will now be described further, by way of example, with reference to the acccmpanying drawings, in which: Figure 1 is a schematic block diagram of an illustrative system according to embodiments of the present invontion; Figure 2 is a schematic block diagram of a typical computer of Figure 1; Figure 3 is a schematic block diagram of a typical implementation of the system of Figure 1; Figure 4 is a schematic block diagram of a typical removable storage device for storing the user data of Figure 1; and Figure 5 is a flow diagram describing a typical seguence of events in accordance with the embodiment illustrated in Figures 1 to 4.
Detailed description of the preferred embodiment(s) With specific reference now to the drawings in detail, it is stressed chat the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in order to provide what is believed to be the most useful and readily understood description of the -11 -principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice.
The embodiments described below relate to a system and method of improving data security for data associated with a user.
Figure 1 is a schematic block diagram of an illustrative system according to embodiments of the present invention. A user 100 and his user data 102 and a related user device 104 (such as a personal computer or telephone of some sort) are shown in conjunction with a computer 110 which may for example be a shared or public computer, and a data detector module 120, a usage detector module 122 and a notification modulo 124. Thc modulco 120, 122, 124 may bc implemented parcially or wholly (or not at all) within the computer 110 as will be described in more detail below.
The user 100 engages in a user session with the computer 110, and accesses the user data 102 which is typically provided on a removable storage device (not shown) such as a USB memory stick (not shown) that is introduced to a USB port of the computer 110 befcre use.
The data detector 120 is typically a software component in the computer 110 which determines whether or not the user data is accessible to the computer, for example by polling to determine what USB and other removable storage devices are attached to the computer, and what their contents and/or origin are. The usage detector 122 is typically another software component in the computer 110 which determines whether the user (or what user) is using the computer. The usage detector 122 may for example be a system process that monitors shutdown and logout events, but in another embodiment may monitor patterns of usage of the computer (such as the time elapsed since any usage was detected) or -12 -may be a physical device monitoring the environment of the computer (for example to deteot movement or heat associated with a user to determine if and/or when a user leaves the computer) When the usage detector 122 determines that the user has finished their session with the computer 110, the data detector 120 determines whether the user data 102 is still present, and if so the notification module 124 is aotivated. The notifioation module 124 transmits a notification to a user device 104 (such as mobile phone or personal computer) accessible to the user, to let the user know that their user data is still accessible to the computer (for example is still attached) Figure 2 is a schematic block diagram of a typical computer of Figure 1. The computer 200 includes a processor 202, memory 204, and (optionally) local storage 206 such as a hard disk or other non-volatile memory. The computer also includos (optionally) a notwork adaptor 208 for communicating via a network 220 such as the Internet or a LAN/WAN, input/output interfaces 210 for communicating with a user 230, and (optionally) a media adapter 212 which may be an interface for communicating with removable storage devices and the like (such as USB storage devices and external hard disks) or may be a media device (such as an optical/CD drive) able to receive storage media such as CD ROMs, re-writeable CDs, and so on.
Figure 3 is a schematic block diagram of a typical implementation of the system of Figure 1. In this embodiment, the user 300 is shown in conjunction with the user data 302 in an appropriate form, and the user device 304 as before. The computer 310 includes the data detector 312 and usage detector 314 as before, and a server 320 is provided with the notification module 322 and account data 324. The server 320, computer 310 and user device 304 are connected via one or more networks 330, such as the Internet and/or mobile phone networks (in the case of the user device
304, for example)
-1_3 -In a variant of the present embodiment, the functions of the server and computer may be spread across further servers and/or computers as appropriate, for example to provide central management of the process in a managing server which polls one or more computers to determine their usage and/or accessible data and to take further action if the results indicate that the user has finished with a computer but their data is still present. This latter arrangement can avoid the need to store and execute proprietary sofuware locally on public computers, or can reduce the need for configuration, for example if pre-existing data protocols are used to carry out the polling (for example remote desktop protocols and the like) The may also be provided a software repository, optionally on a further server computer, which can ensure that software snored locally is updated appropriately and/or that centralised or localised user or account data is updatod appropriatoly.
Typically The data detector 312 determines an identification data associated with the user, which in one embodiment (see below) is encoded in a portion of the user data 302 but may alternatively or additionally relate to authentication or other data (such as a system user name or e-mail address) provided by the user to commence the user session on the computer. In this embodiment the identification data is transmitted to the server 320, and an account database 324 is then queried to determine appropriate user contact details (which may be provided by the user to the server 320 or otherwise determined independently of user input, for example using authentication or other data submitted at the computer to open the user session) , and a notification message is sent to the user device 304 corresponding to the address or other data retrieved from the database 324.
The notification message may take any appropriate form such as an instant message, an SMS message to a mobile -1_4 -phone, an automated (or otherwise) phone call, an e-mail, and so on.
Figure 4 is a schematio block diagram of a typioal removable storage device for storing the user data of Figure 1. The USE device 400 includes a storage medium 410 (typically flash memory), which in turn contains the user data 412 (such as documents created or edited by the user), (optionally) a user identifier file 414, and (optionally) computer oode 416.
The user identifier file 414 is typically a text file including details of the user, such as a user account name or number. In the present embodiment the file 414 is a human-readable cext file allowing for easy editing by a user or otherwise. Pdditional informaticn may be provided to facilitate contact with the user in the event of the device being lost, and so on.
The executable computer code 416 may optionally be includcd and may includc tho functionality providod by tho data detector 312, usage detector 314 and/or notification module 322 depending on the particular configuration of the system. The code 416 (which may be provided independently on any appropriate storage medium or transferred via a network) may be manually installed, for example by the user but more typically by a system administrator, or may auto install', for example when a USE device is inserted into a USE port.
The software can be permanently installed or run only for the duration of the session when the storage device was inserted. This can allow the operation of the system without requiring pre-configuration of the computer.
Figure 5 is a flow diagram describing a typical sequence of events in accordance with the embodiment illustrated in Figures 1 to 4.
In this embodiment, a shut down system event and a log off system evenc indicate that a user session has been terminated (0500) . If the user storage device (or other form of user data such as data stored on a local hard disk) is still accessible (5502) then the user identifier data is -1_5 -read from the scorage devioe (5504), and then transmitted to the notification server 320 of Figure 3 (5506) . The server then accesses the account database to determine user contact details, such as an IP address, telephone number, instant message or other user account, and so on (5508) . The server then transmits an appropriate message or initiates any appropriate communication in order to pass on the notification (5510) -The embodiments described above relate principally to user data stored on removable storage devices, but it will be appreciated chat user data may also be stored on removable media (rather than devices as such) and may also be stored locally, for example as a result of accessing remote data stores (with or without automatic syncing to the cloud') . There can be a security concern in such data persisting, even (for example) in temporary caches such as web browser temporary files. It will be appreciated that the principlcs discussed in thc abovc embodiments can be adapted as appropriate co cover these other forms of user data.
Although the present invention has been described above with reference cc specific embodiments, it will be apparent to a skilled person in the art that modifications lie within the spirit and scope of the present invention.

Claims (12)

  1. -16 -CLAIMS1. A syscem for improving data security of data associated with a user, comprising: a computer operable under the control of the user to process the data associated with the user and to make said data associated with the user inaccessible to the computer after use; a usage derectcr module for detecting when the user is no longer using the computer; a data detector module for detecting whether the data associated with the user is accessible to the computer; and a notificacion module for transmitting notification data to a device associated with the user if the usage detector module detects that the user is no longer using the computer and the data detector module detects that the data associated with the user is still accessible to the computcr.
  2. 2. A sysnem according to any preceding claim, wherein the computer provides access in the form of a user session, and the usage detector module is operable to monitor changes in the user session.
  3. 3. A syscem according to Claim 1 or 2, wherein the data associated with the user is stored on a removable storage medium, and the computer includes an interface for accessing the removable storage medium.
  4. 4. A syscem according to Claim 3, wherein the removable storage medium is contained within a removable storage device.
  5. 5. A syscem according to Claim 3 or 4, wherein the removable storage medium includes user identification data associated with the user, and the notification module processes the user identification data to determine at least -1_7 -one destination address for transmission of the notifioation data -
  6. 6. A system accnrding to Claim 5, wherein the notification module is operable to access a database including a plurality of user records, to select a user record oorresponding to the user identification data, and to select from the selected user record said at least one destination address.
  7. 7. A sysrem according to any one of Claims 3 to 6, wherein the removable storage medium includes executable code which, when executed by the computer, causes the computer to provide at least one of the usage detector module, the data detector module and the notification detector module.
  8. 8. A oysrcm according to any prccoding claim, furthcr comprising a server accessible to the computer and incorporating an least part of at least one of the usage detector module, the data detector module and the notification module.
  9. 9. A sysrem according to any preceding claim, further comprising a backup module for transmitting the data associated with the user to a secure location if the usage detector module detects that the user is no longer using the computer and the data detector module detects that the data associated with the user is still accessible to the computer.
  10. 10. A method of improving data security of data associated with a user, for use with a computer operable under the control of the user to process the data associated with the user and to make said data associated with the user inaccessible to the computer after use, the method 00 mp rising: -18 -detecting when the user is nc longer using the computer; detecting whether the data associated with the user is accessible to the computer; and causing norification data to be transmitted to a device associated with the user if it is detected that the user is no longer using the computer and it is detected that the data associated with the user is still accessible to the computer.
  11. 11. A computer readable medium embodying computer program code which, when executed by a computer, causes the computer to carry out a method of Claim 10.
  12. 12. A computer readable medium according to Claim 11, wherein the medium is a removable storage medium, and further comprises said data associated with the user.
GB1313556.1A 2013-07-30 2013-07-30 Improving data security Expired - Fee Related GB2516680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1313556.1A GB2516680B (en) 2013-07-30 2013-07-30 Improving data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1313556.1A GB2516680B (en) 2013-07-30 2013-07-30 Improving data security

Publications (3)

Publication Number Publication Date
GB201313556D0 GB201313556D0 (en) 2013-09-11
GB2516680A true GB2516680A (en) 2015-02-04
GB2516680B GB2516680B (en) 2016-08-17

Family

ID=49167142

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1313556.1A Expired - Fee Related GB2516680B (en) 2013-07-30 2013-07-30 Improving data security

Country Status (1)

Country Link
GB (1) GB2516680B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070245108A1 (en) * 2006-04-12 2007-10-18 Fujitsu Limited Information processing unit with information division recording function
US20130024931A1 (en) * 2011-07-21 2013-01-24 Wemagin Technology Llc Downloadable communication software tool for flash memory device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070245108A1 (en) * 2006-04-12 2007-10-18 Fujitsu Limited Information processing unit with information division recording function
US20130024931A1 (en) * 2011-07-21 2013-01-24 Wemagin Technology Llc Downloadable communication software tool for flash memory device

Also Published As

Publication number Publication date
GB201313556D0 (en) 2013-09-11
GB2516680B (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN1790265B (en) Portable application program
US7584201B2 (en) Management of mobile-device data
EP2234049B1 (en) Background service process for local collection of data in an electronic discovery system
JP5249493B2 (en) Managing terminal service accounts and sessions to use hosted applications online
US20050086231A1 (en) Information archiving software
US20100281546A1 (en) Data loss and theft protection method
WO2018161559A1 (en) Power failure protection method and device for non-volatile memory
US20060206487A1 (en) Method for restricting use of file, information processing apparatus and program product therefor
US10318272B1 (en) Systems and methods for managing application updates
JP2007299284A (en) Log collection system, client device, and log collection agent device
US20110314245A1 (en) Secure media system
US8145864B1 (en) Discovering data storage for backup
US8381275B2 (en) Staged user deletion
US20080115230A1 (en) Method and system for securing personal computing devices from unauthorized data copying and removal
JP2019075131A5 (en)
JP2008243172A (en) Access authority control system
JP4191239B2 (en) Access authority control system
GB2516680A (en) Improving data security
US20230066698A1 (en) Compute instance warmup operations
JP2009245288A (en) Program, method and apparatus for controlling application execution
JP5310075B2 (en) Log collection system, information processing apparatus, log collection method, and program
US9928386B1 (en) Data protection system
KR101532250B1 (en) Apparatus and method for protecting log information
US8685110B2 (en) System and method for securing a computer system
JP5156663B2 (en) Information processing apparatus and program

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20170730