Abstract: Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
Abstract: Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
Type:
Grant
Filed:
February 17, 2006
Date of Patent:
December 25, 2012
Assignee:
Credant Technologies, Inc.
Inventors:
Christopher D. Burchett, Jason Jaynes, Bryan Chin, David Consolver
Abstract: In a particular embodiment, a server module deployed on a server is disclosed. The server module is connected to a wireless network access node. The server module includes a database containing user information for multiple wireless devices. Each element in the database is attributable to at least one authorized wireless device and contains at least one type of data file from the following group: (i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information.
Type:
Grant
Filed:
September 23, 2002
Date of Patent:
February 16, 2010
Assignee:
Credant Technologies, Inc.
Inventors:
Dwayne R. Mann, Robert W. Heard, Christopher D. Burchett, Ian R. Gordon
Abstract: In a particular embodiment, a client module is deployed on a wireless device. The client module comprises a policy database including a list of authorized devices to which the wireless device may communicate. In another embodiment, the client module comprises a policy database including at least two user profiles on a wireless device, such as a personal profile and a business profile.
Type:
Grant
Filed:
September 23, 2002
Date of Patent:
October 14, 2008
Assignee:
Credant Technologies, Inc.
Inventors:
Robert W. Heard, Dwayne R. Mann, Christopher D. Burchett, Ian R. Gordon
Abstract: This present invention provides a system and method making it possible for a third party add-on system to keep user authentication credentials synchronized with an existing user authentication mechanism.
Type:
Application
Filed:
November 15, 2006
Publication date:
July 26, 2007
Applicant:
Credant Technologies, Inc.
Inventors:
Chris Burchett, Warren Robbins, Jason Jaynes, Brijesh Mishra
Abstract: Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
Type:
Application
Filed:
February 17, 2006
Publication date:
July 26, 2007
Applicant:
Credant Technologies, Inc.
Inventors:
Christopher Burchett, Jason Jaynes, Bryan Chin, David Consolver