Securing files
Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected vi...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
31.03.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected via a user device, applying at least one policy to the data, storing the at least one policy in a data record identifying the data, modifying a data format of the data to create a modified data, and storing the modified data in memory. |
---|---|
Bibliography: | Application Number: US201816125832 |