FIELD: physics.
SUBSTANCE: invention relates to the computer equipment. Method of enabling activation of one or more policies for controlling access rights to information (IRM) and/or encryption with respect to a data element in a software application comprises steps of establishing an agent on each terminal device; providing a central control module which includes IRM and/or encryption policies to be activated and communicates with agents; distributing said IRM and/or encryption policies; and, in response to indicating selection of one or more IRM policies and / or encryption, applying the selected policy to the data item in any application executing on the terminal device and accessing the data item, wherein the action of applying the selected policy comprises a step of supplementing the data item based on the selected policy.
EFFECT: technical result consists in providing a user using different applications of unified perception when using, even when each application has different from other user interface (UI), different from other UI layout and different from other technology.
17 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
SYSTEM FOR PROTECTING INFORMATION CONTAINING STATE SECRETS FROM UNAUTHORISED ACCESS | 2014 |
|
RU2571372C1 |
METHOD TO LOCK ACCESS TO DATA ON MOBILE DEVICE WITH API FOR USERS WITH DISABILITIES | 2015 |
|
RU2618946C1 |
SYSTEM AND METHOD OF AUTOMATIC DEPLOYMENT OF THE ENCRYPTION SYSTEM FOR USERS WHO PREVIOUSLY WORKED ON PC | 2013 |
|
RU2618684C2 |
SYSTEM FOR PROTECTING INFORMATION CONTAINING STATE SECRETS FROM UNAUTHORISED ACCESS | 2012 |
|
RU2504835C1 |
SYSTEM OF DATA PROTECTION FROM UNAUTHORIZED ACCESS TO THE DATA THAT CONSTITUTES NATIONAL SECURITY INFORMATION | 2010 |
|
RU2443017C1 |
METHOD OF CONTROLLING IDENTIFICATION OF USERS OF INFORMATION RESOURCES OF HETEROGENEOUS COMPUTER NETWORK | 2009 |
|
RU2415466C1 |
SYSTEM AND METHOD OF INTERCEPTING FILE STREAMS | 2023 |
|
RU2816551C1 |
SYSTEM FOR CONTROLLING ACCESS TO CREATED ENCRYPTED FILES | 2013 |
|
RU2533061C1 |
SYSTEM AND METHOD OF USING SECURITY POLICY TO STORAGE IN NETWORK | 2014 |
|
RU2581559C2 |
Authors
Dates
2019-09-24—Published
2015-10-14—Filed