The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.

 
Web www.patentalert.com

< Concurrent evaluation of policies with synchronization

< Method and system for ranking messages of discussion threads

> Secure single sign-on to operating system via power-on password

> Data transfer using hyper-text transfer protocol (HTTP) query strings

~ 00265