The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 19, 2019

Filed:

Jun. 14, 2016
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Geoffrey Naismith DeFilippi, Issaquah, WA (US);

Joel D. Tipke, Seattle, WA (US);

Michael Ernest Bailey, Sumner, WA (US);

Charles Clayton Gardner, North Bend, WA (US);

Grant D. Goodall, Bothell, WA (US);

Assignee:
Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/20 (2006.01); G06F 3/06 (2006.01); G06F 21/64 (2013.01); G06F 12/14 (2006.01); G06F 17/30 (2006.01); G06F 11/14 (2006.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
G06F 3/0619 (2013.01); G06F 3/065 (2013.01); G06F 3/067 (2013.01); G06F 3/0631 (2013.01); G06F 11/1448 (2013.01); G06F 12/1466 (2013.01); G06F 17/30117 (2013.01); G06F 21/6218 (2013.01); G06F 21/64 (2013.01); G06F 2212/1052 (2013.01); G06F 2221/2143 (2013.01);
Abstract

Representative embodiments disclose how to remove spilled data from an unauthorized system and/or service in a cloud service. Some embodiments allow a user to remove spilled data in a secure fashion without involving an administrator. Spilled data resides in a data structure backed by allocated storage locations. The system presents a user interface allowing a user to enter information that allows identification of the allocated storage locations. The spilled data is removed from the data structure leaving whitespace in the allocated storage locations where remnants of the spilled data can reside. The system creates a copy of the data structure, removing the whitespace. The system connects the copy of the data structure in place of the original data structure. The original allocated storage locations are then overwritten in a secure manner to remove any remnants of the spilled data.


Find Patent Forward Citations

Loading…