US 11,973,860 B1
Systems and methods for encryption and provision of information security using platform services
Adam Ghetti, Atlanta, GA (US); Jeffrey Howard, Annapolis, MD (US); James Jordan, Roswell, GA (US); Nicholas Smith, Atlanta, GA (US); Jeremy Eckman, Annapolis, MD (US); Ryan Speers, Silver Spring, MD (US); and Sohaib Bhatti, Canton, GA (US)
Assigned to lonic Security Inc., Atlanta, GA (US)
Filed by Ionic Security Inc., Atlanta, GA (US)
Filed on Jun. 24, 2022, as Appl. No. 17/849,238.
Application 17/849,238 is a continuation of application No. 16/741,287, filed on Jan. 13, 2020, granted, now 11,387,986.
Application 16/741,287 is a continuation of application No. 16/029,996, filed on Jul. 9, 2018, granted, now 10,567,167, issued on Feb. 18, 2020.
Application 16/029,996 is a continuation of application No. 15/469,871, filed on Mar. 27, 2017, granted, now 10,020,935, issued on Jul. 10, 2018.
Application 15/469,871 is a continuation of application No. 15/017,284, filed on Feb. 5, 2016, granted, now 9,608,809, issued on Mar. 28, 2017.
Claims priority of provisional application 62/112,638, filed on Feb. 5, 2015.
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/08 (2006.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01)
CPC H04L 9/083 (2013.01) [G06F 21/316 (2013.01); G06F 21/602 (2013.01); G06F 21/62 (2013.01); H04L 9/0819 (2013.01); H04L 9/0822 (2013.01); H04L 9/0861 (2013.01); H04L 63/04 (2013.01); H04L 63/0428 (2013.01); H04L 63/062 (2013.01); H04L 63/065 (2013.01); H04L 63/0815 (2013.01); H04L 63/10 (2013.01); H04L 63/102 (2013.01); G06F 2221/2113 (2013.01); G06F 2221/2133 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, via at least one computing device, at least one policy for enabling cryptographically secure tracking of electronic activities of a user and a particular electronic computing device, wherein the at least one policy comprises definitions for a plurality of actions to be taken with respect to certain electronic activities resulting from interaction by the user with the at least one computing device;
identifying, via the at least one computing device, a particular electronic activity resulting from user interaction with the at least one computing device;
determining, via the at least one computing device, a particular action to take by applying the at least one policy to the particular electronic activity;
initiating, via the at least one computing device, the particular action with respect to the particular electronic activity; and
suppressing, via the at least one computing device, the user interaction with an intended application by performing the particular action comprising removing one or more user interface elements from the intended application.