The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.

 
Web www.patentalert.com

< Method and apparatus for averaging out variations in run-to-run path data of a computer program

> Compile time meta-object protocol systems and methods

> Mechanism for converting text output into objects

~ 00524