Generating a stub file corresponding to a classified data file
First Claim
Patent Images
1. A method, comprising:
- in response to an indication that a data file has been generated by a first client device, determining a security classification associated with the data file;
determining that the security classification associated with the data file comprises a classified file;
storing, using one or more processors, the data file in a designated virtual storage area;
generating a first stub file at an original storage location of the data file, wherein the first stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area;
receiving a first instruction from a first user to share the data file with a second user;
determining user information associated with the second user;
determining that the second user has permission to access the data file based at least in part on the user information associated with the second user; and
sending a second instruction to a second client device associated with the second user, wherein the second instruction is configured to generate a second stub file corresponding to the data file at the second client device associated with the second user, wherein the second stub file is configured to be usable to obtain the data file in the designated virtual storage area.
1 Assignment
0 Petitions
Accused Products
Abstract
Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security classification associated with the data file; determining that the security classification associated with the data file comprises a classified file; storing the data file in a designated virtual storage area; and generating a stub file at an original storage location of the data file, wherein the stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area.
8 Citations
18 Claims
-
1. A method, comprising:
-
in response to an indication that a data file has been generated by a first client device, determining a security classification associated with the data file; determining that the security classification associated with the data file comprises a classified file; storing, using one or more processors, the data file in a designated virtual storage area; generating a first stub file at an original storage location of the data file, wherein the first stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area; receiving a first instruction from a first user to share the data file with a second user; determining user information associated with the second user; determining that the second user has permission to access the data file based at least in part on the user information associated with the second user; and sending a second instruction to a second client device associated with the second user, wherein the second instruction is configured to generate a second stub file corresponding to the data file at the second client device associated with the second user, wherein the second stub file is configured to be usable to obtain the data file in the designated virtual storage area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, the computer program product comprising a non-transitory computer readable storage medium and comprising computer instructions for:
-
in response to an indication that a data file has been generated by a first client device, determining a security classification associated with the data file; determining that the security classification associated with the data file comprises a classified file; storing the data file in a designated virtual storage area; generating a first stub file at an original storage location of the data file, wherein the first stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area; receiving a first instruction from a first user to share the data file with a second user; determining user information associated with the second user; determining that the second user has permission to access the data file based at least in part on the user information associated with the second user; and sending a second instruction to a second client device associated with the second user, wherein the second instruction is configured to generate a second stub file corresponding to the data file at the second client device associated with the second user, wherein the second stub file is configured to be usable to obtain the data file in the designated virtual storage area. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
one or more processors configured to; in response to an indication that a data file has been generated by a first client device, determine a security classification associated with the data file; determine that the security classification associated with the data file comprises a classified file; store the data file in a designated virtual storage area; generate a first stub file at an original storage location of the data file, wherein the first stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area; receive a first instruction from a first user to share the data file with a second user; determine user information associated with the second user; determine that the second user has permission to access the data file based at least in part on the user information associated with the second user; and send a second instruction to a second client device associated with the second user, wherein the second instruction is configured to generate a second stub file corresponding to the data file at the second client device associated with the second user, wherein the second stub file is configured to be usable to obtain the data file in the designated virtual storage area; and one or more memories coupled to the one or more processors and configured to provide instructions to the one or more processors. - View Dependent Claims (18)
-
Specification