Systems and methods for manipulating and managing computer archive files
First Claim
Patent Images
1. A method of encrypting a file on a computer, said method including:
- receiving an electronic file at an application on a computer,wherein said application provides a graphical user interface including an optionally user-selectable setting to enable encryption of electronic data,wherein, when said user-selectable setting is actuated using said graphical user interface, said application performs the steps of;
receiving a public key;
encrypting said electronic file to form a public key encrypted electronic file using said public key;
placing said encrypted electronic file in an electronic container file; and
placing encryption information relating to said public key encrypted electronic file inside said electronic container file,wherein said electronic container file has been enhanced to allow encryption information relating to said public key encrypted electronic file to be placed inside said electronic container file.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer program for managing and manipulating archive zip files of a computer. The program includes a system and method for opening, creating, and modifying, and extracting zip archive files. The program is fully integrated into Microsoft Windows Explorer and is accessed via Explorer menus, toolbars, and/or drag and drop operations. An important feature of the program is the archive manager which may be used to open a zip file, create a new zip file, extract zip files, modify zip files, etc. The program is integrated into Microsoft Windows Explorer using the shell name space extension application program interface developed by Microsoft.
283 Citations
10 Claims
-
1. A method of encrypting a file on a computer, said method including:
-
receiving an electronic file at an application on a computer, wherein said application provides a graphical user interface including an optionally user-selectable setting to enable encryption of electronic data, wherein, when said user-selectable setting is actuated using said graphical user interface, said application performs the steps of; receiving a public key; encrypting said electronic file to form a public key encrypted electronic file using said public key; placing said encrypted electronic file in an electronic container file; and placing encryption information relating to said public key encrypted electronic file inside said electronic container file, wherein said electronic container file has been enhanced to allow encryption information relating to said public key encrypted electronic file to be placed inside said electronic container file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification