×

Systems and methods for a cryptographic file system layer

  • US 10,402,582 B2
  • Filed: 01/29/2018
  • Issued: 09/03/2019
  • Est. Priority Date: 02/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving using a programmed hardware processor an identification of a designated directory location, wherein the designated directory location is selected from a plurality of directory locations on a computer system, and wherein the identification indicates that the designated directory location is usable to secure one or more data files;

    in response to receiving the identification, beginning a process to modify one or more data files in the designated directory location by performing an operation to secure the one or more data files;

    monitoring a communication interface between an application layer and a file system layer of the computer system to detect a data access request associated with the designated directory location; and

    in response to detecting that the data access request is associated with the designated directory location;

    intercepting the data access request, wherein the intercepting is transparent to a user of the computer system;

    retrieving a data file associated with the data access request;

    modifying the data file by performing a cryptographic operation on the data file to generate a modified data file that comprises a substantially random distribution of the data file, wherein the distribution results in a reordering of at least two units of data in the data file;

    generating a modified data access request including an identifier associated with the modified data file;

    sending the modified data access request to the file system layer or the application layer; and

    in response to sending the modified data access request, resuming the process to modify the one or more data files in the designated directory location.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×