Computer security system and method
First Claim
Patent Images
1. A method of securely computer encrypting content of a file, the method comprising compressing the content of the file, and encrypting the compressed content.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure processing system provides for the encryption of files by compression of the content of files and encryption of the compressed content. Also, files can be obfuscated by changing their file name and location and keeping a record of the changes encrypted for them. The encryption and stealth features can be made accessible by a simple graphical user interface accessible by a password to provide for simple operation.
100 Citations
147 Claims
- 1. A method of securely computer encrypting content of a file, the method comprising compressing the content of the file, and encrypting the compressed content.
- 7. A method of securely computer decrypting content of an encrypted file, the method comprising decrypting the file content and decompressing the decrypted content of the file.
- 14. Apparatus for securely computer encrypting content of a file, the apparatus comprising compressing means for compressing the content of the file, and encrypting means for encrypting the compressed content.
- 20. Apparatus for securely computer decrypting content of an encrypted file, the apparatus comprising decrypting means for decrypting the file content and decompressing means for decompressing the decrypted content of the file.
-
31. A method of obfuscating at least one file in a computer system, the method comprising:
-
automatically changing a filename of the or each file from an original file name to an obscure filename and moving the or each file from an original location to at least one obscure location;
keeping a record of the or each original filename and location and the or each corresponding obscure filename and location; and
encrypting the record. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 46, 62, 63, 64)
-
-
41. A method of recovering at least one obfuscated file in a computer system, the method comprising:
-
reading and decrypting a record of at least one original filename and location and at least one corresponding obscure filename and location; and
automatically changing the filename of the or each obfuscated file from the or each obscure filename to the or each original filename and moving the or each file from the respective obscure location to the respective original location. - View Dependent Claims (42, 43, 44, 45, 65, 66)
-
-
47. Apparatus for obfuscating at least one file in a computer system, the apparatus comprising:
-
changing means for automatically changing a filename of the or each file from an original file name to an obscure filename and moving the or each file from an original location to at least one obscure location;
recording means for keeping a record of the or each original filename and location and the or each corresponding obscure filename and location; and
encrypting means for encrypting the record. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. Apparatus for recovering at least one obfuscated file in a computer system, the apparatus comprising:
-
decrypting means for reading and decrypting a record of at least one original filename and location and at least one corresponding obscure filename and location; and
changing means for automatically changing the filename of the or each obfuscated file from the or each obscure filename to the or each original filename and moving the or each file from the respective obscure location to the respective original location. - View Dependent Claims (58, 59, 60, 61)
-
-
67. A method of obfuscating information stored in a location in a computer system, the method comprising:
-
dividing the information into a plurality of segments and storing each segment in a new location;
keeping a record of the location of the information and corresponding new locations;
deleting the information; and
encrypting the record. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 80, 119, 120)
-
-
81. A method of restoring information obfuscated in a computer system, the method comprising:
-
reading and decrypting a record of an original location of the information and corresponding locations of segments of the information;
reading the segments of the information from the locations;
combining the segments of the information; and
storing the combined segments as the restored information in the original location. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88, 89, 90, 92, 121, 122)
-
-
93. Apparatus for obfuscating information stored in a location in a computer system, the apparatus comprising:
-
dividing means for dividing the information into a plurality of segments and storing each segment in a new location;
recording means for keeping a record of the location of the information and corresponding new locations;
deleting means for deleting the information; and
encrypting means for encrypting the record. - View Dependent Claims (94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 106)
-
-
107. Apparatus for restoring information obfuscated in a computer system, the apparatus comprising:
-
record decrypting means for reading and decrypting a record of an original location of the information and corresponding locations of segments of the information;
reading means for reading the segments of the information from the locations;
combining means for combining the segments of the information; and
storing means for storing the combined segments as the restored information in the original location. - View Dependent Claims (108, 109, 110, 111, 112, 113, 114, 115, 116, 118)
-
-
123. A method of operating a computer system to provide file security, the method comprising:
-
generating a password input interface requiring a password input;
comparing an input password with a stored password;
generating a graphical user interface displaying a file menu in dependence upon the comparison to allow a user to input a user selection of at least one file for encryption or decryption; and
encrypting or decrypting the or each selected file in response to the user selection using symmetric key encryption or decryption wherein the input password comprises the basis of the key for encryption or decryption. - View Dependent Claims (124, 125, 126, 127, 128, 137, 138)
-
-
130. A computer system for providing file security, the system comprising:
-
password input means for generating a password input interface requiring a password input;
comparing means for comparing an input password with a stored password;
user interface means for generating a graphical user interface displaying a file menu in dependence upon the comparison to allow a user to input a user selection of at least one file for encryption or decryption; and
encrypting means for encrypting or decrypting the or each selected file in response to the user selection using symmetric key encryption or decryption wherein the input password comprises the basis of the key for encryption or decryption. - View Dependent Claims (131, 132, 133, 134, 135)
-
-
139. A method of assisting an operator of a processing system, the method comprising:
-
monitoring user inputs to the processing system during processing of a file by a processing application;
detecting when a processing application has finished processing a file;
comparing monitored user inputs to a user profile;
generating a user interface in dependence upon the comparison to allow the user to select to encrypt the file; and
encrypting the file in dependence upon the user selection. - View Dependent Claims (140, 141, 147)
-
-
143. A processing system for providing operator assistance, the system comprising:
-
monitoring means for monitoring user inputs to the processing system during processing of a file by a processing application;
detecting means for detecting when a processing application has finished processing a file;
comparing means for comparing monitored user inputs to a user profile;
generating means for generating a user interface in dependence upon the comparison to allow the user to select to encrypt the file; and
encrypting means for encrypting the file in dependence upon the user selection. - View Dependent Claims (144, 145)
-
Specification