Encrypting file system
First Claim
1. A method of encrypting an electronic document which is open in an application program running in a general purpose computer, the general purpose computer including a display, a user input device, and a processor, the method comprising:
- (a) from within the application program, the user issuing one of a “
close,”
“
save”
or “
save as”
command for the document using the user input device;
(b) translating the command into an event;
(c) a crypto module trapping the event;
(d) the crypto module obtaining an encryption key value;
(e) the crypto module encrypting the document using the encryption key value;
(f) the crypto module passing control to an electronic document management system; and
(g) the electronic document management system executing the issued “
close,”
“
save”
or “
save as”
command;
whereby the electronic document is automatically encrypted without making a display on the display.
5 Assignments
0 Petitions
Accused Products
Abstract
An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.
149 Citations
28 Claims
-
1. A method of encrypting an electronic document which is open in an application program running in a general purpose computer, the general purpose computer including a display, a user input device, and a processor, the method comprising:
-
(a) from within the application program, the user issuing one of a “
close,”
“
save”
or “
save as”
command for the document using the user input device;
(b) translating the command into an event;
(c) a crypto module trapping the event;
(d) the crypto module obtaining an encryption key value;
(e) the crypto module encrypting the document using the encryption key value;
(f) the crypto module passing control to an electronic document management system; and
(g) the electronic document management system executing the issued “
close,”
“
save”
or “
save as”
command;
whereby the electronic document is automatically encrypted without making a display on the display. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of decrypting a document which is to be opened in an application program running in a general purpose computer, the general purpose computer including a display, user input device and a processor, the method comprising:
-
(a) the user selecting the document to be opened in the application program using the user input device;
(b) an “
open”
command issuing for the document to be opened in the application program;
(c) translating the command into an event;
(d) a crypto module trapping the event;
(e) the crypto module retrieving a decryption key value;
(f) the crypto module decrypting the document using the decryption key value;
(g) the crypto module passing control to an electronic document management system; and
(h) the electronic document management system executing the issued “
open”
command so that the document is opened in the application program;
whereby the document is automatically decrypted without making a display on the display. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. An electronic document management system for storing documents from an application in a workstation and retrieving documents from a file server to the application, the file server having a file system, the electronic document management system comprising:
-
(a) an access server in the file server comprising software for handling user authentication and file system access control for the file server;
(b) an access client in the workstation comprising software for enabling a user to sign on to the file server and obtain access to the file system on the file server;
(c) an EDM server in the file server comprising software for controlling an EDM database and EDM indexes to the EDM database;
(d) an EDM client in the workstation comprising software for interfacing the workstation to the EDM server and thereby allowing access by a user at the workstation to the EDM database; and
(e) a crypto server comprising software for intercepting I/O requests by the application and transparently handling encryption of the documents and decryption of encrypted documents;
wherein the access server and access client are functionally positioned between the EDM server and EDM client, and the crypto server is functionally positioned between the application and the EDM client. - View Dependent Claims (24, 25, 26, 27, 28)
-
Specification