System and method for manipulating and managing computer archive files
First Claim
1. A method for accessing an archive, said method including:
- receiving a request to access an archive, said request including access data;
comparing said access data to security information stored in said archive to determine an access control decision; and
providing access to said archive based on said access control decision, wherein said security information includes a plurality of passwords and access to said archive is provided when said access data matches any of said plurality of passwords.
5 Assignments
0 Petitions
Accused Products
Abstract
Certain embodiments of the present invention provide an archive management application that operates within a host application to provide access to an archive and/or allow access to and/or modification of files in an archive using the host application'"'"'s interface, instead of operating as a separate standalone archive management application. In an embodiment of the present invention, a file archiving system may include a user interface component, a file management component and a compression/extraction engine component. The user interface component may include an enhanced user interface of a host application that provides an interface for a user. The file management component may include a central directory that provides a representation of the contents of an archive. The compression/extraction engine component may include a file size module and/or a security module. The file size module may be used to compress and/or decompress a file in an archive. The security module may be used to encrypt, decrypt, digitally sign and/or authenticate a file in an archive.
-
Citations
39 Claims
-
1. A method for accessing an archive, said method including:
-
receiving a request to access an archive, said request including access data;
comparing said access data to security information stored in said archive to determine an access control decision; and
providing access to said archive based on said access control decision, wherein said security information includes a plurality of passwords and access to said archive is provided when said access data matches any of said plurality of passwords. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for accessing an archive, said method including:
-
receiving a request to access an archive, said request including access data;
comparing said access data to security information stored in a repository outside said archive to determine an access control decision; and
providing access to said archive based on said access control decision, wherein said security information includes a plurality of passwords and access to said archive is provided when said access data matches any of said plurality of passwords.
-
-
31. A method for storing security information for use in accessing an archive:
-
associating first security information with an archive;
associating second security information with said archive; and
storing said first security information and said second security information in said archive, wherein either of said first security information and said second security information are usable in determining whether to grant access to said archive. - View Dependent Claims (32)
-
-
33. A method for storing security information for use in accessing an archive:
-
associating first security information with an archive;
associating second security information with said archive; and
storing said first security information and said second security information in a repository outside of said archive, wherein either of said first security information and said second security information are usable in determining whether to grant access to said archive.
-
-
34. A method for controlling access to an archive, said method including:
-
associating first security information and second security information with an archive;
storing said first security information in a first repository outside of said archive;
storing said second security information in at least one of said first repository and a second repository;
receiving an access request from a user, said access request including access data;
comparing said access data to at least one of said first security information and said second security information to determine if said access data matches at least one of said first security information and said second security information; and
providing access to said archive when said access data matches at least one of said first security information and said second security information. - View Dependent Claims (35, 36)
-
-
37. A method for controlling access to an archive, said method including:
-
associating first security information and second security information with an archive;
storing said first security information in a first repository inside of said archive;
storing said second security information in at least one of said first repository and a second repository;
receiving an access request from a user, said access request including access data;
comparing said access data to at least one of said first security information and said second security information to determine if said access data matches at least one of said first security information and said second security information; and
providing access to said archive when said access data matches at least one of said first security information and said second security information. - View Dependent Claims (38, 39)
-
Specification