System and method for manipulating and managing computer archive files
First Claim
1. A method for accessing an archive, said method including:
- receiving first access data from a user seeking to gain access to an archive;
receiving second access data;
using said first access data and said second access data to form an access data result;
comparing said access data result to security information stored in said archive to determine an access control decision; and
providing access to data in said archive based on said access control decision.
5 Assignments
0 Petitions
Accused Products
Abstract
Certain embodiments of the present invention provide an archive management application that operates within a host application to provide access to an archive and/or allow access to and/or modification of files in an archive using the host application'"'"'s interface, instead of operating as a separate standalone archive management application. In an embodiment of the present invention, a file archiving system may include a user interface component, a file management component and a compression/extraction engine component. The user interface component may include an enhanced user interface of a host application that provides an interface for a user. The file management component may include a central directory that provides a representation of the contents of an archive. The compression/extraction engine component may include a file size module and/or a security module. The file size module may be used to compress and/or decompress a file in an archive. The security module may be used to encrypt, decrypt, digitally sign and/or authenticate a file in an archive.
-
Citations
42 Claims
-
1. A method for accessing an archive, said method including:
-
receiving first access data from a user seeking to gain access to an archive;
receiving second access data;
using said first access data and said second access data to form an access data result;
comparing said access data result to security information stored in said archive to determine an access control decision; and
providing access to data in said archive based on said access control decision. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for accessing a file in an archive, said method including:
-
receiving first access data from a user seeking to gain access to a file in an archive;
receiving second access data;
using said first access data and said second access data to form an access data result;
comparing said access data result to security information stored in said archive to determine an access control decision; and
providing access said file in said archive based on said access control decision.
-
-
33. A method for accessing a central directory in an archive, said method including:
-
receiving first access data from a user seeking to gain access to a central directory in an archive;
receiving second access data;
using said first access data and said second access data to form an access data result;
comparing said access data result to security information stored in said archive to determine an access control decision; and
providing access said central directory in said archive based on said access control decision.
-
-
34. A method for accessing an archive, said method including:
-
receiving first access data from a user seeking to gain access to an archive;
receiving second access data;
using said first access data and said second access data to form an access data result;
comparing said access data result to security information stored in a repository to determine an access control decision; and
providing access to said archive based on said access control decision. - View Dependent Claims (35, 36)
-
-
37. A method for controlling access to a archive, said method including:
-
associating first security information and second security information with an archive;
storing said first security information in a first repository outside of said archive;
storing said second security information in at least one of said first repository and a second repository;
receiving an access request, said access request including first access data and second access data;
comparing said first access data to said first security information and said second security information to determine if said first access data matches at least one of said first security information and said second security information;
comparing said second access data to said first security information and said second security information to determine if said second access data matches at least one of said first security information and said second security information;
providing access to said archive when both said first access data and said second access data match said security information. - View Dependent Claims (38, 39)
-
-
40. A method for controlling access to a archive, said method including:
-
associating first security information and second security information with an archive;
storing said first security information in a first repository inside of said archive;
storing said second security information in at least one of said first repository and a second repository;
receiving an access request, said access request including first access data and second access data;
comparing said first access data to said first security information and said second security information to determine if said first access data matches at least one of said first security information and said second security information;
comparing said second access data to said first security information and said second security information to determine if said second access data matches at least one of said first security information and said second security information;
providing access to data in said archive when both said first access data and said second access data match said security information. - View Dependent Claims (41, 42)
-
Specification