Secure clipboard function
First Claim
1. A method for securing computer files, the method comprising:
- receiving, in a clipboard application, a request to copy material selected from the contents of a source file;
copying the material to the clipboard application;
receiving, in the clipboard application, a request to paste material contained in the clipboard application into a destination file;
determining if the destination file is a file authorized to receive the material;
if the destination file is authorized, pasting the material from the clipboard application to the file; and
if the destination file is not authorized, not pasting the material from the clipboard application to the file.
3 Assignments
0 Petitions
Accused Products
Abstract
Securing computer files in which a publish permission is present in a file system. Upon receiving a request to write data from one file to another, the file system determines whether publish permission is needed. If so and the user lacks the publish permission, the request is rejected. Disclosed is securing computer files which include encrypting metadata about an encrypted file and storing both the encrypted file and the encrypted metadata. The metadata includes a key for decrypting the encrypted file. The key for decrypting the metadata is stored in a USB security token. Disclosed is securing computer files which include copying material from a window displaying the contents of a file to a clipboard application. The file or window is associated with the material. The clipboard application can deny a request to paste material associated with one file to a window displaying the contents of a different file.
-
Citations
10 Claims
-
1. A method for securing computer files, the method comprising:
-
receiving, in a clipboard application, a request to copy material selected from the contents of a source file;
copying the material to the clipboard application;
receiving, in the clipboard application, a request to paste material contained in the clipboard application into a destination file;
determining if the destination file is a file authorized to receive the material;
if the destination file is authorized, pasting the material from the clipboard application to the file; and
if the destination file is not authorized, not pasting the material from the clipboard application to the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification