Method and System for Intercepting Transactions for Encryption
First Claim
Patent Images
1. A method for intercepting transactions for encryption, comprising:
- monitoring communication between an application and a storage device;
intercepting a transaction between the application and the storage device;
identifying an encryption request within the transaction; and
emulating performance of the transaction by performing the encryption request in a predetermined exit point defined by the application.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is directed to a method and system for intercepting transactions for encryption. In accordance with a particular embodiment of the present invention, an application for a storage device is monitored. A transaction for the storage device is intercepted. An encryption request within the transaction is identified. Performance of the transaction is emulated by performing the encryption request in a predetermined exit point of the application.
14 Citations
21 Claims
-
1. A method for intercepting transactions for encryption, comprising:
-
monitoring communication between an application and a storage device;
intercepting a transaction between the application and the storage device;
identifying an encryption request within the transaction; and
emulating performance of the transaction by performing the encryption request in a predetermined exit point defined by the application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for intercepting transactions for encryption, comprising:
-
a storage device; and
a processor, the processor operable to execute a program of instructions operable to;
monitor communication between an application and a storage device;
intercept a transaction between the application and the storage device;
identify an encryption request within the transaction; and
emulate performance of the transaction by performing the encryption request in a predetermined exit point defined by the application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Logic encoded in media, the logic being operable, when executed on a processor, to:
-
monitor communication between an application and a storage device;
intercept a transaction between the application and the storage device;
identify an encryption request within the transaction; and
emulate performance of the transaction by performing the encryption request in a predetermined exit point defined by the application. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification