Protecting Encrypted Files Transmitted over a Network
First Claim
1. A method for identifying a destination address being accessed by a window for a process operating on a computer system, the method comprising:
- determining a foreground window for the process; and
examining a resource within the foreground window to determine a destination address that is being or is to be accessed by the process.
7 Assignments
0 Petitions
Accused Products
Abstract
An improved system and approaches for protecting secured files when being used by an application (e.g., network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e.g., the Internet) to unauthorized destinations. In one embodiment, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner.
113 Citations
20 Claims
-
1. A method for identifying a destination address being accessed by a window for a process operating on a computer system, the method comprising:
-
determining a foreground window for the process; and examining a resource within the foreground window to determine a destination address that is being or is to be accessed by the process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium having stored thereon, computer program code that, if executed by a device, causes the device to identify a destination address being accessed by a window for a process operating on a computer system by a method, the method comprising:
-
determining a foreground window for the process; and examining a resource within the foreground window to determine a destination address that is being or is to be accessed by the process. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An address identification system comprising:
an address identifier monitor configured to identify a destination address being accessed by a window for a process operating on a computer system, wherein the address identifier monitor comprises; a foreground window monitor configured to determine a foreground window for a process; and a resource examiner configured to examine a resource within the foreground window to determine a destination address that is being or is to be accessed by the process. - View Dependent Claims (18, 19, 20)
Specification