Storage Volume Protection Supporting Legacy Systems
First Claim
Patent Images
1. A method implemented in a computing device, the method comprising:
- accessing an encrypted storage volume encrypted using an encryption technique unsupported by an operating system of the computing device;
identifying an access application on the encrypted storage volume; and
executing, without administrator privileges at the computing device, the access application, the access application allowing the computing device to access encrypted data files stored on the encrypted storage volume.
2 Assignments
0 Petitions
Accused Products
Abstract
A storage volume is encrypted using a particular encryption technique, the storage volume including an access application and one or more cover files. The access application can be executed by a computing device having an operating system lacking support for the particular encryption technique, and allows the computing device to access data on the storage volume encrypted using the particular encryption technique.
-
Citations
20 Claims
-
1. A method implemented in a computing device, the method comprising:
-
accessing an encrypted storage volume encrypted using an encryption technique unsupported by an operating system of the computing device; identifying an access application on the encrypted storage volume; and executing, without administrator privileges at the computing device, the access application, the access application allowing the computing device to access encrypted data files stored on the encrypted storage volume. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented in a computing device, the method comprising:
-
generating a discovery volume portion on a storage volume; and storing, in the discovery volume portion, an access application that can be executed by an additional computing device having an operating system lacking support for an encryption technique used to encrypt the storage volume, the access application allowing the additional computing device to access data on the storage volume encrypted using the encryption technique. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A storage volume comprising:
-
a first portion storing both one or more encrypted files and a protected file directory of the one or more encrypted files, the protected file directory being accessible to one or more devices with operating systems that support an encryption technique used by the storage volume; a second portion storing an access application that is executed by one or more other devices with operating systems that lack support for the encryption technique used by the storage volume, wherein execution of the access application can be done without administrator privileges on the one or more other devices; and the access application, when executed, verifying credentials of a user of one of the one or more other devices and allowing the user to access the one or more encrypted files even though the one of the one or more other devices lacks support for the encryption technique used by the storage volume. - View Dependent Claims (20)
-
Specification