TECHNIQUES FOR DETECTING ENCRYPTED DATA
First Claim
1. A method for detecting an encryption status of a data file stored in a data source and selectively encrypting the data file based on the encryption status, the method comprising:
- reading the data file from the data source;
calculating a value of a property of the data file read from the data source;
comparing the calculated value with a threshold value to determine whether the data file read from the data source is encrypted or unencrypted; and
encrypting the data file read from the data source when the data file read from the data source is determined to be unencrypted as a result of the comparison.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described that generally relate to methods for detecting encryption status of a data file or data stream and selectively encrypting the data file or data stream based on the encryption status of the data file or data stream are generally disclosed. Example methods may include one or more of reading the data file or data stream from a data source, calculating a value of a property of the data file or data stream, comparing the calculated value with a threshold value to determine whether the file is encrypted or unencrypted, and encrypting files that are determined to be unencrypted.
-
Citations
20 Claims
-
1. A method for detecting an encryption status of a data file stored in a data source and selectively encrypting the data file based on the encryption status, the method comprising:
-
reading the data file from the data source; calculating a value of a property of the data file read from the data source; comparing the calculated value with a threshold value to determine whether the data file read from the data source is encrypted or unencrypted; and encrypting the data file read from the data source when the data file read from the data source is determined to be unencrypted as a result of the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing system arranged to detect an encryption status of a data file and selectively encrypt the data file based on the encryption status, the computing system comprising:
-
a data source including the data file stored therein; and a data processor configured to; retrieve the data file from the data source; calculate a value of a property of the retrieved data file; compare the calculated value with a threshold value to determine whether the retrieved data file is encrypted or unencrypted; and encrypt the retrieved data file when the data file is determined as being unencrypted. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer accessible medium having stored thereon computer executable instructions for detecting an encryption status of a data file stored in a data source and selectively encrypting the data file based on the encryption status, when the computer executable instructions are executed by a processing unit the processing unit is configured to perform a procedure comprising:
-
reading the data file from the data source; calculating a value of a property of the data file read from the data source; comparing the calculated value with a threshold value to determine whether the data file read from the data source is encrypted or unencrypted; and encrypting the data file read from the data source when the data file read from the data source is determined to be unencrypted as a result of the comparison. - View Dependent Claims (19, 20)
-
Specification