Securing Temporary Data On Untrusted Devices
First Claim
Patent Images
1. A method comprising:
- intercepting a file command from a software application, the file command comprising a save command or a read command, and indicating a data file;
determining whether the data file is a temporary data file;
responsive to determining the data file is a temporary data file;
if the command is a save command, encrypting data associated with the save command and writing the encrypted data to the temporary data file; and
if the command is a read command, decrypting data associated with the read command and providing the decrypted data to the software application.
2 Assignments
0 Petitions
Accused Products
Abstract
One example method for securing data on untrusted devices includes the steps of intercepting a file command from a software application, the file command comprising a save command or a read command, and indicating a data file; determining whether the data file is a temporary data file; responsive to determining the data file is a temporary data file: if the command is a save command, encrypting data associated with the save command and writing the encrypted data to the temporary data file, if the command is a read command, decrypting data associated with the read command and providing the decrypted data to the software application.
17 Citations
21 Claims
-
1. A method comprising:
-
intercepting a file command from a software application, the file command comprising a save command or a read command, and indicating a data file; determining whether the data file is a temporary data file; responsive to determining the data file is a temporary data file; if the command is a save command, encrypting data associated with the save command and writing the encrypted data to the temporary data file; and if the command is a read command, decrypting data associated with the read command and providing the decrypted data to the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a non-transitory computer-readable medium; a processor in communication with the non-transitory computer readable medium, the processor configured to execute processor-executable instructions stored in the non-transitory computer-readable medium to; intercept a file command from a software application, the file command comprising a save command or a read command, and indicating a data file; determine whether the data file is a temporary data file; responsive to a determination the data file is a temporary data file; if the command is a save command, encrypt data associated with the save command and write the encrypted data to the temporary data file; and if the command is a read command, decrypt data associated with the read command and provide the decrypted data to the software application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising processor-executable instructions configured to cause a processor to:
-
intercept a file command from a software application, the file command comprising a save command or a read command, and indicating a data file; determine whether the data file is a temporary data file; responsive to a determination the data file is a temporary data file; if the command is a save command, encrypt data associated with the save command and write the encrypted data to the temporary data file; and if the command is a read command, decrypt data associated with the read command and provide the decrypted data to the software application. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification