Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
First Claim
1. A method of allowing selective access to an encrypted file, comprising the method steps of:
- providing a plurality of files, the encrypted file being one of the plurality of files;
attaching an unencrypted security stub, at least partially composed of executable code, to the encrypted file;
locating the plurality of files in an accessible location;
generating a user-initiated request for a called file in response to an action taken by a user, the called file being one of the plurality of files;
translating the user request into a data processing system call;
receiving the data processing system call using a file management program, wherein the file management program exists in (a) an active state or (b) an inactive state, the file management program being a component of an operating system;
selectively accessing the called file from among the plurality of files utilizing the file management program, if the called file has the unencrypted security stub;
accessing the called file from among the plurality of files utilizing the file management program, if the called file does not have the unencrypted security stub;
processing the called file in accordance with the user-initiated request, to the extent the called file was accessed, wherein access by the user to the certain ones of the plurality of files is controlled by the unencrypted security stub.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus is provided in a data processing system for securing access to particular files which are stored in a computer-accessible memory media. A file management program is provided as an operating system component of the data processing system. At least one encrypted file and at least one unencrypted file are stored in the computer-accessible memory media. An unencrypted security stub is associated with each of the encrypted files. The security stub is at least partially composed of executable code. The file management program is utilized to monitor data processing calls for a called file stored in the computer-accessible memory media. The file management program determines what the called file has an associated unencrypted security stub. The called file is processed in a particular manner dependent upon whether or not the called file has an associated unencrypted security stub.
514 Citations
22 Claims
-
1. A method of allowing selective access to an encrypted file, comprising the method steps of:
-
providing a plurality of files, the encrypted file being one of the plurality of files; attaching an unencrypted security stub, at least partially composed of executable code, to the encrypted file; locating the plurality of files in an accessible location; generating a user-initiated request for a called file in response to an action taken by a user, the called file being one of the plurality of files; translating the user request into a data processing system call; receiving the data processing system call using a file management program, wherein the file management program exists in (a) an active state or (b) an inactive state, the file management program being a component of an operating system; selectively accessing the called file from among the plurality of files utilizing the file management program, if the called file has the unencrypted security stub; accessing the called file from among the plurality of files utilizing the file management program, if the called file does not have the unencrypted security stub; processing the called file in accordance with the user-initiated request, to the extent the called file was accessed, wherein access by the user to the certain ones of the plurality of files is controlled by the unencrypted security stub. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for allowing selective access to an encrypted file, comprising:
-
means for providing a plurality of files, the encrypted file being one of the plurality of files; means for attaching an unencrypted security stub, at least partially composed of executable code, to the encrypted file; means for locating the plurality of files in an accessible location; means for generating a user-initiated request for a called file in response to an action taken by a user, the called file being one of the plurality of files; means for translating the user request into a data processing system call; means for receiving the data processing system call using a file management program, wherein the file management program exists in (a) an active state or (b) an inactive state, the file management program being a component of an operating system; means for selectively accessing the called file from among the plurality of files utilizing the file management program, if the called file is has the unencrypted security stub; means for accessing the called file from among the plurality of files utilizing the file management program, if the called file does not have the unencrypted security stub; means for processing the called file in accordance with the user-initiated request, to the extent the called file was accessed, wherein access by the user to the certain ones of the plurality of files is controlled by the unencrypted security stub. - View Dependent Claims (13, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
14. An apparatus according to claim 38, wherein the file management program further includes:
means for analyzing the attached unencrypted security stub to obtain information for utilization in decryption operations.
Specification