×

Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption

  • US 7,594,276 B2
  • Filed: 08/11/2003
  • Issued: 09/22/2009
  • Est. Priority Date: 03/24/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A machine system for protecting information from unauthorized access by way of unauthorized programs, said machine system comprising:

  • (a) data-providing means for providing data of an identified one of two or more digital data files, where each of said files is identifiable by a file name;

    (b) an interceptable access mechanism through which data of an identified file of the data-providing means is accessed by identifiable, requesting programs;

    (c) bubble-control means coupled to intercept data access attempts made through said interceptable access mechanism by said identifiable, requesting programs,(c.1) wherein the bubble-control means includes deny/approve means, which if active, is provided for testing all the intercepted data access attempts and responsively denying or approving data access to the data of a pre-classified subset of said files based on one or both of the identity of one or more access-attempting programs and the time of the access attempt, wherein at least one pre-classified subset of said files has plural files, wherein the deny/approve means further includes;

    list searching means for searching one or more bubble lists, where the bubble lists define a deny or approve decision based on the satisfaction of one or more pre-defined first conditions by the identities of one or more programs that caused the data access attempt and the satisfaction of one or more pre-defined second conditions by the identity of the requested data file,wherein the bubble lists include one or more linked trunk_lists, wherein each linked trunk_list has one or more target-query blocks and an end-of-trunk_list marker, wherein each target-query block includes a file-name definition and each target-query block is associated with a corresponding one or more causation-query blocks that each defines a respective query for a cause of the attempted access to the data of a requested data file, wherein each target-query block points to a corresponding causation-query branch list, wherein each causation-query branch list has one or more causation-query blocks and an end-of-branch list marker, wherein each causation-query block has a program-name definition and wherein the list searching means comprises;

    causation-query branch list following means for searching along one or more of the linked causation-query branch lists for a causation-query block having a program-name definition satisfied by the identities of the one or more programs that caused the data access attempt, and wherein the list searching means comprises;

    linked-trunk_list following means for searching along one or more of the linked trunk_lists for a target-query block having a file-name definition satisfied by the identity of the requested data file.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×