Protection against unintentional file changing
First Claim
Patent Images
1. A method, comprising:
- Defining security levels for each file stored on a computer;
setting a restricted first group of files on a computer to have a first file security level that prevents access to the file without special permission;
Encrypting said first group of files using a cryptographic encryption key, and storing encrypted files representing the restricted first group of files, whereby all files with the first file security level are encrypted to prevent said access;
Setting a second file security level for a second group of files, whereby the second group of files is stored unencrypted; and
Providing a decryption key to provide access to said restricted first group of files only when access to the files is requested, and a specified first access condition is met.
0 Assignments
0 Petitions
Accused Products
Abstract
Files are protected against intrusion. A first embodiment protects certain files against changes. A second embodiment encrypts the files that are stored using user'"'"'s personal information.
17 Citations
17 Claims
-
1. A method, comprising:
-
Defining security levels for each file stored on a computer; setting a restricted first group of files on a computer to have a first file security level that prevents access to the file without special permission; Encrypting said first group of files using a cryptographic encryption key, and storing encrypted files representing the restricted first group of files, whereby all files with the first file security level are encrypted to prevent said access; Setting a second file security level for a second group of files, whereby the second group of files is stored unencrypted; and Providing a decryption key to provide access to said restricted first group of files only when access to the files is requested, and a specified first access condition is met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
Defining a security level for each file stored in a computer; identifying a first user; using an operating system associated program of a computer to designate a first plurality of files in a computer, as being associated with said first user and having a first security level which only allows the files to be stored in an encrypted form, and to encrypt said first plurality of files using a first encryption key that is associated with said first user; responsive to said identifying, using said operating system associated program in said computer to allow said first user to make any changes to any of said first plurality of files using a decryption key corresponding to said first encryption key associated with said first user, and to prevent reading contents of said first plurality of files when said first user is not identified; identifying a second user; using said operating system associated program of a computer to designate a second plurality of files in a computer, as being associated with said second user and having said first security level which only allows the files to be stored in an encrypted form, and to encrypt said second plurality of files using a second encryption key that is associated with said second user; responsive to said identifying, using said operating system associated program in said computer to allow said second user to make any changes to any of said second plurality of files using a second decryption key corresponding to said second encryption key associated with said first user and to prevent reading contents of said first plurality of read/write files when said second user is not identified; using said operating system associated program in said computer to set other files to a second security level that allows said other files to be stored unencrypted, and to allow said other files on said system to be read without identifying said first and second user; and responsive to an action on at least one first file, allowing said at least one first file to be converted from said first security level to said second security level. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification