Method and system for protecting the security of an open file in a computing environment
First Claim
1. A file security protection method, said method comprising:
- a processor of a computer system receiving a metadata token from a software application executing on the computer system, said metadata token denoting that the application has opened a file having a name, said metadata token comprising the name of the file;
responsive to receiving the metadata token, said processor setting an initial time to a time at which said receiving the metadata token occurred; and
after setting the initial time, said processor executing iterations of a loop, each iteration of said iterations comprising determining whether a first condition has been satisfied, determining whether a second condition has been satisfied, and exiting the loop in response to having determined that the first condition or the second condition has been satisfied,wherein the first condition is that an elapsed time relative the initial time exceeds a specified threshold, andwherein the second condition is that a closeout token denoting that the file has been closed has been received from the application such that the closeout token comprises the name of the file.
2 Assignments
0 Petitions
Accused Products
Abstract
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
14 Citations
40 Claims
-
1. A file security protection method, said method comprising:
-
a processor of a computer system receiving a metadata token from a software application executing on the computer system, said metadata token denoting that the application has opened a file having a name, said metadata token comprising the name of the file; responsive to receiving the metadata token, said processor setting an initial time to a time at which said receiving the metadata token occurred; and after setting the initial time, said processor executing iterations of a loop, each iteration of said iterations comprising determining whether a first condition has been satisfied, determining whether a second condition has been satisfied, and exiting the loop in response to having determined that the first condition or the second condition has been satisfied, wherein the first condition is that an elapsed time relative the initial time exceeds a specified threshold, and wherein the second condition is that a closeout token denoting that the file has been closed has been received from the application such that the closeout token comprises the name of the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A process for supporting computer infrastructure, said process comprising:
-
providing at least one support service for at least one of creating, integrating, hosting, maintaining, and deploying computer-readable code in a computer system, wherein the code in combination with the computer system is capable of performing a file security protection method, said method comprising; a processor of the computer system receiving a metadata token from a software application executing on the computer system, said metadata token denoting that the application has opened a file having a name, said metadata token comprising the name of the file; responsive to receiving the metadata token, said processor setting an initial time to a time at which said receiving the metadata token occurred; and after setting the initial time, said processor executing iterations of a loop, each iteration of said iterations comprising determining whether a first condition has been satisfied, determining whether a second condition has been satisfied, and exiting the loop in response to having determined that the first condition or the second condition has been satisfied, wherein the first condition is that an elapsed time relative the initial time exceeds a specified threshold, and wherein the second condition is that a closeout token denoting that the file has been closed has been received from the application such that the closeout token comprises the name of the file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product, comprising a non-transitory computer readable storage medium having a computer readable program code stored therein, said computer readable program code containing instructions that when executed by a processor of a computer system implement a file security protection method, said method comprising:
-
receiving a metadata token from a software application executing on the computer system, said metadata token denoting that the application has opened a file having a name, said metadata token comprising the name of the file; responsive to receiving the metadata token, setting an initial time to a time at which said receiving the metadata token occurred; and after setting the initial time, executing iterations of a loop, each iteration of said iterations comprising determining whether a first condition has been satisfied, determining whether a second condition has been satisfied, and exiting the loop in response to having determined that the first condition or the second condition has been satisfied, wherein the first condition is that an elapsed time relative the initial time exceeds a specified threshold, and wherein the second condition is that a closeout token denoting that the file has been closed has been received from the application such that the closeout token comprises the name of the file. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer system comprising a processor and a computer readable memory device coupled to the processor, said memory device containing instructions that when executed by the processor implement a file security protection method, said method comprising:
-
receiving a metadata token from a software application executing on the computer system, said metadata token denoting that the application has opened a file having a name, said metadata token comprising the name of the file; responsive to receiving the metadata token, setting an initial time to a time at which said receiving the metadata token occurred; and after setting the initial time, executing iterations of a loop, each iteration of said iterations comprising determining whether a first condition has been satisfied, determining whether a second condition has been satisfied, and exiting the loop in response to having determined that the first condition or the second condition has been satisfied, wherein the first condition is that an elapsed time relative the initial time exceeds a specified threshold, and wherein the second condition is that a closeout token denoting that the file has been closed has been received from the application such that the closeout token comprises the name of the file. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification