Protection against unintentional file changing
First Claim
Patent Images
1. A method, comprising:
- defining a file association between a kind of file on an operating system, and a first program which normally opens said file, and where said file association is stored in a list that defines which program normally opens said file;
detecting an operation whereby another file attempts to change said file association such that after said change, said file association would specify a different program, other than said first program would open said file;
providing a recommendation to a user of whether the user should change said file association to specify that said different program to open said file.
0 Assignments
0 Petitions
Accused Products
Abstract
Files are protected against intrusion by badly behaving programs. An embodiment may define a file association between a kind of file on an operating system, and a program which normally opens that kind of file. An operation is detected whereby another file attempts to change the file association. When that happens, a recommendation is provided to a user of whether the user should change the file association and allow said different program to open the file. One embodiment may determine if there is another program which is masquerading as said file-associated program and prevent the masquerading program from opening the file.
19 Citations
14 Claims
-
1. A method, comprising:
-
defining a file association between a kind of file on an operating system, and a first program which normally opens said file, and where said file association is stored in a list that defines which program normally opens said file; detecting an operation whereby another file attempts to change said file association such that after said change, said file association would specify a different program, other than said first program would open said file; providing a recommendation to a user of whether the user should change said file association to specify that said different program to open said file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
defining an association between a file on a computer, and a file-associated program that is normally used to open the file; using an operating system running on the computer, and detecting whether a program that is attempting to open said file is actually said file-associated program, or is another program which is masquerading as said file-associated program; allowing the file associated program to open the file; and preventing the masquerading program from opening the file. - View Dependent Claims (10, 11)
-
-
12. A method, comprising:
-
in an operating system, monitoring access to files by a first program; in said operating system, designating a first set of files as being individual to a specific user of said first program; encrypting and decrypting said first set of programs in order to allow use of said first set of programs, said monitoring operating for determining if said first program is attempting to obtain access to another file which has not been encrypted by said encrypting and is an unencrypted file, and where said another file is a file other than said first set of files; and requesting a confirmation from a user of the computer prior to allowing said first program to obtain said access to said another file that is not specific to the specific user. - View Dependent Claims (13, 14)
-
Specification