Automatic file encryption
First Claim
1. A method for automatically encrypting files, the method comprising:
- by computer hardware comprising one or more processors;
detecting access to a first file, the first file stored in a primary storage system;
determining whether the access comprises a write access;
in response to determining that the access comprises a write access;
accessing file metadata associated with the first file;
accessing a set of encryption rules;
determining whether the file metadata satisfies the set of encryption rules; and
in response to determining that the file metadata satisfies the set of encryption rules;
identifying an application associated with the first file;
encrypting the first file to obtain a first encrypted file;
modifying an extension of the first encrypted file to include an encryption extension; and
associating the encrypted first file with the application, wherein associating the encrypted first file with the application enables the encrypted first file to be displayed with identification information associated with the application.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.
-
Citations
20 Claims
-
1. A method for automatically encrypting files, the method comprising:
-
by computer hardware comprising one or more processors; detecting access to a first file, the first file stored in a primary storage system; determining whether the access comprises a write access; in response to determining that the access comprises a write access; accessing file metadata associated with the first file; accessing a set of encryption rules; determining whether the file metadata satisfies the set of encryption rules; and in response to determining that the file metadata satisfies the set of encryption rules; identifying an application associated with the first file; encrypting the first file to obtain a first encrypted file; modifying an extension of the first encrypted file to include an encryption extension; and associating the encrypted first file with the application, wherein associating the encrypted first file with the application enables the encrypted first file to be displayed with identification information associated with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for automatically encrypting files, the system comprising:
-
a primary storage system configured to store a first file; a file monitor comprising computer hardware and configured to detect access to the first file and to determine whether the access comprises a write access; an encryption rules repository configured to store encryption rules; an encryption rules engine comprising computer hardware and configured to; access file metadata associated with the first file in response to the file monitor determining that the access comprises a write access; access a set of encryption rules from the encryption rules repository; and determine whether the file metadata satisfies the encryption rules; and an encryption module comprising computer hardware and configured to, in response to the encryption rules engine determining that the file metadata satisfies the encryption rules; identify an application associated with the first file; encrypt the first file to obtain a first encrypted file; modify an extension of the first encrypted file to include an encryption extension; and associate the encrypted first file with the application, wherein associating the encrypted first file with the application enables the encrypted first file to be displayed with identification information associated with the application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification