Method for secure and private computer file
First Claim
Patent Images
1. A method for secure and private computer file information protection, comprising:
- receiving a protection request on a file protection coder application in a non-statutory computer readable medium on a network device with one or more processors to protect a computer file on the network device;
receiving on the file protection coder application a set of file protection parameters to protect the computer file including a file creation time, a file current source location, a file intended location and a file life span,wherein each file protection parameter includes one or more specific actions to complete when any of the set of file protection parameters is violated andwherein the one or more specific actions include, close file, lock file, delete file and track and report a new file location;
receiving on the file protection coder application location information for the computer file,wherein the location information includes a current location of the computer file and an intended location for the computer file on a communications network;
validating on the file protection code application with the received location information a current location or intended location for the computer file;
sending from the file protection coder application to a file translator application the received file protection parameters and the validated received location information,wherein the file translator application inserts the received file protection parameters and the validated received location information into a private file data structure with a pre-determined layout, attaches the private file data structure to the computer file and compiles the computer file with the attached private data structure into a private executable and secure computer file,wherein the original file has been transformed into a private executable and secure computer file that is self-managing with the received file protection parameters and the validated received location information, andwherein the complied private executable and secure computer file includes a binary format comprising an object code or byte code format; and
receiving on the file protection coder application from the file translator application the private executable and secure computer file, wherein the private executable and secure computer file is accessible on the network device via the communications network by other network devices.
0 Assignments
0 Petitions
Accused Products
Abstract
A method to guard the integrity of information after transferred over Internet and stored on to other computing devices. The method takes a target computer file that requires the protection then adds and/or binds security and privacy protection parameters through a file transfer process which converts the computer file to a self-manageable secured private executable file.
-
Citations
18 Claims
-
1. A method for secure and private computer file information protection, comprising:
-
receiving a protection request on a file protection coder application in a non-statutory computer readable medium on a network device with one or more processors to protect a computer file on the network device; receiving on the file protection coder application a set of file protection parameters to protect the computer file including a file creation time, a file current source location, a file intended location and a file life span, wherein each file protection parameter includes one or more specific actions to complete when any of the set of file protection parameters is violated and wherein the one or more specific actions include, close file, lock file, delete file and track and report a new file location; receiving on the file protection coder application location information for the computer file, wherein the location information includes a current location of the computer file and an intended location for the computer file on a communications network; validating on the file protection code application with the received location information a current location or intended location for the computer file; sending from the file protection coder application to a file translator application the received file protection parameters and the validated received location information, wherein the file translator application inserts the received file protection parameters and the validated received location information into a private file data structure with a pre-determined layout, attaches the private file data structure to the computer file and compiles the computer file with the attached private data structure into a private executable and secure computer file, wherein the original file has been transformed into a private executable and secure computer file that is self-managing with the received file protection parameters and the validated received location information, and wherein the complied private executable and secure computer file includes a binary format comprising an object code or byte code format; and receiving on the file protection coder application from the file translator application the private executable and secure computer file, wherein the private executable and secure computer file is accessible on the network device via the communications network by other network devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for secure and private computer file information protection, comprising in combination:
-
a file protection coder application in a non-statutory computer readable medium on a network device with one or more processors; a file translator application in the non-statutory computer readable medium on the network device; and a file protection decoder application in the non-statutory computer readable medium on the network device; the file protection coder application, the file protection decoder application and the file protection decoder application including a plurality of instructions for causing the one or more processors on the network device to execute the steps of; receiving a protection request on a file protection coder application in a non-statutory computer readable medium on a network device with one or more processors to protect a computer file on the network device; receiving on the file protection coder application a set of file protection parameters to protect the computer file including a file creation time, a file current source location, a file intended location and a file life span, wherein each file protection parameter includes one or more specific actions to complete when any of the set of file protection parameters is violated and wherein the one or more specific actions include, close file, lock file, delete file and track and report a new file location; receiving on the file protection coder application location information for the computer file, wherein the location information includes a current location of the computer file and an intended location for the computer file on a communications network; validating on the file protection code application with the received location information a current location or intended location for the computer file; sending from the file protection coder application to a file translator application the received file protection parameters and the validated received location information, wherein the file translator application inserts the received file protection parameters and the validated received location information into a private file data structure with a pre-determined layout, attaches the private file data structure to the computer file and compiles the computer file with the attached private data structure into a private executable and secure computer file, wherein the original file has been transformed into a private executable and secure computer file that is self-managing with the received file protection parameters and the validated received location information, and wherein the complied private executable and secure computer file includes a binary format comprising an object code or byte code format; receiving on the file protection coder application from the file translator application the private executable and secure computer file, wherein the private executable and secure computer file is accessible on the network device via the communications network by other network devices; receiving an access request on a file protection decoder application in the non-statutory computer readable medium on the network device to access the private executable and secure computer file on the network device; executing from file protection decoder application the private executable and secure computer file; and determining on the file protection decoder application whether required resources on the network device are available to access the access the private executable and secure computer file on the network device, and if so, determining on the file protection decoder application with the private file data structure attached to the computer file in the private executable and secure computer file on the network device, whether any of the file protection parameters have been violated, and if so, completing from the file protection decoder application one or more of the specific actions included in the private file data structure attached to the computer file for any of the violated file protection parameters, and denying access from the file protection decoder application to the original file included the private executable and secure computer file on the network device, and if not, allowing access from the file protection decoder application to the original file included the private executable and secure computer file on the network device.
-
Specification