Automatic file encryption
First Claim
1. A method for displaying encrypted files, the method comprising:
- by a computer system comprising one or more hardware processors and a storage;
accessing an encrypted file, the encrypted file an encrypted version of an unencrypted file, the unencrypted file having an extension that is different than an extension of the encrypted file;
accessing metadata associated with the encrypted file;
determining a file type of the unencrypted file based, at least in part, on the metadata;
determining an application associated with the unencrypted file, wherein the application is not installed on the storage of the computer system and the application is capable of processing the unencrypted file;
associating the encrypted file with the application to maintain an association between the encrypted file and the application;
determining a role of a user accessing the encrypted file; and
outputting for display a reference to the encrypted file based, at least in part, on the file type and the role of the user, wherein the reference to the encrypted file is configured to mimic, at least in part, the extension of the unencrypted file when the role of the user comprises a first role, and wherein the reference to the encrypted file includes an encryption extension when the role of the user comprises a second role.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.
277 Citations
20 Claims
-
1. A method for displaying encrypted files, the method comprising:
by a computer system comprising one or more hardware processors and a storage; accessing an encrypted file, the encrypted file an encrypted version of an unencrypted file, the unencrypted file having an extension that is different than an extension of the encrypted file; accessing metadata associated with the encrypted file; determining a file type of the unencrypted file based, at least in part, on the metadata; determining an application associated with the unencrypted file, wherein the application is not installed on the storage of the computer system and the application is capable of processing the unencrypted file; associating the encrypted file with the application to maintain an association between the encrypted file and the application; determining a role of a user accessing the encrypted file; and outputting for display a reference to the encrypted file based, at least in part, on the file type and the role of the user, wherein the reference to the encrypted file is configured to mimic, at least in part, the extension of the unencrypted file when the role of the user comprises a first role, and wherein the reference to the encrypted file includes an encryption extension when the role of the user comprises a second role. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for displaying encrypted files, the method comprising:
by a computer system comprising one or more hardware processors and a storage; accessing an encrypted file, the encrypted file an encrypted version of a file; determining a file type of the file, wherein the storage of the computer system does not include an application programmed to access the file; associating the encrypted file with the application to maintain an association between the encrypted file and the application programmed to access the file; determining a role of a user accessing the encrypted file; and outputting for display a reference to the encrypted file based, at least in part, on the file type and the role of the user, wherein the reference to the encrypted file is configured to mimic, at least in part, a reference to the file when the role of the user comprises a first role, and wherein the reference to the encrypted file includes an encryption extension when the role of the user comprises a second role. - View Dependent Claims (10, 11, 12, 13)
-
14. A system for displaying encrypted files, the system comprising:
-
a display screen configured to output a user interface; an interface agent comprising computer hardware that includes one or more processors programmed to; access an encrypted file, the encrypted file an encrypted version of a file, the file having an extension that is different than an extension of the encrypted file; access metadata associated with the encrypted file; determine a file type of the file based, at least in part, on the metadata; determine an application associated with the file, wherein the application is not installed on a storage of the system and the application is capable of processing the file; associate the encrypted file with the application to maintain an association between the encrypted file and the application; determine a role of a user accessing the encrypted file; and output for display on the display screen a reference to the encrypted file based, at least in part, on the file type and the role of the user, the reference to the encrypted file configured to mimic, at least in part, a reference to the file when the role of the user comprises a first role, and the reference to the encrypted file including an encryption extension when the role of the user comprises a second role. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification