×

Securing temporary data on untrusted devices

  • US 9,760,720 B2
  • Filed: 07/08/2016
  • Issued: 09/12/2017
  • Est. Priority Date: 07/10/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • intercepting a first command to open a data file from a software application;

    prior to opening the data file, copying the data file to a first partition;

    opening the copied data file on the first partition by the software application and not opening the data file;

    after opening the copied data file, intercepting a file command from the software application, the file command comprising a save command or a read command, and indicating a temporary data file, the temporary data file associated with the copied data file;

    determining whether the file command is directed to the temporary data file;

    responsive to determining the file command is directed to the temporary data file;

    if the file command is a save command, encrypting data associated with the save command and writing the encrypted data to the temporary data file, andif the file command is a read command, decrypting data associated with the read command and providing the decrypted data to the software application; and

    in response to intercepting a command to close the copied data file from the software application;

    closing the copied data file;

    replacing the data file with the copied data file; and

    deleting the copied data file on the first partition and the temporary data file.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×