System and method for restricting access to secured data
First Claim
1. A method of restricting access to secured data on a computer system comprising:
- intercepting a file system operation seeking access to secured data; and
determining if the intercepted file system operation originated from an application program comprising executable program code stored within the secured data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for restricting the use of secure data on a computer system are provided. An interception program may be added as part of an interface program. The interception program may control access to the content of storage media such as an extension to the file system program of the operating system of the computer system. The secured data may be encrypted, and requested data may be decrypted by the interception program before it is returned. If the intercepted file system access operation is to open the secured data, but does not originate from an application program including executable program code stored within the secured data, the file system access operation may fail. In addition, an error message may be displayed implying that the user does not have sufficient privilege to access the requested data.
73 Citations
56 Claims
-
1. A method of restricting access to secured data on a computer system comprising:
-
intercepting a file system operation seeking access to secured data; and
determining if the intercepted file system operation originated from an application program comprising executable program code stored within the secured data.
-
-
2. A method, comprising:
-
providing a set of files identified as secured data;
providing an interception program coupled to an operating system of the computer system, wherein the interception program is configured to control access to a memory medium containing the secured data; and
intercepting file system operations with the interception program. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system configured to restrict access to secured data on a computer system, comprising:
-
a CPU; and
a system memory coupled to the CPU, wherein the system memory stores one or more computer programs executable by the CPU;
wherein one or more computer programs are executable to;
intercept a file system operation seeking access to secured data; and
determine if the intercepted file system operation originated from an application program comprising executable program code stored within the secured data.
-
-
21. A system configured to restrict access to secured data on a computer system, comprising:
-
a CPU; and
a system memory coupled to the CPU, wherein the system memory stores one or more computer programs executable by the CPU;
wherein one or more computer programs are executable to;
identify a set of files as secured data;
intercept file system access operations with an interception program, wherein the interception program is coupled to an operating system of the computer system, and wherein the interception program controls access to a memory medium containing the secured data. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A carrier medium configured to store program instructions, wherein the program instructions are executable to implement a method, comprising:
-
intercepting a file system operation seeking access to secured data; and
determining if the intercepted file system operation originated from an application program comprising executable program code stored within the secured data.
-
-
40. A carrier medium configured to store program instructions, wherein the program instructions are executable to implement a method, comprising:
-
providing a set of files identified as secured data;
providing an interception program coupled to an operating system of the computer system, wherein the interception program is configured to control access to a memory medium containing the secured data; and
intercepting file system operations with the interception program. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification