×

Systems and methods for a cryptographic file system layer

  • US 9,881,177 B2
  • Filed: 02/13/2014
  • Issued: 01/30/2018
  • Est. Priority Date: 02/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving using a programmed hardware processor an identification of a designated directory location, wherein the designated directory location is selected from a plurality of directory locations on a computer system, and wherein the identification indicates that the designated directory location is usable to secure one or more data files;

    in response to receiving the identification, beginning a process to modify one or more data files in the designated directory location by performing an operation to secure the one or more data files;

    monitoring a communication interface between an application layer and a file system layer of the computer system to detect a data access request associated with the designated directory location; and

    in response to detecting that the data access request is associated with the designated directory location, (1) pausing the process to modify the one or more data files in the designated directory location, (2) intercepting the data access request, wherein the intercepting is transparent to a user of the computer system, (3) retrieving a data file associated with the data access request, (4) modifying the data file by performing a cryptographic operation on the data file to obtain a modified data file, (5) generating a modified data access request including an identifier associated with the modified data file (6) sending the modified data access request to the file system layer or the application layer, and (7) in response to sending the modified data access request, resuming the process to modify the one or more data files in the designated directory location.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×