Adaptive transparent encryption

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S164000, C713S167000, C726S030000, C726S027000, C726S003000, C726S001000, C709S246000, C705S051000

Reexamination Certificate

active

07409547

ABSTRACT:
A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5666411 (1997-09-01), McCarty
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6510513 (2003-01-01), Danieli
patent: 6990513 (2006-01-01), Belfiore et al.
patent: 7100047 (2006-08-01), Stamos et al.
patent: 2001/0042043 (2001-11-01), Shear et al.
patent: 2002/0178271 (2002-11-01), Graham et al.
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0120935 (2003-06-01), Teal et al.
patent: 2003/0145235 (2003-07-01), Choo
patent: 2004/0054894 (2004-03-01), Lambert
patent: 2004/0255160 (2004-12-01), Stamos et al.
patent: 2005/0060537 (2005-03-01), Stamos et al.
Reid, Jason F., et al, ‘DRM, Trusted Computing and Operating System Architecture’, 2005, Information Security Research Centre, Queensland Univer. of Technology, entire document, ‘http://crpit.com/confpapers/CRPITV44Reid.pdf’.
Kirichenko, A., “F-Secure Kernel Mode Cryptographic Driver, FIPS 140-2 Validation Security Policy,” F-Secure Corp., Dec. 2001 entire document, cs-www.ncsi.nist.gov/cryptval/140-1/140sp/140sp237.pdf.
Reid, Jason F., et al., DRM, Trusted Computing and Operating System Architecture, 2005, Information Security Research Centre, Queensland Univer. of Technology, entire document, ‘http://crpit.com/confpapers/CRPITV44Reid.pdf’.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Adaptive transparent encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Adaptive transparent encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Adaptive transparent encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3993001

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.