Method, system, and program for encrypting files in a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C380S044000

Reexamination Certificate

active

06941456

ABSTRACT:
Provided is a method, system, and program for encrypting files in a computer in communication with a volatile memory and non-volatile storage device. An encryption code is generated to encrypt a file and a decryption code is generated to decrypt one file encrypted with the encryption code. The decryption code is loaded into the volatile memory, wherein the decryption code is erased from the volatile memory when the computer reboots. Files written to the non-volatile storage device are encrypted using the encryption code and the decryption code in the non-volatile memory is used to decrypt files encrypted with the encryption code to transfer from the non-volatile storage device to the volatile memory.

REFERENCES:
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5293424 (1994-03-01), Holtey et al.
patent: 5388157 (1995-02-01), Austin
patent: 5412721 (1995-05-01), Rager et al.
patent: 5552776 (1996-09-01), Wade et al.
patent: 5954817 (1999-09-01), Janssen et al.
patent: 6061794 (2000-05-01), Angelo et al.
patent: 6694430 (2004-02-01), Zegelin et al.
patent: 2276965 (1994-12-01), None
Microsoft Corp., “Encrypting File System for Windows 2000,” pp. 1-28. Copyright 1998 Microsoft Corp.
Engelfriet, A. “Security: Filing Wiping”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from: http://www.stack.nl/˜galactus/remailers/index-wipe.html.
New Technologies, Inc. “Sensitive Data Identification and Elimination Guidelines”. [online] [Retrieved Mar. 24, 2001]. Retrieved from http://www.forensics-intl.com.
Thompson, S. “Windows 95 and the Swap File Controversy: A Lazy Man's Dream”. [online] [Retrieved Mar. 24, 2001]. Retrieved from http://www.aserve.net/faq/win_95_swap.html.
Adams, L. “Security software . . . ” [online] [Retrieved Mar. 24, 2001]. Can be currently found at http://www.light1998.com/CounterSpy/fs010.html.
New Technologies, Inc. “Windows Swap File Defined” [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.forensics-intl.com/def7.html.
ZD, Inc. “Swap File Overwriter”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from www.zdnet.com.
Mauro, J. “Swap Space Implementation, part one”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.unixinsider.com/swol-12-1997/swol-12-insidesolaris.html.
Mauro, J. “Swap Space Implementation, part one”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.unixinsider.com/swol-01-1998/swol-01-insidesolaris.html.
“Wiping Swap Files”. [online] [Retrieved Mar. 24, 2001] Retrieved from http://security.tao.ca/wipeswap.shtml.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system, and program for encrypting files in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system, and program for encrypting files in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, and program for encrypting files in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3438388

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.