Encryption techniques

Files on an endpoint are encrypted 1902 with a key and a file system is provided 1904 for accessing the plurality of encrypted files by one or more processes executing on the endpoint. The file system includes a file system extension that applies the key to decrypt a file in response to a file reque...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Harald Schutz, Russell Humphries, Anthony John Merry, Kenneth D Ray
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Files on an endpoint are encrypted 1902 with a key and a file system is provided 1904 for accessing the plurality of encrypted files by one or more processes executing on the endpoint. The file system includes a file system extension that applies the key to decrypt a file in response to a file request from the one or more processes. Access to the files by the processes is monitored 1906 and a rate of access to the files is limited (throttled) 1912 when a pattern of access is detected that indicates potential compromise 1908 by automated file access, such as access to a number of files beyond a threshold within a predetermined time interval. Other indications of potential compromise may be communication of files to a location remote from the endpoint, or the detection of a removable drive coupled to the endpoint. An exception to the indication may be provided for a trusted process 1910. Numerous other arrangements are disclosed including creating portable encrypted content, revoking keys if the security of an endpoint is compromised, attaching portable encrypted content to electronic mail messages, and monitoring the exposure state of a process on an endpoint to potentially unsafe content.