SYSTEM AND METHOD OF ENCODING FILES FROM ENCRYPTED DRIVE Russian patent published in 2015 - IPC G06F21/00 

Abstract RU 2559728 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to protection of computing devices, data and end user programs from unauthorised access. According to a version of implementation, a file encryption method is used when copying from an encrypted drive, method including: intercepting, by intercepting means, the file copying operation between a first and a second drive, wherein the first drive is encrypted using full disk encryption technology, the second drive contains at least one encrypted file; determining, by the intercepting means, the encryption policy for said file, wherein the encryption policy determines at least one rule, according to which: the file is copied in encrypted form; the file is copied in decrypted form; file copying is prohibited; encryption means apply a certain encryption policy when copying the file.

EFFECT: improved protection of information from unauthorised access by using an encryption policy when copying files.

17 cl, 3 dwg, 1 tbl

Similar patents RU2559728C2

Title Year Author Number
SYSTEM AND METHOD OF PROVIDING APPLICATION ACCESS RIGHTS TO COMPUTER FILES 2013
  • Makarov Aleksandr Nikolaevich
  • Kirikova Evgenija Pavlovna
  • Vojtov Nikita Mikhajlovich
  • Shijafetdinov Damir Rafekovich
  • Ovcharik Vladislav Ivanovich
RU2546585C2
SYSTEM AND METHOD FOR APPLYING FILE ACCESS RULES DURING TRANSFER THEREOF BETWEEN COMPUTERS 2013
  • Makarov Aleksandr Nikolaevich
  • Strogov Vladimir Vladimirovich
  • Kirikova Evgenija Pavlovna
RU2573785C2
SYSTEM AND METHOD OF FULL DISK CODING WITH CHECK OF LOADING DISK COMPATIBILITY 2014
  • Jakovlev Evgenij Anatol'Evich
RU2571724C2
SYSTEM AND METHOD OF USING SECURITY POLICY TO STORAGE IN NETWORK 2014
  • Zajtsev Oleg Vladimirovich
RU2581559C2
METHOD OF DETERMINING MASK OF ENCRYPTED REGION OF DISC 2014
  • Kazarkin Lev Aleksandrovich
RU2580018C2
FULL-DISK ENCRYPTION MODULE UPDATE INSTALLATION METHOD 2015
  • Alekseev Vitalij Sergeevich
  • Bavykin Dmitrij Valentinovich
  • Fedorov Aleksandr Vladimirovich
  • Glejzerman Evgenij Aleksandrovich
  • Ilyushin Aleksej Vladislavovich
  • Kazarkin Lev Aleksandrovich
  • Kirikova Evgeniya Pavlovna
  • Kutumov Aleksej Alekseevich
  • Molaev Gleb Yurevich
  • Tereshchenko Ilya Anatolevich
  • Yakovlev Evgenij Anatolevich
RU2623887C2
SYSTEM AND METHOD FOR CHANGING MASK OF ENCRYPTED REGION DURING BREAKDOWN IN COMPUTER SYSTEM 2014
  • Kazarkin Lev Aleksandrovich
RU2580014C2
SYSTEM AND METHOD OF AUTOMATIC DEPLOYMENT OF THE ENCRYPTION SYSTEM FOR USERS WHO PREVIOUSLY WORKED ON PC 2013
  • Shiyafetdinov Damir Rafekovich
  • Makarov Aleksandr Nikolaevich
  • Kirikova Evgeniya Pavlovna
  • Ovcharik Vladislav Ivanovich
  • Kamanin Konstantin Vladimirovich
RU2618684C2
SYSTEM AND METHOD OF OPENING FILES CREATED BY VULNERABLE APPLICATIONS 2015
  • Efremov Andrej Anatolevich
  • Ladikov Andrej Vladimirovich
  • Solodovnikov Andrej Yurevich
  • Monastyrskij Aleksej Vladimirovich
RU2606883C2
SYSTEM AND METHOD OF MODIFIED DATA RECOVERY 2015
  • Parshin Yurij Gennadevich
  • Romanenko Aleksandr Aleksandrovich
  • Slobodyanyuk Yurij Gennadevich
RU2622630C2

RU 2 559 728 C2

Authors

Kirikova Evgenija Pavlovna

Makarov Aleksandr Nikolaevich

Shijafetdinov Damir Rafekovich

Dates

2015-08-10Published

2013-10-24Filed