Claims
- 1. A method in a data processing system of securing access to particular files which are stored in a computer-accessible memory media, comprising the method steps of:
- providing a file management program as an operating system component of said data processing system;
- storing a plurality of files including at least one encrypted file and at least one unencrypted file in said computer-accessible memory media;
- for each of said at least one encrypted file:
- (a) recording in said computer-accessible memory media a preselected portion of said at least one encrypted file;
- (b) generating a decryption block which includes information which can be utilized to decrypt said at least one encrypted file;
- (c) inserting said decryption block in said at least one encrypted file in the place of said preselected portion;
- utilizing said file management program to (a) monitor data processing system calls for a called file stored in said computer-accessible memory media, and (b) determine whether said called file has an inserted decryption block, and (c) process said called file in one manner if said called file has an inserted decryption block, and process said called file in a different manner if said called file does not have an inserted decryption block.
- 2. A method according to claim 1:
- wherein each of said at least one encrypted file has a particular file size;
- wherein insertion of said decryption block does not change said particular file size for each of said at least one encrypted file.
- 3. A method according to claim 1, further comprising:
- inserting said preselected portion in said at least one encrypted file in the place of said decryption block following expiration of a specific interval, wherein said interval defines a customer trial period; and
- decrypting said at least one encrypted file.
- 4. A method according to claim 1, wherein said step of generating a decryption block comprises:
- combining (a) a unique identifier for each of said at least one encrypted file, with at least (b) an address to said preselected portion for each of said at least one encrypted file.
- 5. A method according to claim 1, wherein said step of generating a decryption block comprises:
- combining (a) a unique identifier for each of said at least one encrypted file, with at least (b) a name for a key file which contains decryption keys for each of said at least one encrypted file.
- 6. A method according to claim 1, wherein said step of generating a decryption block comprises:
- combining (a) a unique identifier for each of said at least one encrypted file, with at least (b) a validation segment comprising an encrypted segment of each of said at least one encrypted file.
- 7. A method according to claim 1, wherein said step of generating a decryption block comprises:
- combining (a) a unique identifier for each of said at least one encrypted file, with at least (b) an identifier of which particular one of a plurality of available encryption operations has been utilized to encrypt said at least one encrypted file.
- 8. A method according to claim 1, wherein said step of utilizing said file management program to process said called file comprises intercepting said called file and at least one of:
- (a) utilizing said decryption block to retrieve a name for a key file and reading a key for said called file;
- (b) decrypting a validation segment of said decryption block, and comparing said decrypted validation segment to a selected segment of said called file, and continuing operations only if said decrypted validation segment matches said selected segment; and
- (c) decrypting said called file at the same time as it is passed for further processing.
CROSS-REFERENCE TO RELATED APPLICATION
The present application is related to U.S. patent application Ser. No. 08/235,033, entitled "Method and Apparatus for Enabling Trial Period Use of Software Products: Method and Apparatus for Utilizing a Decryption Stub," further identified by Attorney Docket No. BT9-93-070; U.S. patent application Ser. No. 08/235,035, entitled "Method and Apparatus for Enabling Trial Period Use of Software Products: Method and Apparatus for Allowing a Try-and-Buy User Interaction," further identified by Attorney Docket No. DA9-94-008; U.S. patent application Ser. No. 08/235,032, entitled "Method and Apparatus for Enabling Trail Period Use of Software Products: Method and Apparatus for Generating a Machine-Dependent Identification," further identified by Attorney Docket No. DA9-94-009; and U.S. patent application Ser. No. 08/235,418, entitled "Method and Apparatus for Enabling Trial Period Use of Software Products: Method and Apparatus for Allowing the Distribution of Software Objects," further identified by Attorney Docket No. DA9-94-011, all filed on Apr. 25, 1994 by the inventors hereof and assigned to the assignee herein, and incorporated by reference herein.
US Referenced Citations (6)
Foreign Referenced Citations (1)
Number |
Date |
Country |
0268139A2 |
May 1988 |
EPX |