The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 22, 2021

Filed:

Jun. 18, 2019
Applicant:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Inventors:

Andrei Erofeev, Marlboro, NJ (US);

Rahul S. Pawar, Marlboro, NJ (US);

Assignee:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/62 (2013.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); G06F 21/60 (2013.01); G06F 11/14 (2006.01); G06F 21/70 (2013.01); G06F 21/78 (2013.01);
U.S. Cl.
CPC ...
G06F 21/6218 (2013.01); G06F 11/1402 (2013.01); G06F 11/1458 (2013.01); G06F 21/60 (2013.01); G06F 21/602 (2013.01); H04L 9/088 (2013.01); H04L 9/0822 (2013.01); H04L 9/0825 (2013.01); H04L 9/0891 (2013.01); H04L 9/0897 (2013.01); H04L 9/14 (2013.01); G06F 21/62 (2013.01); G06F 21/6209 (2013.01); G06F 21/70 (2013.01); G06F 21/78 (2013.01); G06F 2201/84 (2013.01); G06F 2221/2107 (2013.01);
Abstract

A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.


Find Patent Forward Citations

Loading…