Abstract: FILE DEFENDER – A FILE PROTECTION TOOL The present invention File Defender is a groundbreaking invention in the digital security realm, offering a comprehensive system for file protection and malware detection. In the current digital era, data security is of utmost concern due to increased cyber threats. This invention addresses these pressing challenges by providing an intuitive user interface for file encryption, decryption, and malware scanning. The system utilizes advanced AES-256 encryption and password-based security, ensuring robust protection of sensitive files from unauthorized access. Its malware scanning module employs Yara 4-based rules and known virus signatures-based techniques, effectively detecting potential threats. "File Defender" caters to both novice and experienced users, exemplifying user-friendliness and high performance. Furthermore, this invention promotes collaboration and knowledge-sharing within the cybersecurity community. "File Defender" represents a significant advancement in cybersecurity, enhancing data security and safeguarding confidential information in the digital age.
Description:FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. Title of the invention: “ File Defender – A File Protection Tool”
2. Applicant:
NAME NATIONALITY ADDRESS
Marwadi University Indian Marwadi University, Rajkot-Morbi Road At & PO: Gauridad, Rajkot 360 003 Gujarat, India
Email:
sridaran.rajagopal@marwadieducation.edu.in
shreedattalawconsultancy@gmail.com
Chothani18preeti@gmail.com
(M) +91 8238022850
Dr. R. Sridaran Indian
Henry Ndolleh Alpha Liberian
Boukary Kabore Burkinabe
Dr. Pankaj Mudholkar Indian
3. Preamble to the description
COMPLETE SPECIFICATION
The following specification particularly describes the invention and the manner in which it is to be performed:
Field of the Invention:
The present invention pertains to the field of cybersecurity and data protection software. More specifically, the present invention is addressing the challenges posed by the digital era's increasing cyber threats. The present invention, "File Defender," encompasses a comprehensive system that focuses on securing files and sensitive data from unauthorized access and malware infections.
Background of the Invention:
In the modern digital era, the integration of computers and the internet has transformed the way we interact with information and services, making daily life more convenient than ever before. This technological progress has undeniably enriched our lives, but it has also brought forth a new set of challenges concerning data security and privacy. With the widespread use of digital platforms, the risk of data breaches and unauthorized access to sensitive information has grown exponentially.
The threat landscape of today's digital world is fraught with the potential for severe consequences, both for individuals and organizations. Cybercriminals continually devise new and sophisticated methods to breach security measures and gain access to valuable data. Such attacks can lead to severe financial losses, reputational damage, and even legal repercussions. Cybersecurity has emerged as a critical issue, demanding immediate attention due to the escalating frequency and sophistication of cyber-attacks. The pressing need to protect personal and organizational data from unauthorized access and malicious intrusions has never been more evident. Amidst these challenges, the concept of cybersecurity has risen to the forefront, focusing on safeguarding information and data integrity.
In response to these challenges, the present invention of "File Defender" comes as a powerful solution designed to safeguard files against a myriad of security threats. This innovative software tool combines multiple cutting-edge features, including robust encryption and decryption capabilities, comprehensive malware scanning, and an intuitive graphical user interface (GUI). The primary objective of "File Defender" is to provide users with a secure environment to store and transfer sensitive data, while simultaneously minimizing the risk of data breaches and cyber-attacks.
Overall, the invention of "File Defender" comes as a timely and essential response to the growing challenges of data security in the digital age. It aligns with the increasing need for user-friendly yet robust cybersecurity solutions, positioning itself as a valuable tool for individuals and organizations seeking to fortify their digital assets against potential security breaches and cyber-attacks.
Object of the Invention:
Main objective of the present invention is to provide users with a robust and reliable file protection tool.
Another objective of the present invention is to develop a file security tool that can protect users' data from malware attacks and unauthorized access.
Yet another objective of the present invention is to develop a tool which provides a convenient graphical interface for users to encrypt and decrypt their files, as well as scan them for malware detection purposes.
Yet another objective of the present invention is to develop a tool which has the ability to detect and remove malware from the user's system.
Yet another objective of the present invention is to investigate the effectiveness of the tool in terms of its security capabilities and usability for non-technical users.
Yet another objective of the present invention is to raise awareness and encourage users to prioritize data security in their digital endeavors.
Summary of the Invention:
The present invention describes File Defender, an innovative and comprehensive system designed to address data security concerns in the digital era. With the increasing use of computers and the internet, protecting sensitive information from unauthorized access and malware threats has become crucial. The invention presents a user-friendly interface for file encryption, decryption, and malware scanning.
Using advanced AES-256 encryption and password-based security, the system ensures robust protection of files, safeguarding them from potential breaches. The malware scanning module employs Yara 4-based rules and known virus signatures-based techniques, effectively detecting and combating malware threats. File Defender stands out for its versatile compatibility with various file formats and hardware configurations, making it easily accessible to a wide range of users. The system's focus on performance enables efficient handling of large files and quick processing, enhancing overall productivity.
The present invetion highlights the software requirements, programming language, and tools used in developing File Defender. It emphasizes the invention's advantages, including enhanced file protection, user-friendliness, high performance, robust security features, and versatile compatibility. Through its unique features and functionalities, "File Defender" represents a significant milestone in cybersecurity and software development. The present invetion aims to protect the invention's intellectual property and promote its adoption in the ever-evolving technology landscape, contributing to a safer digital world.
Brief description of the drwaing:
Figure 1 shows Functions Data Flow Diagram (DFD)
Figure 2 shows Process Flowchart Diagram
Detailed Description of the Invention:
In the digital era, data security is a matter of utmost concern. The increasing use of computers and the internet has made it easier for malicious actors to gain unauthorized access to sensitive information. Among the primary methods used by cybercriminals is infecting computers with malware, which can lead to severe consequences for individuals and organizations.
To address these pressing challenges, the present invention "File Defender" is developed which is a comprehensive system that provides a user-friendly interface to encrypt files, decrypt previously encrypted files, and scan files for malware detection. The tool combines encryption technology, specifically AES-256 (Advanced Encryption Standard), with a simple password-based system to ensure files are securely protected. Furthermore, authorized users can easily decrypt files using the provided password.
Figure 1 shows the flow of data and control in the “File Defender” tool. When the system executes, it asks for the files or directory to encrypt, decrypt, or scan for malware signature. The above DFD shows the four modules of the “File Defender” program as separate processes. The GUI is connected to the “File Defender” module, which is the main module and is responsible for coordinating the different processes.
The Encrypt module is responsible for encrypting files in a directory(s) recursively and storing the encryption key in a text file (key.txt). The Decrypt module uses the encryption key to decrypt all the files. The Scanner module is responsible for scanning a single file or all files in given folders or directories recursively to detect files that have malware signatures. It matches each file with the malware signatures file in the "signatures" folder of the program. The Key.txt file is used by the Encrypt and Decrypt modules to encrypt and decrypt files, respectively. The Malware Signatures file is used by the Scanner module to identify files with malware signatures.
Figure 2 shows the functionalities of “File Defender” tool and shows the four modules of the “File Defender” tool as separate processes. The encryption and decryption is done by Encrypt and Decrypt modules respectively. The flowchart shows the flow of data and control in the “File Defender” program. The program starts when the user launches it. The GUI is displayed, and the user interacts with the program by selecting the files or directory to encrypt, decrypt, or scan for malware signature. The main module is responsible for coordinating the different processes.
The Encrypt module encrypts the selected files or directory and stores the encryption key in a text file (key.txt). The Decrypt module uses the encryption key to decrypt the files. The Scanner module scans the selected files for malware signatures by comparing them with the malware signatures in the “signatures” folder. The Key.txt file is used by the Encrypt and Decrypt modules to encrypt and decrypt files, respectively. The program outputs the results to the user. The program ends when the user exits it.
The “File Defender” program is divided into several modules, each of which performs a specific function. Here is a brief description of each module and its functionality:
Encryption Module - This module encrypts files within a given folder or a directory browsed by a user. The encryption uses AES-256 encryption and the encryption key is generated using a user-defined password.
Decryption Module - This module decrypts previously encrypted files within a folder or directory. The user must provide the correct password used during encryption to successfully decrypt the files within their folder or directory.
Malware Scanning Module - This module scans a single file or a directory. In fact, the user browses the file or directory to scan. Then the program after running tells whether the browsed file or files inside of the browsed folder or directory contain malware signature, or string or not.
Graphical User Interface (GUI) Module – This module provides an interface for interacting easily with the program. It allows the user to browse a single folder or directory for file encryption or decryption, as well as file or directory malware scanning. It contains an output clear button and a scroll up and scrolls down button. The GUI was implemented using the tkinter library, while the program's functionalities were implemented as functions that were called by the GUI's event handlers.
The software requirements for running the system will be specified in Table 1, outlining the necessary components for optimal performance.
Table 1: Hardware Requirements
Operating system Windows
For Developers
Python Modules required for installation tkinter, os, pycrypto, hashlib, yara, argparse, crypto.cipher, datetime, os.urandom(16), termcolor, configparser, json, base64, PyCryptodome, win32crypt, locale, platform, pathlib, itertools, subprocess, typing, request, reportlab
Programming Language Python 3
Technique Yara 4 based-rules, known virus signatures-based and strings-base techniques, encryption and decryption techniques
Tools VScode
The software system described in this document is designed to operate on the Windows operating system. It is primarily intended for developers and requires the following Python modules for installation: tkinter, os, pycrypto, hashlib, yara, argparse, crypto.cipher, datetime, os.urandom (16), termcolor, configparser, json, base64, PyCryptodome, win32crypt, locale, platform, pathlib, itertools, subprocess, typing, request, reportlab.
The programming language used for the development of this software is Python 3. The system incorporates multiple techniques for enhancing its functionality, including Yara 4-based rules for pattern matching, known virus signatures-based and strings-based techniques for detecting malicious content, and encryption and decryption techniques to ensure data security.
Developers can efficiently work on the software using the Visual Studio Code (VScode) development environment.
System Flow:
When the program is launched, the user is presented with a GUI window that contains the following elements:
• A label displaying the name of the program.
• A menu bar containing drop down menu such as “Cryptography”, “Malware Scanner”. Each drop down menu has options. “Cryptography” submenu is “Browse Directory to Encryption” and “Browse Directory to Decryption”, while Malware Scanner submenu are “Browse File” to Scan, “Browse Folder to Scan”.
• A Listbox in the center displaying the output or result of the program.
• A button to clear the output of the listbox.
• A label that displays the report when encryption, decryption or malware scanning is completed.
• A label to track use chose or operation. As an example, if user click on “Cryptography” menu and chose “Browse Directory to Encrypt”, and then cancel it without selected the directory to encrypt. The program notifies him on the Listbox that he doesn’t Browse the directory to encrypt. The same goes for Decryption, malware scan and other case.
• Message box that displays notification when any operation completed.
When the user clicks on the encryption or decryption options in the menu bar, the program prompts the user to select the folder or directory to encrypt/decrypt. After selecting, the program generates a new encryption key using the os.urandom() function, saves the key to a file, and encrypts folder or directory content using the generated key. While if the decryption option is selected, the program prompts the user to select the folder or directory to decrypt. After that, it asks user to browse the key file used for encryption and then decrypts the chosen folder or directory using the selected key file.
To scan file, user has two options, scan single file or scan given folder or directory. When the user clicks on Browse scan File in the menu bar, the program prompts the user to select the file to scan for malware. While when the user clicks on browse scan folder in the menu bar, the program prompts the user to select the folder to scan for malware. The program then scans the selected file or folder for malware by comparing the file's hash with the hashes of known malware signatures stored in the "signatures" folder. If a match is found, the program adds the file to the list of infected files and displays the report on the screen.
The program's output is displayed in the listbox. Each operation performed by the program is logged in the listbox along with a timestamp. The program also colorizes the output using the termcolor module to make it easier for the user to read. Finally, the program includes a button to clear the output of the listbox, as well as a label that displays the report when malware scanning is completed.
The "File Defender" program offers several significant advantages due to its comprehensive scope and focus on key aspects:
Enhanced File Protection: The program's primary functionality lies in protecting files from unauthorized access and modification. By employing encryption and decryption techniques and conducting thorough scans for malicious threats, the "File Defender" ensures robust file protection, safeguarding sensitive data from potential breaches.
User-Friendly Interface: With careful attention given to the user interface, the program prioritizes ease of use and user-friendliness. This advantage empowers both novice and experienced users to navigate the software effortlessly, making it accessible to a wide range of individuals.
High Performance: The program's focus on performance ensures efficient handling of large files and quick processing. This advantage is especially crucial in scenarios where time-sensitive operations and large data sets demand seamless execution, enhancing overall productivity.
Robust Security Features: The "File Defender" prioritizes security, providing a reliable defense against unauthorized access and file modifications. The examination of security features within the scope of the study ensures that the program's protective measures meet stringent standards, reinforcing its trustworthiness.
Versatile Compatibility: The program's compatibility with various operating systems, file types, and hardware configurations enhances its usability and versatility. Being compatible with Windows operating systems, various file formats, and diverse hardware setups allows for widespread adoption and usability across different environments.
Comprehensive Evaluation: The thorough evaluation of the program's functionality, user interface, performance, security, and compatibility guarantees that it meets the intended objectives effectively. This advantage helps identify areas for improvement and refinement, leading to a more refined and reliable "File Defender" program.
The comprehensive assessment of these aspects will collectively determine the overall effectiveness and usability of the "File Defender" program. By addressing vital aspects of file protection, user experience, performance, security, and compatibility, the program presents valuable advantages in safeguarding files and data, catering to the needs of users seeking robust file protection and ease of use.
“File Defender” is a Python program that provides an easy-to-use graphical user interface for encrypting and decrypting files within a given folder or directory, as well as scanning them for malware. Its objective is to enhance the security of users' sensitive files by preventing unauthorized access and protecting against malware infections.
Main embodiment of the present invention a method for file protection by file defender tool comprising of:
a) An encryption module configured to encrypt files within a specified folder or directory using Advanced Encryption Standard-256 encryption technology and a user-defined password;
b) A decryption module configured to decrypt previously encrypted files within a designated folder or directory, wherein the correct password is required for successful decryption
c) A malware scanning module utilizing Yara 4-based rules and known virus signatures-based techniques to scan files for potential malware threats, thereby enhancing data security; and
d) A graphical user interface module providing an intuitive interface for user interaction, allowing seamless file selection, encryption, decryption, and malware scanning;
Wherein said tool has comprehensive file protection capabilities, ensuring the confidentiality and integrity of sensitive data by preventing unauthorized access and potential breaches; proactive detection and neutralization of malware threats, contributing to a more secure data environment for users; contribution to the cybersecurity community by fostering collaboration and sharing insights related to File Defender to combat cyber threats collectively; encouragement of cybersecurity best practices, raising awareness about data protection and prioritizing security measures in digital endeavors.
Another embodiment of the present invention the integration of multiple features, including encryption, decryption, and malware scanning, within a single software solution provides users with a comprehensive and efficient file protection tool.
Another embodiment of the present invention the tool uses the file encryption module that uses the AES-256 encryption algorithm to secure files with a password, and a decryption module that allows authorized users to unlock and access the encrypted files.
Another embodiment of the present invention the malware scanning module scans files and directories thoroughly, enabling users to identify and respond promptly to potential malware infections.
Another embodiment of the present invention said tool provides secure environment to store and transfer sensitive data while minimizing the risk of data breaches and cyber-attacks, thereby promoting a safer digital world.
Another embodiment of the present invention the software tool empowers users to protect their files with confidence and ensures data security without compromising user experience.
The present invention of "File Defender" offers several key advantages. Firstly, it provides robust protection for files by incorporating encryption, decryption, and malware scanning capabilities. This ensures sensitive data remains secure and guarded against unauthorized access and potential threats. Another, the program enhances the understanding of cybersecurity concepts and strengthens programming language proficiency, making it a valuable learning experience. Further, the integration of various functionalities within a single program demonstrates efficient resource utilization, leading to improved results and user satisfaction. Additionally, "File Defender" contributes to the advancement of cybersecurity solutions by sharing insights and code, fostering collaborative efforts in the tech community. Overall, this invention stands as a valuable tool in combating cyber threats and promoting the importance of continuous learning in the rapidly evolving technology landscape.
The program is designed to be user-friendly and requires minimal technical expertise. It can be easily installed on a Windows machine and runs on a Python environment with the necessary packages installed. The program's functionality is further enhanced by the use of libraries such as cryptography, yara, tkinter, os, and so on, which help to perform complex operations with ease.
In conclusion, the development of "File Defender" represents a significant milestone in the realm of cybersecurity and software development. This Python-based program, equipped with encryption, decryption, and malware scanning capabilities, stands as a robust solution for safeguarding files and sensitive data from potential threats. The process of creating "File Defender" provided valuable insights into cybersecurity concepts and bolstered proficiency in programming languages like Python and yara based-rules. The importance of prioritizing security measures throughout the development process became evident, considering the escalating frequency of cyberattacks and data breaches. By focusing on security, "File Defender" offers a powerful defense against unauthorized access and ensures the protection of vital information.
Moreover, the successful integration of various functionalities within a single program exemplifies the efficient use of resources in software development, leading to enhanced performance and user satisfaction. The experience gained from this project can be applied to future endeavors, driving innovation and efficiency in developing sophisticated software solutions. By sharing the code and insights gained during the development of "File Defender," the project contributes to the broader cybersecurity community, fostering collaboration and further advancements in the field. The invention of "File Defender" serves as a starting point for aspiring developers interested in creating similar programs and adds to the collective efforts in addressing the ever-evolving challenges of cybersecurity.
In a world where digital security is of utmost importance, "File Defender" emerges as a reliable and effective tool to protect files and combat potential threats. Through this invention, the team has not only demonstrated their technical prowess but also reinforced the significance of continuous learning and adaptability in the dynamic landscape of technology. As technology continues to evolve, endeavors like "File Defender" will play a crucial role in fortifying our digital world and ensuring the confidentiality and integrity of sensitive information. , Claims:We claim,
1. A method for file protection by file defender tool comprising of:
a) An encryption module configured to encrypt files within a specified folder or directory using Advanced Encryption Standard-256 encryption technology and a user-defined password;
b) A decryption module configured to decrypt previously encrypted files within a designated folder or directory, wherein the correct password is required for successful decryption
c) A malware scanning module utilizing Yara 4-based rules and known virus signatures-based techniques to scan files for potential malware threats, thereby enhancing data security; and
d) A graphical user interface module providing an intuitive interface for user interaction, allowing seamless file selection, encryption, decryption, and malware scanning;
Wherein said tool has comprehensive file protection capabilities, ensuring the confidentiality and integrity of sensitive data by preventing unauthorized access and potential breaches; proactive detection and neutralization of malware threats, contributing to a more secure data environment for users; contribution to the cybersecurity community by fostering collaboration and sharing insights related to File Defender to combat cyber threats collectively; encouragement of cybersecurity best practices, raising awareness about data protection and prioritizing security measures in digital endeavors.
2. The method for file protection by file defender tool as claimed in claim 1, wherein the integration of multiple features, including encryption, decryption, and malware scanning, within a single software solution provides users with a comprehensive and efficient file protection tool.
3. The method for file protection by file defender tool as claimed in claim 1, wherein the tool uses the file encryption module that uses the AES-256 encryption algorithm to secure files with a password, and a decryption module that allows authorized users to unlock and access the encrypted files.
4. The method for file protection by file defender tool as claimed in claim 1, wherein the malware scanning module scans files and directories thoroughly, enabling users to identify and respond promptly to potential malware infections.
5. The method for file protection by file defender tool as claimed in claim 1, wherein said tool provides secure environment to store and transfer sensitive data while minimizing the risk of data breaches and cyber-attacks, thereby promoting a safer digital world.
6. The method for file protection by file defender tool as claimed in claim 1, wherein the software tool empowers users to protect their files with confidence and ensures data security without compromising user experience.
Dated 27th July, 2023
ChothaniPritibahenBipinbhai
Reg. No.: IN/PA-3148
For and on behalf of the applicant
| # | Name | Date |
|---|---|---|
| 1 | 202321051160-POWER OF AUTHORITY [29-07-2023(online)].pdf | 2023-07-29 |
| 2 | 202321051160-FORM 1 [29-07-2023(online)].pdf | 2023-07-29 |
| 3 | 202321051160-DRAWINGS [29-07-2023(online)].pdf | 2023-07-29 |
| 4 | 202321051160-COMPLETE SPECIFICATION [29-07-2023(online)].pdf | 2023-07-29 |
| 5 | 202321051160-FORM-9 [05-10-2023(online)].pdf | 2023-10-05 |
| 6 | 202321051160-FORM 18 [05-10-2023(online)].pdf | 2023-10-05 |
| 7 | Abstact.jpg | 2023-10-27 |
| 8 | 202321051160-RELEVANT DOCUMENTS [03-02-2025(online)].pdf | 2025-02-03 |
| 9 | 202321051160-POA [03-02-2025(online)].pdf | 2025-02-03 |
| 10 | 202321051160-FORM 13 [03-02-2025(online)].pdf | 2025-02-03 |
| 11 | 202321051160-EVIDENCE FOR REGISTRATION UNDER SSI [10-02-2025(online)].pdf | 2025-02-10 |
| 12 | 202321051160-EDUCATIONAL INSTITUTION(S) [10-02-2025(online)].pdf | 2025-02-10 |
| 13 | 202321051160-FER.pdf | 2025-04-04 |
| 14 | 202321051160-FORM-8 [27-05-2025(online)].pdf | 2025-05-27 |
| 15 | 202321051160-FORM-26 [27-05-2025(online)].pdf | 2025-05-27 |
| 16 | 202321051160-FER_SER_REPLY [27-05-2025(online)].pdf | 2025-05-27 |
| 17 | 202321051160-DRAWING [27-05-2025(online)].pdf | 2025-05-27 |
| 18 | 202321051160-CORRESPONDENCE [27-05-2025(online)].pdf | 2025-05-27 |
| 19 | 202321051160-CLAIMS [27-05-2025(online)].pdf | 2025-05-27 |
| 20 | 202321051160-ABSTRACT [27-05-2025(online)].pdf | 2025-05-27 |
| 21 | 202321051160-RELEVANT DOCUMENTS [29-05-2025(online)].pdf | 2025-05-29 |
| 22 | 202321051160-PETITION UNDER RULE 137 [29-05-2025(online)].pdf | 2025-05-29 |
| 1 | 202321051160searchE_11-09-2024.pdf |