CLIAMS:A method for securing temporary files, the method comprising:
parsing, by a processor (108), a document to determine whether the document comprises one or more images;
based on the determination, encrypting, by the processor (108), a temporary file pertaining to each of the one or more images; and
providing, by the processor (108), the one or more images to an authorized user when the authorized user is viewing the one or more images in the document, wherein the one or more images are decrypted before being provided to the authorized user.
2. The method as claimed in claim 1 further comprising authorizing, by the processor (108), a user before the user accesses the document.
3. The method as claimed in claim 2, wherein the authorizing comprises detecting, by the processor (108), access of the document by the authorized user.
4. The method as claimed in claim 1 further comprising deleting, by the processor (108), the temporary file, upon identifying that the document is closed by the authorized user.
5. The method as claimed in claim 1 further comprising:
detecting, by the processor (108), access of the document from a plurality of documents, pertaining to an enterprise, by an authorized user; and
creating, by the processor (108), a temporary file of the document, upon detection.
6. The method as claimed in claim 1, wherein the encryption is performed by an Advanced Standard Encryption (AES).
7. The method as claimed in claim 1, wherein the encrypting comprises generating a symmetric encryption key for the document.
8. The method as claimed in claim 1, wherein the document is accessed through an Enterprise Digital Rights Management (eDRM) application.
9. A data securing system (102) comprising:
a processor (108);
an encryption module (120), coupled to the processor (108), to,
detect access of a document from a plurality of documents by an authorized user, wherein the document is accessed through an Enterprise Digital Rights Management (eDRM) application;
based on detection, determine whether the document comprises one or more images;
based on the determination, create a temporary file pertaining to each of the one or more images in the document; and
encrypt the temporary files corresponding to each of the one ore more images; and
a decryption module (122), coupled to the processor (108), to,
determine whether the authorized user is viewing the one or more images from the document; and
based on the determination, decrypt the temporary files of the one or more images for being viewed by the authorized user.
10. The data securing system (102) as claimed in claim 9 further comprises an authorization module (118), coupled to the processor (108), to authorize a user to access the plurality of documents.
11. The data securing system (102) as claimed in claim 10, wherein the authorization is based on login credentials of a user.
12. The data securing system (102) as claimed in claim 9, wherein the decryption module (122) to, further,
determine whether the document is closed by the authorized user; and
based on the determination, delete the temporary file of the document.
13. The data securing system (102) as claimed in claim 9, wherein the encryption is performed using an Advanced Standard Encryption (AES).
14. A non-transitory computer-readable medium having a set of computer readable instructions that, when executed, cause a data securing system (102), to,
authorize, based on login credentials, a user to access a plurality of documents of an enterprise;
parse the document to determine whether the document comprises one or more images, wherein the parsing is based upon detection of access of the document by the authorized user;
based on the determination, encrypt the one or more images in a temporary file of the document;
determine whether the authorized user is viewing the one or more images from the document; and
based on the determination, decrypt the one or more images in the temporary file for being viewed by the authorized user.
,TagSPECI:As Attached