Sign In to Follow Application
View All Documents & Correspondence

System And Method For Encrypting Hidden Files

Abstract: ABSTRACT SYSTEM AND METHOD FOR ENCRYPTING HIDDEN FILES A system and a method for encrypting hidden files or folders are provided. The system (100) comprises a file storage unit (108) configured to store at least one file or a folder, a file hiding unit (106) configured to hide the stored at least one file or folder, and a file encryption unit (104) configured to encrypt the hidden at least one file or folder. [Figure 1]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 September 2022
Publication Number
41/2022
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
dua.tapasya@ipconneqt.com
Parent Application

Applicants

Cialfor Research Labs Pvt Ltd
ODC-4, 4th Floor, Panchshil Tech Park, Hinjewadi Phase 1, Pune– 411057, Maharashtra, India
Quantum University
Quantum University, Roorkee-247167, Uttarakhand, India

Inventors

1. Mr. Rahul Mishra
Cialfor Research Labs Pvt Ltd ODC-4, 4th Floor, Panchshil Tech Park, Hinjewadi Phase 1, Pune– 411057, Maharashtra, India
2. Ms. Sakshi Pandey
Cialfor Research Labs Pvt Ltd ODC-4, 4th Floor, Panchshil Tech Park, Hinjewadi Phase 1, Pune– 411057, Maharashtra, India
3. Dr. Chandani Sharma
Quantum University, Roorkee-247167, Uttarakhand, India
4. Mr. Vineet Kumar Salar
Quantum University, Roorkee-247167, Uttarakhand, India
5. Ms. Riya Walia
Quantum University, Roorkee-247167, Uttarakhand, India
6. Mr. Rishi Sharma
Quantum University, Roorkee-247167, Uttarakhand, India
7. Mr. Deepak Bhatt
Quantum University, Roorkee-247167, Uttarakhand, India
8. Mr. Mitender Kumar
Quantum University, Roorkee-247167, Uttarakhand, India

Specification

Description:TECHNICAL FIELD
The present disclosure relates generally to encryption techniques, and more specifically relates to encryption of hidden files and folders.

BACKGROUND ART
[0001] Any file with the hidden property enabled is a hidden file. As you might anticipate, when navigating through folders, a file or folder with this property toggled on is hidden, you cannot see any of them without expressly permitting all of them to be shown.

[0002] The default setting on the majority of Windows-based systems prevents the visibility of hidden files. Because they are not files that you should be altering, deleting, or moving around like other data like your images and documents, some files and folders are automatically tagged as hidden. Frequently, they are crucial operating system-related files.

[0003] While upgrading software that requires you to choose a specific file that is hidden from normal view or when troubleshooting or resolving a specific issue, you may occasionally need to see hidden files. Otherwise, never interacting with hidden files is usual.

[0004] The pagefile.sys file is a common hidden file in Windows. ProgramData is a hidden folder you may see when viewing hidden items. In older versions of Windows, commonly encountered hidden files include msdos.sys, io.sys and boot.ini.

[0005] Although enabling the hidden attribute for a sensitive file will make it "invisible" to the average user, you should not use it to secretly hide your files from prying eyes. Anyone may easily unhide a hidden file or folder, as you can see above. The better option is a whole disc encryption programme or a genuine file encryption tool.

[0006] Under typical conditions, hidden files aren't visible, but that doesn't imply they suddenly occupy less disc space. To put it another way, even if you conceal all the files you don't want to see, they will still take up space on your hard disc.

[0007] Nowadays, there are techniques that exists which can help analyze data packets. For example, reference can be made to US11070535B2 which discloses techniques for performing management of keys used for encrypting and decrypting data. Also, reference can be made to US8559630B2 which discloses techniques for synchronizing encrypted files.

OBJECTS OF THE INVENTION
[0008] The principal object of the present invention is to provide techniques for encrypting any type of file/folder or even the directory as well.

[0009] Another object of the present invention is to provide techniques for encrypting the data at rest and data at transit while performing any task at that time also the data is encrypted.

[0010] Another object of the present invention is to provide techniques for allowing original files to remain untouched while the original file can even be deleted after hiding.

[0011] Another object of the present invention is to provide techniques for erasing the metadata of the file folder if any outsider tries to brute force the password.

SUMMARY OF THE INVENTION

[0012] In one embodiment, a system for encrypting hidden files or folders is disclosed. The system comprises a file storage unit configured to store at least one file or a folder, a file hiding unit configured to hide the stored at least one file or folder, and a file encryption unit configured to encrypt the hidden at least one file or folder.

[0013] In another embodiment, a method for encrypting hidden files in a computer device is disclosed. The method comprises storing at least one file or a folder, hiding the stored file or folder, and encrypting the hidden file or folder.

BRIEF DESCRIPTION OF DRAWINGS
[0014] Figure 1 illustrates a system for encrypting files/folders, in accordance with one embodiment of the present invention.
[0015] Figure 2 illustrating a flowchart of a method for encrypting files/folders, in accordance with the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0016] While the present invention is described herein by way of example using embodiments and illustrative drawings, those skilled in the art will recognize that the invention is not limited to the embodiments of drawing or drawings described and are not intended to represent the scale of the various components. Further, some components that may form a part of the invention may not be illustrated in certain figures, for ease of illustration, and such omissions do not limit the embodiments outlined in any way. It should be understood that the drawings and the detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the scope of the present invention as defined by the appended claim.
[0017] As used throughout this description, the word "may" is used in a permissive sense (i.e. meaning having the potential to), rather than the mandatory sense, (i.e. meaning must). Further, the words "a" or "an" mean "at least one” and the word “plurality” means “one or more” unless otherwise mentioned. Furthermore, the terminology and phraseology used herein are solely used for descriptive purposes and should not be construed as limiting in scope. Language such as "including," "comprising," "having," "containing," or "involving," and variations thereof, is intended to be broad and encompass the subject matter listed thereafter, equivalents, and additional subject matter not recited, and is not intended to exclude other additives, components, integers, or steps. Likewise, the term "comprising" is considered synonymous with the terms "including" or "containing" for applicable legal purposes. Any discussion of documents, acts, materials, devices, articles, and the like are included in the specification solely for the purpose of providing a context for the present invention. It is not suggested or represented that any or all these matters form part of the prior art base or were common general knowledge in the field relevant to the present invention.
[0018] In this disclosure, whenever a composition or an element or a group of elements is preceded with the transitional phrase “comprising”, it is understood that we also contemplate the same composition, element, or group of elements with transitional phrases “consisting of”, “consisting”, “selected from the group of consisting of, “including”, or “is” preceding the recitation of the composition, element or group of elements and vice versa.
[0019] The present invention is described hereinafter by various embodiments with reference to the accompanying drawing, wherein reference numerals used in the accompanying drawing correspond to the like elements throughout the description. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those skilled in the art. In the following detailed description, numeric values and ranges are provided for various aspects of the implementations described. These values and ranges are to be treated as examples only and are not intended to limit the scope of the claims. In addition, several materials are identified as suitable for various facets of the implementations. These materials are to be treated as exemplary and are not intended to limit the scope of the invention.
[0020] Referring to FIG. 1, a system 100 for encrypting hidden files or folders is provided. The system 100 comprises a memory 102, an encryption unit 104, a file hiding unit 106, a file storage unit 108, a processor 110. The system 100 can encrypt the files which are hidden on a computer device. The processor 110 may be coupled to the memory 102, the encryption unit 104, the file hiding unit 106 and the file storage unit 108. The processor 110 may control the operations of the all the components present in the system 100.
[0021] The computer device may store a plurality of files or folders in it in the file storage unit 108. The files or folders may be related to one or more users using the computer device. The files or folders may include images files, audio files, content files, etc. In one embodiment, the plurality of files or folders can include any type of data.
[0022] In one embodiment, the plurality of files or folders may include any sensitive information which the users would like to protect. The protection of the sensitive data may be desired by the users. The protection of data may indicate that the users does not want to display the data to other users who would use the computer device belonging to the user. The files or folders can be hidden using the file hiding unit 106.
[0023] Generally, the system 100 may hide the files or the folders by the file hiding unit 106. When the files or folders are marked as hidden by the user, the files or folders are not visible to anyone using the computer device. When the next time, the user desires to see the hidden files or folders, the user need to unhide the files or folders from an option provided in the computer device. Thus, any other users can access the computer device and can unhide the files or folders using the option to unhide known to the other users.
[0024] In order to prevent the other users from unhiding the hidden files or folders using the unhide option, the present invention allows encrypting the hidden files or folders using the encryption unit 104. The encrypting of the hidden filer or folders allows for protecting the filer or folder using ciphering techniques such that unauthorized access can be prevented. In one embodiment, the user may be provided with one or more preferences to help decide the user whether the user wishes to encrypt the hidden files or the folder.
[0025] The encryption unit 104 uses one or more encryption techniques to encrypt the files or folders using a master password as a master key. Using the master password serving as the master key, the PBKDF2 algorithm encrypts the master password. Although, PBKDF2 has been mentioned here, any other algorithm can be used to encrypt the master password.
[0026] Thus, the hidden files, folders and directory will be encrypted using strongest encryption algorithm while the key being the master password. In one embodiment, the master password may be encrypted using triple DES Algorithm. The triple DES algorithm may be optimized and use hashed based authentication system with the master password itself as its own key. The original files remain untouched so that the original file may be kept or even delete it after hiding. The hidden encrypted files or folders may be called from anywhere by typing secret vault in the terminal. In one embodiment, whole vault can be deleted or reset if the user wishes to after supplying your master password.
[0027] In one embodiment, the encryption unit 104 may encrypt the files or the folder while at rest and while the files or the folder are at transmit. Thus, even when the files or the folder are in use by any user and the user is performing any task in the files or the folder, the files or the folder remain encrypted all the time. Thus, the task being performed by the user on the files or the folder also remain encrypted even when the user is encrypting the task.
[0028] In one embodiment, the encrypted files or folder may be removed from the computer device and may be stored in current working directory of the terminal or in simpler terms, the folder from where the program is called. In one embodiment, the encrypted files or the folder may be stored in a server to which the computer device may be connected. In another embodiment, the encrypted files or the folder may be stored in some other location within the computer device. The other location may indicate folder containing program files present in the computer device. In one embodiment, the program files may be stored in the memory 102 of the computer device. Thus, when the user wishes to unhide the files or the folder, the user can download the encrypted hidden files or the folder from the server or the other location where the files or the folder is stored.
[0029] The file or folder contains metadata embedded in it. The metadata comprises information pertaining to the file or the folder such as size of the file or the folder, the location where the file or the folder is stored in the computer device, number of files in the folder, etc. In one embodiment, the metadata also relates to the content, such as image or document stored in the file or the folder. For example, the metadata relates to image may include pixels of the images, size of the image, etc.
[0030] In one embodiment, the encryption unit 104 encrypts the metadata embedded in the file or the folder. In one embodiment, the metadata may be erased from the computer device such that any other user is prevented from accessing the files or the folder stored in the computer device. The erased metadata may be stored in the server or the other location where the hidden encrypted files or the folder may be stored. This prevents hacking of the files or the folder from the computer device.
[0031] Referring to FIG. 2 now, a flowchart of a method for encrypting hidden files or folder is disclosed. At step 202, the method comprises storing at least one file or a folder and hiding the files or the folders present in a computer device. At step 204, the method comprises encrypting the hidden files or folders using one or more encryption techniques. At step 206, the method comprises removing the encrypted hidden files or the folders from the computer device. At step 208, the method comprises encrypting metadata associated with the files or the folder.
[0032] The various actions, acts, blocks, steps, or the like in the flow diagram may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some of the actions, acts, blocks, steps, or the like may be omitted, added, modified, skipped, or the like without departing from the scope of the invention.
[0033] Although particular embodiments of the invention have been described in detail for purposes of illustration, various modifications and enhancements may be made without departing from the spirit and scope of the invention. , Claims:I/We Claim:
1. A system (100) for encrypting hidden files in a computer device, the system comprising:
a file storage unit (108) configured to store at least one file or a folder;
a file hiding unit (106) configured to hide the stored at least one file or folder;
a file encryption unit (104) configured to encrypt the hidden at least one file or folder.

2. The system as claimed in claim 1, wherein the file encryption unit is further configured to remove the encrypted hidden at least one files or folder from the computer device.

3. The system as claimed in claim 1, wherein the file or the folder comprises metadata.

4. The system as claimed in claim 3, wherein the file encryption unit is configured to encrypt metadata.

5. The system as claimed in claim 4, wherein the file encryption unit is configured to remove the encrypted metadata from the computer device.

6. A method for encrypting hidden files in a computer device with a system as claimed in claim 1, the method comprising:
storing at least one file or a folder (202);
hiding the stored file or folder (202); and
encrypting the hidden file or folder (204).

7. The method as claimed in claim 6, further comprising removing the encrypted hidden files or folder from the computer device (206).

8. The method as claimed in claim 6, wherein the file or the folder comprises metadata.

9. The method as claimed in claim 8, further comprising encrypting metadata (208).

10. The method as claimed in claim 8, further comprising removing the encrypted metadata from the computer device.



Dated this 22 Sept, 2022

Documents

Application Documents

# Name Date
1 202221054762-FER.pdf 2025-04-25
1 202221054762-FORM 18 [22-12-2023(online)].pdf 2023-12-22
1 202221054762-STATEMENT OF UNDERTAKING (FORM 3) [24-09-2022(online)].pdf 2022-09-24
2 202221054762-FORM 18 [22-12-2023(online)].pdf 2023-12-22
2 202221054762-FORM-26 [04-10-2022(online)].pdf 2022-10-04
2 202221054762-REQUEST FOR EARLY PUBLICATION(FORM-9) [24-09-2022(online)].pdf 2022-09-24
3 202221054762-FORM-26 [04-10-2022(online)].pdf 2022-10-04
3 202221054762-FORM-9 [24-09-2022(online)].pdf 2022-09-24
3 Abstract.jpg 2022-09-29
4 Abstract.jpg 2022-09-29
4 202221054762-FORM FOR SMALL ENTITY(FORM-28) [24-09-2022(online)].pdf 2022-09-24
4 202221054762-COMPLETE SPECIFICATION [24-09-2022(online)].pdf 2022-09-24
5 202221054762-FORM FOR SMALL ENTITY [24-09-2022(online)].pdf 2022-09-24
5 202221054762-DECLARATION OF INVENTORSHIP (FORM 5) [24-09-2022(online)].pdf 2022-09-24
5 202221054762-COMPLETE SPECIFICATION [24-09-2022(online)].pdf 2022-09-24
6 202221054762-FORM 1 [24-09-2022(online)].pdf 2022-09-24
6 202221054762-DRAWINGS [24-09-2022(online)].pdf 2022-09-24
6 202221054762-DECLARATION OF INVENTORSHIP (FORM 5) [24-09-2022(online)].pdf 2022-09-24
7 202221054762-FIGURE OF ABSTRACT [24-09-2022(online)].pdf 2022-09-24
7 202221054762-EVIDENCE FOR REGISTRATION UNDER SSI [24-09-2022(online)].pdf 2022-09-24
7 202221054762-DRAWINGS [24-09-2022(online)].pdf 2022-09-24
8 202221054762-EVIDENCE FOR REGISTRATION UNDER SSI [24-09-2022(online)].pdf 2022-09-24
8 202221054762-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-09-2022(online)].pdf 2022-09-24
9 202221054762-EVIDENCE FOR REGISTRATION UNDER SSI [24-09-2022(online)].pdf 2022-09-24
9 202221054762-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-09-2022(online)].pdf 2022-09-24
9 202221054762-FIGURE OF ABSTRACT [24-09-2022(online)].pdf 2022-09-24
10 202221054762-DRAWINGS [24-09-2022(online)].pdf 2022-09-24
10 202221054762-FIGURE OF ABSTRACT [24-09-2022(online)].pdf 2022-09-24
10 202221054762-FORM 1 [24-09-2022(online)].pdf 2022-09-24
11 202221054762-DECLARATION OF INVENTORSHIP (FORM 5) [24-09-2022(online)].pdf 2022-09-24
11 202221054762-FORM 1 [24-09-2022(online)].pdf 2022-09-24
11 202221054762-FORM FOR SMALL ENTITY [24-09-2022(online)].pdf 2022-09-24
12 202221054762-COMPLETE SPECIFICATION [24-09-2022(online)].pdf 2022-09-24
12 202221054762-FORM FOR SMALL ENTITY [24-09-2022(online)].pdf 2022-09-24
12 202221054762-FORM FOR SMALL ENTITY(FORM-28) [24-09-2022(online)].pdf 2022-09-24
13 202221054762-FORM FOR SMALL ENTITY(FORM-28) [24-09-2022(online)].pdf 2022-09-24
13 202221054762-FORM-9 [24-09-2022(online)].pdf 2022-09-24
13 Abstract.jpg 2022-09-29
14 202221054762-FORM-26 [04-10-2022(online)].pdf 2022-10-04
14 202221054762-FORM-9 [24-09-2022(online)].pdf 2022-09-24
14 202221054762-REQUEST FOR EARLY PUBLICATION(FORM-9) [24-09-2022(online)].pdf 2022-09-24
15 202221054762-FORM 18 [22-12-2023(online)].pdf 2023-12-22
15 202221054762-REQUEST FOR EARLY PUBLICATION(FORM-9) [24-09-2022(online)].pdf 2022-09-24
15 202221054762-STATEMENT OF UNDERTAKING (FORM 3) [24-09-2022(online)].pdf 2022-09-24
16 202221054762-FER.pdf 2025-04-25
16 202221054762-STATEMENT OF UNDERTAKING (FORM 3) [24-09-2022(online)].pdf 2022-09-24
17 202221054762-OTHERS [25-10-2025(online)].pdf 2025-10-25
18 202221054762-FER_SER_REPLY [25-10-2025(online)].pdf 2025-10-25
19 202221054762-DRAWING [25-10-2025(online)].pdf 2025-10-25
20 202221054762-CLAIMS [25-10-2025(online)].pdf 2025-10-25

Search Strategy

1 20221054762searchE_19-04-2024.pdf