Browse Prior Art Database

Self Destructing Files Disclosure Number: IPCOM000011556D
Original Publication Date: 2003-Mar-04
Included in the Prior Art Database: 2003-Mar-04
Document File: 2 page(s) / 38K

Publishing Venue



Disclosed is a system designed to facilitate the automated deletion of files marked confidential in an operating system environment.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Self Destructing Files

Disclosed is system designed to facilitate the automated deletion of computer files deemed confidential. Many times, one forgets to delete a file that needs to be deleted. The proposed solution aims to strengthen operating systems by making them more wary of files that are considered private/confidential.

The proposed solution aims to enhance the deletion feature of operating systems. The user will be able to mark a file's properties as "Confidential and must be destroyed." When this flag is set, a daemon type process which runs in the background of the operating system will know that this file is subject for deletion. The user will be able to specify that they want this file to be deleted after X date and X time.

The daemon will not delete the confidential file before the specified parameters. By implementing this system, the user will be able to protect the files on their computer and make sure that confidential files which need to be deleted are deleted. Programs can also be taught to manipulate the "Confidentiality Bit." When a file attachment is emailed to someone, it can be marked as a "confidential attachment." The user will be able to specify after what period these confidential attachments should be destroyed after the email is opened. Accordingly, the daemon will be on the lookout for such confidential files. Also, when a user sends such a confidential file to another user, the "confidentiality" file permission will be sent within the file.

Now let us say that Microsoft Word* is used to open a confidential file attachment. Now, when the user exits the program, the confidentiality bit of the DOC file can be referenced. Acco...