Method for strongly encrypting .zip files
First Claim
Patent Images
1. A method of placing data in a .ZIP file format data container on a computer, said method including:
- receiving a first data file at an application on a computer, wherein said first data file has been retrieved from an electronic computer data storage by said application;
compressing said first data file to form a first compressed data file using said application before encrypting said first data file;
encrypting said first compressed data file to form a first encrypted data file, wherein said encrypting uses symmetric encryption employing a first encryption method using a first symmetric key having a first symmetric key bit length,wherein said first symmetric key bit length is one of a plurality of available symmetric key bit lengths that may be used to perform said encrypting;
placing said first encrypted data file in a data container using said application on said computer,wherein said data container is constructed in accordance with the .ZIP file format,wherein said data container includes an electronic indication that is set when said first compressed data file has been encrypted using a symmetric key having a symmetric key bit length greater than a predetermined bit length,wherein, when said first data file has been encrypted using a symmetric key having a symmetric key bit length greater than a predetermined bit length, said data container is modified to include;
a first data field indicating the actual bit length of said first symmetric key;
a second data field including an identification of said first encryption method employed in said encrypting, wherein said first encryption method is one of a plurality of available encryption methods selectable by a user using said application,wherein a plurality of encryption method identifiers for said plurality of available encryption methods are available using said application for inclusion as said identification; and
a third data field identifying an encryption record version of said first encrypted data file, wherein said encryption record version is one of a plurality of available encryption record versions.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well-established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
286 Citations
16 Claims
-
1. A method of placing data in a .ZIP file format data container on a computer, said method including:
-
receiving a first data file at an application on a computer, wherein said first data file has been retrieved from an electronic computer data storage by said application; compressing said first data file to form a first compressed data file using said application before encrypting said first data file; encrypting said first compressed data file to form a first encrypted data file, wherein said encrypting uses symmetric encryption employing a first encryption method using a first symmetric key having a first symmetric key bit length, wherein said first symmetric key bit length is one of a plurality of available symmetric key bit lengths that may be used to perform said encrypting; placing said first encrypted data file in a data container using said application on said computer, wherein said data container is constructed in accordance with the .ZIP file format, wherein said data container includes an electronic indication that is set when said first compressed data file has been encrypted using a symmetric key having a symmetric key bit length greater than a predetermined bit length, wherein, when said first data file has been encrypted using a symmetric key having a symmetric key bit length greater than a predetermined bit length, said data container is modified to include; a first data field indicating the actual bit length of said first symmetric key; a second data field including an identification of said first encryption method employed in said encrypting, wherein said first encryption method is one of a plurality of available encryption methods selectable by a user using said application, wherein a plurality of encryption method identifiers for said plurality of available encryption methods are available using said application for inclusion as said identification; and a third data field identifying an encryption record version of said first encrypted data file, wherein said encryption record version is one of a plurality of available encryption record versions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of constructing .ZIP file format data container on a computer, said method including:
-
receiving a first data file at an application on a computer, wherein said first data file has been retrieved from an electronic computer data storage by said application; compressing said first data file to form a first compressed data file using said application before encrypting said first data file; encrypting said first compressed data file to form a first encrypted data file, wherein said encrypting uses symmetric encryption employing a first encryption method using a first symmetric key having a first symmetric key bit length, wherein said first symmetric key bit length is one of a plurality of user-selectable symmetric key bit lengths that may be used to perform said encrypting; and electronically constructing a modified .ZIP format data container stored on said computer using said application, wherein, when said first symmetric key bit length is at least as long as a predetermined bit length, said data container is modified to include; an electronic indication that indicates that said data file has been encrypted using a symmetric key having a symmetric key bit length at least as long as a predetermined bit length; a first data field indicating the actual bit length of said first symmetric key; a second data field including an identification of said first encryption method employed in said encrypting, wherein said first encryption algorithm is one of a plurality of user-selectable encryption algorithms selectable by a user using said application, wherein a plurality of encryption method identifiers for said plurality of user-selectable encryption algorithms are available using said application for inclusion as said identification; and a third data field identifying an encryption record version of said first encrypted data file. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification