Device independent encrypted content access system
First Claim
1. A method, comprising:
- receiving a first authentication credential at a user device, the first authentication credential being associated with a user;
based on the first authentication credential, accessing, by one or more processors of the user device, a second authentication credential stored on a key server;
generating, by the one or more processors, an authentication token and an encryption token;
based on the authentication token, accessing, by the one or more processors, a plurality of encrypted content elements, an encrypted master key, and a plurality of encrypted content keys, each content element of the plurality of content elements associated with a separate encrypted content key of the plurality of encrypted content keys;
in response to accessing the encrypted master key, decrypting the master key to generate a master key using the encryption token;
in response to generating the master key, decrypting the plurality of encrypted content keys to generate a plurality of content keys using the master key;
decrypting one or more encrypted content elements of the plurality of encrypted content elements using one or more content keys of the plurality of content keys associated with the one or more encrypted content elements to generate a plurality of content elements;
causing presentation of at least a portion of the plurality of content elements on a display device of the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.
55 Citations
20 Claims
-
1. A method, comprising:
-
receiving a first authentication credential at a user device, the first authentication credential being associated with a user; based on the first authentication credential, accessing, by one or more processors of the user device, a second authentication credential stored on a key server; generating, by the one or more processors, an authentication token and an encryption token; based on the authentication token, accessing, by the one or more processors, a plurality of encrypted content elements, an encrypted master key, and a plurality of encrypted content keys, each content element of the plurality of content elements associated with a separate encrypted content key of the plurality of encrypted content keys; in response to accessing the encrypted master key, decrypting the master key to generate a master key using the encryption token; in response to generating the master key, decrypting the plurality of encrypted content keys to generate a plurality of content keys using the master key; decrypting one or more encrypted content elements of the plurality of encrypted content elements using one or more content keys of the plurality of content keys associated with the one or more encrypted content elements to generate a plurality of content elements; causing presentation of at least a portion of the plurality of content elements on a display device of the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
one or more processors; and a processor-readable storage device coupled to the one or more processors, the processor-readable storage device storing processor-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving a first authentication credential at a user device, the first authentication credential being associated with a user; based on the first authentication credential, accessing, by one or more processors of the user device, a second authentication credential stored on a key server; generating, by the one or more processors, an authentication token and an encryption token; based on the authentication token, accessing, by the one or more processors, a plurality of encrypted content elements, an encrypted master key, and a plurality of encrypted content keys, each content element of the plurality of content elements associated with a separate encrypted content key of the plurality of encrypted content keys; in response to accessing the encrypted master key, decrypting the master key to generate a master key using the encryption token; in response to generating the master key, decrypting the plurality of encrypted content keys to generate a plurality of content keys using the master key; decrypting one or more encrypted content elements of the plurality of encrypted content elements using one or more content keys of the plurality of content keys associated with the one or more encrypted content elements to generate a plurality of content elements; causing presentation of at least a portion of the plurality of content elements on a display device of the user device. - View Dependent Claims (10, 11, 12, 13, 20)
-
-
14. A processor-readable storage device coupled to one or more processors, the processor-readable storage device storing processor-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
-
receiving a first authentication credential at a user device, the first authentication credential being associated with a user; based on the first authentication credential, accessing, by one or more processors of the user device, a second authentication credential stored on a key server; generating, by the one or more processors, an authentication token and an encryption token; based on the authentication token, accessing, by the one or more processors, a plurality of encrypted content elements, an encrypted master key, and a plurality of encrypted content keys, each content element of the plurality of content elements associated with a separate encrypted content key of the plurality of encrypted content keys; in response to accessing the encrypted master key, decrypting the master key to generate a master key using the encryption token; in response to generating the master key, decrypting the plurality of encrypted content keys to generate a plurality of content keys using the master key; decrypting one or more encrypted content elements of the plurality of encrypted content elements using one or more content keys of the plurality of content keys associated with the one or more encrypted content elements to generate a plurality of content elements; causing presentation of at least a portion of the plurality of content elements on a display device of the user device. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification