×

Method for strongly encrypting .ZIP files

  • US 10,607,024 B2
  • Filed: 11/02/2018
  • Issued: 03/31/2020
  • Est. Priority Date: 07/16/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of constructing a modified .ZIP file format data container on a computer, said method including:

  • receiving a first data file at an application on a computer, wherein said first data file has been retrieved from an electronic computer data storage by said application;

    encrypting said first data file to form a first encrypted data file, wherein said encrypting uses symmetric encryption employing a first encryption method using a first symmetric key received from a user,wherein said first encryption method is selected from a plurality of available encryption methods selectable by a user,wherein said symmetric encryption uses one of a plurality of bit lengths selectable by a user;

    asymmetrically encrypting said first symmetric key using a public key to form asymmetric key data,wherein said public key is received by said application from a memory including a public key storage location on said computer,wherein said public key is hashed by said application to form hash of public key data; and

    constructing a modified .ZIP file format data container based on the .ZIP file format,wherein said modified .ZIP file format data container includes a central directory,wherein said central directory has been modified from the .ZIP file format to include an asymmetric key data storage location receiving and storing said asymmetric key data,wherein said modified .ZIP file format data container includes an encrypted data file storage location receiving and storing said encrypted data file,wherein said asymmetric key data storage location is logically associated with said encrypted data file storage location based on the position of said asymmetric key data storage location in said central directory and the location of said encrypted data file storage location in said modified .ZIP file format data container,wherein said central directory stores said hash of public key data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×