Stacked encryption
DCFirst Claim
Patent Images
1. A collaboration service comprising:
- one or more processors;
a project database to store projects that each include a digital asset; and
a communication component to connect the collaboration service to a first collaborator device and a second collaborator device,wherein the first collaborator device to create the digital asset to be stored on the project database as a stacked file that includes an encrypted portion and an unencrypted portion so that the second collaborator device can only access the unencrypted portion when a runtime environment is properly installed; and
wherein the unencrypted portion of the stacked file is readable by an application running on the second collaborator device when the runtime environment is not properly installed and presents within the application a set of instructions to download the runtime environment.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Various embodiments of the present technology generally relate to file sharing, encryption, and protection of digital assets. More specifically, some embodiments of the present technology relate to computer files comprising an unencrypted file combined with an encrypted file, and methods for creation of such combined files. The unencrypted file can be read by target applications and can present a variety of information (e.g., contact information, registration information, etc.). The encrypted data may be accessed only when the proper management software, drivers, application programming interfaces, and other components of a runtime environment have been installed on a computing device.
-
Citations
36 Claims
-
1. A collaboration service comprising:
-
one or more processors; a project database to store projects that each include a digital asset; and a communication component to connect the collaboration service to a first collaborator device and a second collaborator device, wherein the first collaborator device to create the digital asset to be stored on the project database as a stacked file that includes an encrypted portion and an unencrypted portion so that the second collaborator device can only access the unencrypted portion when a runtime environment is properly installed; and wherein the unencrypted portion of the stacked file is readable by an application running on the second collaborator device when the runtime environment is not properly installed and presents within the application a set of instructions to download the runtime environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
stacking an unencrypted file with an encrypted file; and combining the unencrypted file with the encrypted file to form a single combined file; wherein the single combined file includes a marker separating the unencrypted file from the encrypted file and indicates to a computer program reading the single combined file to read the unencrypted file, but not read the encrypted file. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for reading a stacked file having an encrypted file portion and an unencrypted file portion, the method comprising:
-
creating a sandbox within portion of volatile memory and nonvolatile memory of a machine; encapsulating an instance of an application within the sandbox; decrypting, using a kernel driver installed on the machine, the encrypted file portion; and allowing communications into and out of the sandbox with the use of an application programming interface. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A collaboration service comprising:
-
one or more processors; a project database to store projects that each include a digital asset; and a communication component to connect the collaboration service to a first collaborator device and a second collaborator device, wherein the first collaborator device to create the digital asset to be stored on the project database as a stacked file that includes an encrypted portion and an unencrypted portion so that the second collaborator device can only access the unencrypted portion when a runtime environment is properly installed; and wherein the runtime environment on the second collaborator device includes a sentinel to identify a stacked file type is being opened and launch an encapsulated instance of an application within a sandbox. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
stacking an unencrypted file with an encrypted file; and combining the unencrypted file with the encrypted file to form a single combined file; wherein the unencrypted file displays as a three-dimensional business card that includes instructions on subscribing to a cloud-based collaboration service. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A method comprising:
-
stacking an unencrypted file with an encrypted file; combining the unencrypted file with the encrypted file to form a single combined file; generating a hash of a file to be encrypted; assigning an identifier to the file; and retrieving an encryption key to generate the encrypted file. - View Dependent Claims (31, 32, 33)
-
-
34. A method comprising:
-
stacking an unencrypted file with an encrypted file; and combining the unencrypted file with the encrypted file to form a single combined file; wherein the encrypted file is a three-dimensional design. - View Dependent Claims (35, 36)
-
Specification