Exclusive encryption
First Claim
Patent Images
1. A method comprising:
- receiving an encrypted identifier;
decrypting the encrypted identifier;
decoding the decrypted identifier; and
demapping the decoded decrypted identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
98 Citations
37 Claims
-
1. A method comprising:
-
receiving an encrypted identifier;
decrypting the encrypted identifier;
decoding the decrypted identifier; and
demapping the decoded decrypted identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to perform acts including:
-
receiving an encrypted directory entry;
decrypting the encrypted directory entry;
decoding the decrypted directory entry; and
demapping the decoded decrypted directory entry. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system comprising:
-
means for receiving an encrypted identifier;
means for decrypting the encrypted identifier;
means for decoding the decrypted identifier; and
means for demapping the decoded decrypted identifier. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system comprising:
-
an interface to receive an encrypted identifier;
a decryption module, coupled to the interface, to decrypt the encrypted identifier;
a decoding module, coupled to the decryption module, to decode the decrypted identifier; and
a demapping module, coupled to the decoding module, to demap the decoded decryted identifier. - View Dependent Claims (34, 35, 36, 37)
-
Specification