Exclusive encryption
First Claim
Patent Images
1. A system comprising:
- a source computing device to generate an encrypted directory name based on a plaintext name that conforms to a syntax; and
a recipient computing device, coupled to the source computing device, to receive the encrypted directory name, to verify that the encrypted directory name is an encryption of a plaintext name that conforms to the syntax without decrypting the encrypted directory name, and to verify that the directory name is an encryption of a plaintext name that is not a duplicative name without decrypting the encrypted directory name.
1 Assignment
0 Petitions
Accused Products
Abstract
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
-
Citations
39 Claims
-
1. A system comprising:
-
a source computing device to generate an encrypted directory name based on a plaintext name that conforms to a syntax; and
a recipient computing device, coupled to the source computing device, to receive the encrypted directory name, to verify that the encrypted directory name is an encryption of a plaintext name that conforms to the syntax without decrypting the encrypted directory name, and to verify that the directory name is an encryption of a plaintext name that is not a duplicative name without decrypting the encrypted directory name. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computing device comprising:
-
a client component to encrypt only directory entries that are syntactically legal, and to encrypt the directory entries in a manner that allows another device to verify, without decrypting the encrypted entries, that the directory entries are not identical to any other directory entries maintained by the other device; and
a server component to receive encrypted directory entries, to verify that the received encrypted directory entries are encryptions of syntactically legal directory entries, and to verify that the received encrypted directory entries are not encryptions of directory entries identical to any other directory entries maintained by the device. - View Dependent Claims (20, 21, 22)
-
-
23. A system comprising:
-
a server component;
a client component coupled to the server component; and
wherein the server component and the client component together ensure that multiple entries in a directory cannot have the same name, that all entries in the directory are syntactically legal, and that the server component does not have access to the unencrypted names of entries in the directory. - View Dependent Claims (24, 25)
-
-
26. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a device, causes the one or more processors to:
-
encrypt only directory entries that are syntactically legal;
encrypt the directory entries in a manner that allows another device to verify, without decrypting the encrypted directory entries, that the directory entries are not identical to any other directory entries maintained by the other device;
receive additional encrypted directory entries;
verify that the received additional encrypted directory entries are encryptions of syntactically legal directory entries; and
verify that the received additional encrypted directory entries are not encryptions of directory entries identical to any other directory entries maintained by the device. - View Dependent Claims (27, 28, 29)
-
-
30. A method, implemented in a device, comprising:
-
encrypting only directory entries that are syntactically legal;
encrypting the directory entries in a manner that allows each of one or more other devices to verify, without decrypting the encrypted directory entries, that the directory entries are not identical to any other directory entries maintained by the other device;
receiving additional encrypted directory entries;
verifying that the received additional encrypted directory entries are encryptions of syntactically legal directory entries; and
verifying that the received additional encrypted directory entries are not encryptions of directory entries identical to any other directory entries maintained by the device. - View Dependent Claims (31, 32, 33, 34)
-
-
35. A system comprising:
-
means for encrypting only directory entries that are syntactically legal, and for encrypting the directory entries in a manner that allows each of one or more other systems to verify, without decrypting the encrypted directory entries, that the directory entries are not identical to any other directory entries maintained by the other system;
means for receiving additional encrypted directory entries;
means for verifying that the received additional encrypted directory entries are encryptions of syntactically legal directory entries; and
means for verifying that the received additional encrypted directory entries are not encryptions of directory entries identical to any other directory entries maintained by the system. - View Dependent Claims (36, 37, 38, 39)
-
Specification