Method and system for mixed symmetric and asymmetric decryption of .ZIP files
First Claim
Patent Images
1. A method of providing access to data in a .Zip file format data container, said method including:
- receiving a data container constructed in accordance with a .Zip file format, said data container including;
symmetric key data;
asymmetric key data; and
an encrypted data file, wherein said symmetric key data is derived from a symmetric key used to symmetrically encrypt a data file to form said encrypted data file, wherein said asymmetric key data is derived from an asymmetric encryption performed on said symmetric key data;
receiving a decryption key input; and
providing the option of;
using said asymmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired asymmetric key; and
using said symmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired symmetric key; and
providing access to said decrypted data file.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
-
Citations
35 Claims
-
1. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container constructed in accordance with a .Zip file format, said data container including;
symmetric key data;
asymmetric key data; and
an encrypted data file, wherein said symmetric key data is derived from a symmetric key used to symmetrically encrypt a data file to form said encrypted data file, wherein said asymmetric key data is derived from an asymmetric encryption performed on said symmetric key data;
receiving a decryption key input; and
providing the option of;
using said asymmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired asymmetric key; and
using said symmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired symmetric key; and
providing access to said decrypted data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of providing access to data in a data container, said method including:
-
receiving a data container designed for containing compressed files, said data container including;
symmetric key data;
asymmetric key data; and
an encrypted data file, wherein said symmetric key data is derived from a symmetric key used to symmetrically encrypt a data file to form said encrypted data file, wherein said asymmetric key data is derived from an asymmetric encryption performed on said symmetric key data;
receiving a decryption key input; and
providing the option of;
using said asymmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired asymmetric key input; and
using said symmetric key data in combination with said decryption key input to recover said symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key input is a desired symmetric key input; and
providing access to said decrypted data file. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification