Method and system for multiple symmetric decryption of .ZIP files
First Claim
Patent Images
1. A method of providing access to data in a .Zip file format data container, said method including:
- receiving a data container constructed in accordance with a .Zip file format, said data container including;
first symmetric key data;
second symmetric key data; and
an encrypted data file, wherein said first symmetric key data was derived by symmetrically encrypting, using a first symmetric key, an intermediate symmetric key that was used to encrypt said encrypted data file, wherein said second symmetric key data was derived by symmetrically encrypting, using a second symmetric key, said intermediate symmetric key that was used to encrypt said encrypted data file receiving a decryption key input;
providing the option of;
using said first symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired first symmetric key; and
using said second symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired second symmetric key; and
providing access to said decrypted data file.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
-
Citations
70 Claims
-
1. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container constructed in accordance with a .Zip file format, said data container including;
first symmetric key data;
second symmetric key data; and
an encrypted data file, wherein said first symmetric key data was derived by symmetrically encrypting, using a first symmetric key, an intermediate symmetric key that was used to encrypt said encrypted data file, wherein said second symmetric key data was derived by symmetrically encrypting, using a second symmetric key, said intermediate symmetric key that was used to encrypt said encrypted data file receiving a decryption key input;
providing the option of;
using said first symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired first symmetric key; and
using said second symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired second symmetric key; and
providing access to said decrypted data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container constructed in accordance with a Zip file format, said data container including;
first symmetric key data;
second symmetric key data; and
an encrypted data file, wherein said first symmetric key data was derived from a first symmetric key that was used to symmetrically encrypt said encrypted data file, wherein said second symmetric key data was derived from a second symmetric key that was used to symmetrically encrypt said encrypted data file, receiving a decryption key input;
providing the option of;
using said first symmetric key data in combination with said decryption key input to recover said first symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired first symmetric key; and
using said second symmetric key data in combination with said decryption key input to recover said second symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired second symmetric key; and
providing access to said decrypted data file. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of providing access to data in a data container, said method including:
-
receiving a data container designed for containing compressed files, said data container including;
first symmetric key data;
second symmetric key data; and
an encrypted data file, wherein said first symmetric key data was derived by symmetrically encrypting, using a first symmetric key, an intermediate symmetric key that was used to encrypt said encrypted data file wherein said second symmetric key data was derived by symmetrically encrypting, using a second symmetric key, said intermediate symmetric key that was used to encrypt said encrypted data file receiving a decryption key input;
providing the option of;
using said first symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired first symmetric key; and
using said second symmetric key data in combination with said decryption key input to recover said intermediate symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired second symmetric key; and
providing access to said decrypted data file. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A method of providing access to data in a data container, said method including:
-
receiving a data container designed for containing compressed files, said data container including;
first symmetric key data;
second symmetric key data; and
an encrypted data file, wherein said first symmetric key data was derived from a first symmetric key that was used to symmetrically encrypt said encrypted data file, wherein said second symmetric key data was derived from a second symmetric key that was used to symmetrically encrypt said encrypted data file, receiving a decryption key input;
providing the option of;
using said first symmetric key data in combination with said decryption key input to recover said first symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired first symmetric key; and
using said second symmetric key data in combination with said decryption key input to recover said second symmetric key to symmetrically decrypt said encrypted data file to form a decrypted data file when said decryption key is a desired second symmetric key; and
providing access to said decrypted data file. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
Specification