Method and system for multiple asymmetric decryption of .ZIP files
First Claim
Patent Images
1. A method of providing access to data in a .Zip file format data container, said method including:
- receiving a data container constructed in accordance with a .Zip file format, said data container including a first set of encrypted data and a second set of encrypted data;
decrypting at least one of said first set of encrypted data and said second set of encrypted data to form decrypted data, wherein said decrypting includes decrypting said encrypted data using asymmetric decryption; and
providing access to said decrypted data.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
99 Citations
95 Claims
-
1. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container constructed in accordance with a .Zip file format, said data container including a first set of encrypted data and a second set of encrypted data;
decrypting at least one of said first set of encrypted data and said second set of encrypted data to form decrypted data, wherein said decrypting includes decrypting said encrypted data using asymmetric decryption; and
providing access to said decrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container including first asymmetric key data, second asymmetric key data, and an encrypted data file, wherein both said first asymmetric key data and said second asymmetric key data are associated with said encrypted data file, wherein said data container is constructed in accordance with a .Zip file format;
receiving decryption key input;
combining said decryption key input with one of said first asymmetric key data and said second asymmetric key data to form a decryption key when said decryption key input matches an input expected by one of said first asymmetric key data and said second asymmetric key data; and
decrypting said encrypted data file using said decryption key to provide access to said data file. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of providing access to data in a .Zip file format data container, said method including:
-
receiving a data container including;
first asymmetric key data;
second asymmetric key data; and
an encrypted data file, wherein said first asymmetric key data is derived from an asymmetric encryption, using a first asymmetric key, of symmetric key data formed from a symmetric key used to encrypt said encrypted data file, wherein said second asymmetric key data is derived from an asymmetric encryption, using a second asymmetric key, of said symmetric key data formed from said symmetric key used to encrypt said encrypted data file wherein said data container is constructed in accordance with a .Zip file format; and
providing the option of;
using said first asymmetric key data to recover said symmetric key to decrypt said encrypted data file when a first desired input is received; and
using said second asymmetric key data to recover said symmetric key to decrypt said encrypted data file when a second desired input is received. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method of providing access to data in a data container, said method including:
-
receiving a data container designed for containing compressed files, said data container including a first set of encrypted data and a second set of encrypted data;
decrypting at least one of said first set of encrypted data and said second set of encrypted data to form decrypted data, wherein said decrypting includes decrypting said encrypted data using asymmetric decryption; and
providing access to said decrypted data. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A method of providing access to data in a data container, said method including:
-
receiving a data container including first asymmetric key data, second asymmetric key data, and an encrypted data file, wherein both said first asymmetric key data and said second asymmetric key data are associated with said encrypted data file, wherein said data container is designed for containing compressed files; and
receiving decryption key input;
combining said decryption key input with one of said first asymmetric key data and said second asymmetric key data to form a decryption key when said decryption key input matches an input expected by one of said first asymmetric key data and said second asymmetric key data; and
decrypting said encrypted data file using said decryption key to provide access to said data file. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. A method of providing access to data in a data container, said method including:
-
receiving a data container including;
first asymmetric key data;
second asymmetric key data; and
an encrypted data file, wherein said first asymmetric key data is derived from an asymmetric encryption, using a first asymmetric key, of symmetric key data formed from a symmetric key used to encrypt said encrypted data file, wherein said second asymmetric key data is derived from an asymmetric encryption, using a second asymmetric key, of said symmetric key data formed from said symmetric key used to encrypt said encrypted data file wherein said data container is designed for containing compressed files; and
providing the option of;
using said first asymmetric key data to recover said symmetric key to decrypt said encrypted data file when a first desired input is received; and
using said second asymmetric key data to recover said symmetric key to decrypt said encrypted data file when a second desired input is received. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95)
-
Specification