Secure Peer-to-Peer Distribution of an Updatable Keyring
First Claim
1. A first computerized device for documents comprising:
- a processing unit; and
data storage having stored thereon at least executable program code,the program code configured to cause the processing unit to generate a keyring feed for storing object keys as one or more respective keyring entries by performing steps of;
generating a feed object comprising an entry key;
generating a first key based on contents of the feed object, wherein the first key comprises information to decrypt an encrypted form of the feed object;
generating a first keyring entry comprising an encrypted form of the first key, wherein the entry key is configured to decrypt the encrypted form of the first key, wherein the first keyring entry is associated with the feed object;
transmitting the encrypted form of the feed object to any computerized device that is in communication with the first computerized device; and
transmitting the first keyring entry to said any computerized device,wherein the encrypted form of the first feed object and the first keyring entry are backed up on said any computerized device,wherein the feed object is subsequently associated with a plurality of keyring entries, each keyring entry comprising an object key in encrypted form which can be decrypted using the entry key,wherein each object key is used to access an object file.
1 Assignment
0 Petitions
Accused Products
Abstract
A distributed peer-to-peer document archive system provides version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems. A “keyring” is an encrypted repository that allows a user to recover and access a user'"'"'s entire digital archive with a single master key. After the key is created, it does not need to be updated, and can be stored in a safe, safety-deposit box or other secure location. In the event the user'"'"'s computer is stolen or destroyed, the user need only install the system on a new machine and import the master key. The system will then use that key to browse nearby servers to find and decrypt all files necessary to recreate the full digital archive in its most recent state.
72 Citations
11 Claims
-
1. A first computerized device for documents comprising:
-
a processing unit; and data storage having stored thereon at least executable program code, the program code configured to cause the processing unit to generate a keyring feed for storing object keys as one or more respective keyring entries by performing steps of; generating a feed object comprising an entry key; generating a first key based on contents of the feed object, wherein the first key comprises information to decrypt an encrypted form of the feed object; generating a first keyring entry comprising an encrypted form of the first key, wherein the entry key is configured to decrypt the encrypted form of the first key, wherein the first keyring entry is associated with the feed object; transmitting the encrypted form of the feed object to any computerized device that is in communication with the first computerized device; and transmitting the first keyring entry to said any computerized device, wherein the encrypted form of the first feed object and the first keyring entry are backed up on said any computerized device, wherein the feed object is subsequently associated with a plurality of keyring entries, each keyring entry comprising an object key in encrypted form which can be decrypted using the entry key, wherein each object key is used to access an object file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A first computerized device for documents comprising:
-
a processing unit; and data storage having stored thereon at least executable program code, the program code configured to cause the processing unit to generate a keyring feed for storing object keys as one or more respective keyring entries by performing steps of; in response to a user initiating a user session, obtaining a first key based on information received from the user; using information comprising the first key, decrypting a first encrypted file to produce a feed object, the first encrypted file identified based on the information comprising the first key, the feed object comprising an entry key, the feed object being associated with a plurality of keyring entries; and for each keyring entry decrypting an encrypted form of an object key contained is said each keyring entry using the entry key to obtain the object key and transmitting a second encrypted file identified based on information contained in the object to key to any computerized device that is in communication with the first computerized device. - View Dependent Claims (11)
-
Specification