SYSTEMS AND METHODS FOR SECURE DATA SHARING
First Claim
1. A method for encrypting a data file, comprising:
- receiving a request to encrypt the data file;
retrieving a workgroup key associated with the data file;
retrieving unique information associated with the data file;
computing a hash value of the workgroup key;
combining the hash value of the workgroup key and the unique information to form a file-level key; and
encrypting the data file based on the file-level key.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with the data file. The sharable file-level key may be used to encrypt and split data using a Secure Parser. Systems and methods are also provided for sharing data without replicating the data on the machine of the end user. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data that was encrypted and split. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.
206 Citations
28 Claims
-
1. A method for encrypting a data file, comprising:
-
receiving a request to encrypt the data file; retrieving a workgroup key associated with the data file; retrieving unique information associated with the data file; computing a hash value of the workgroup key; combining the hash value of the workgroup key and the unique information to form a file-level key; and encrypting the data file based on the file-level key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for encrypting a data file, the comprising a processor configured to:
-
receive a request to encrypt the data file; retrieve a workgroup key associated with the data file; retrieve unique information associated with the data file; compute a hash value of the workgroup key; combine the hash value of the workgroup key and the unique information to form a file-level key; and encrypt the data file based on the file-level key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for securely sharing a data set, comprising:
-
encrypting the data set using at least one cryptographic key; generating a random or pseudo-random value distributing, based at least in part on the random or pseudorandom value, the encrypted data in the data set into two or more shares; distributing the two or more data shares across at least one consumer storage location and at least one enterprise storage location; generating permissions associated with the data set; generating a computing image; distributing the computing image to users associated with the at least one consumer storage location; and using the computing image, providing access to the data set based on the permissions. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A system for securely sharing a data set, the system comprising a server configured to:
-
encrypt the data set using at least one cryptographic stored on a key manager; generate a random or pseudo-random value distribute, based, at least in part, on the random or pseudorandom value, encrypted data in the data set into two or more shares; distribute the two or more data shares across at least one consumer storage location and at least one enterprise storage location; generate permissions associated with the data set; generate a computing image; distribute the computing image to users associated with the at least one consumer storage location; and using the computing image, provide access to the data set based on the permissions. - View Dependent Claims (24, 25, 26, 27, 28)
-
Specification