Seamless Remote Storage of Uniformly Encrypted Data for Diverse Platforms and Devices
First Claim
1. A method for remotely storing user data having uniform encryption among a plurality of devices, the method comprising:
- opening a first communication channel between a user device and an intermediate processing module;
receiving user account information from the user device over the first communication channel for temporary use at the intermediate processing module, wherein the user account information includes at least a user account encryption key;
receiving user data for remote storage from the user device at the intermediate processing module;
encrypting the user data at the intermediate processing module using the received user account encryption key;
opening a second communication channel between the intermediate processing module and a destination storage, wherein the second communication channel is opened after authentication of a user account using the received user account information;
transferring the encrypted user data from the intermediate processing module to the destination storage; and
removing the user account information from the intermediate processing module.
0 Assignments
0 Petitions
Accused Products
Abstract
A way of providing seamless remote data storage and access with a universal encryption key is provided. Data may be able to be uploaded from and/or downloaded to a variety of user devices and/or types of user devices. During transfer of data, a secure communication channel may be established between a user device and a destination storage. Data may be compressed and/or encrypted before being passed to the destination storage. Such compression and/or encryption may be performed at the user device or an intermediate processing module. Likewise, when downloading data, the data may be decompressed and/or decrypted before being made available to a destination user device. Such decompression and/or decryption may be performed at the destination device or the intermediate processing module. In any case, the universal encryption key may be utilized by all user devices to generate uniformly encrypted data.
-
Citations
21 Claims
-
1. A method for remotely storing user data having uniform encryption among a plurality of devices, the method comprising:
-
opening a first communication channel between a user device and an intermediate processing module; receiving user account information from the user device over the first communication channel for temporary use at the intermediate processing module, wherein the user account information includes at least a user account encryption key; receiving user data for remote storage from the user device at the intermediate processing module; encrypting the user data at the intermediate processing module using the received user account encryption key; opening a second communication channel between the intermediate processing module and a destination storage, wherein the second communication channel is opened after authentication of a user account using the received user account information; transferring the encrypted user data from the intermediate processing module to the destination storage; and removing the user account information from the intermediate processing module. - View Dependent Claims (2, 3, 4, 5, 6, 21)
-
-
7. A method of opening a communication channel for access to a remote server from a user device associated with a user, the method comprising:
-
encrypting a set of user account information using a private encryption key; generating a concatenated string that comprises the encrypted set of user account information; encrypting the concatenated string using a shared encryption key that is based at least partly on a dynamic string; and sending the encrypted concatenated string to the remote server for authentication. - View Dependent Claims (8, 9, 10, 11, 13)
-
-
12. (canceled)
-
14. A method of opening a communication channel between a remote storage and a user device associated with a user, the method comprising:
-
receiving an encrypted concatenated string from the user device for authentication, wherein the encrypted concatenated string includes at least some user account information that is encrypted using a user account encryption key; decrypting the encrypted concatenated string using a shared encryption key that is generated using a dynamic string; and retrieving a set of user account information from the decrypted concatenated string for authenticating user access. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification