SEAMLESS SECURE PRIVATE COLLABORATION ACROSS TRUST BOUNDARIES
First Claim
1. A system associated with a user, comprising:
- one or more network interfaces adapted to communicate data over a computer network;
a processor coupled to the network interfaces and adapted to execute one or more processes; and
a memory configured to store a process executable by the processor, the process when executed operable to;
determine whether a selection is received to share or securely share an object that is synchronized across systems associated with the user over the computer network,provide access to the object on systems associated with the user and on other systems associated with a different user in response to determining that the selection is received to share the object,provide access to the object, utilizing a password, on systems associated with the user and other systems associated with the different user in response to determining that the selection is received to securely share the object, andin response to determining the selection is not received to share or securely share the object, maintain the object across the systems associated with the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored within the file itself, without giving away secret data. User specific personal keys are preferably only stored on the users'"'"' device(s). A unique ID is also created for each protected file; a password is generated that depends on (a) a key value that can either be (i) the user'"'"'s personal key in the case of a file that is to be private or (ii) a shared key in the case of a file that is to be shared with other users, and (b) the unique file ID. The password is then encrypted using a recovery key and also stored in the file itself. The file is secured using a format that supports password-based content encryption.
52 Citations
8 Claims
-
1. A system associated with a user, comprising:
-
one or more network interfaces adapted to communicate data over a computer network; a processor coupled to the network interfaces and adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; determine whether a selection is received to share or securely share an object that is synchronized across systems associated with the user over the computer network, provide access to the object on systems associated with the user and on other systems associated with a different user in response to determining that the selection is received to share the object, provide access to the object, utilizing a password, on systems associated with the user and other systems associated with the different user in response to determining that the selection is received to securely share the object, and in response to determining the selection is not received to share or securely share the object, maintain the object across the systems associated with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification