SYSTEM AND APPARATUS FOR SECURELY STORING DATA
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving data to be inserted at a designated location of a data file;
encrypting the received data using a shared key and a seed string to produce encrypted data, wherein the encrypted data is a first encryption component and the seed string is a second encryption component;
generating one or more new data file elements collectively comprising all the encryption components, wherein the encryption components are individually identifiable, and wherein the one or more new data file elements further collectively comprise a signature that allows the one or more new data file elements to be categorized as an encrypted data file element set; and
making the one or more new data file elements available for insertion into the chronological history.
1 Assignment
0 Petitions
Accused Products
Abstract
Certain aspects of the invention pertain to the field of networked computing, and in particular to the field of data file security. Methods, systems and apparatuses are disclosed for encrypting and decrypting data stored and shared on networked data file storage devices such that the data may be accessed and manipulated by multiple users.
26 Citations
25 Claims
-
1. A computer-implemented method comprising:
-
receiving data to be inserted at a designated location of a data file; encrypting the received data using a shared key and a seed string to produce encrypted data, wherein the encrypted data is a first encryption component and the seed string is a second encryption component; generating one or more new data file elements collectively comprising all the encryption components, wherein the encryption components are individually identifiable, and wherein the one or more new data file elements further collectively comprise a signature that allows the one or more new data file elements to be categorized as an encrypted data file element set; and making the one or more new data file elements available for insertion into the chronological history. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8-19. -19. (canceled)
-
20. A computer-implemented method comprising:
-
retrieving, from a data file storage medium, a chronological history of one or more data file elements corresponding to a data file; categorizing one or more data file elements collectively comprising the signature as an encrypted data file element set; identifying the encryption components comprised in the encrypted data file element set; and decrypting the encrypted data file element set using the encryption components and the secret key to produce a portion of unencrypted data.
-
-
21-23. -23. (canceled)
-
24. A system comprising one or more data processing apparatus programmed to perform operations comprising:
-
receiving data to be inserted at a designated location of a data file; encrypting the received data using a shared key and a seed string to produce encrypted data, wherein the encrypted data is a first encryption component and the seed string is a second encryption component; generating one or more new data file elements collectively comprising all the encryption components, wherein the encryption components are individually identifiable, and wherein the one or more new data file elements further collectively comprise a signature that allows the one or more new data file elements to be categorized as an encrypted data file element set; and making the one or more new data file elements available for insertion into the chronological history.
-
-
25-45. -45. (canceled)
Specification