UPLOAD AND DOWNLOAD STREAMING ENCRYPTION TO/FROM A CLOUD-BASED PLATFORM
First Claim
1. A computer-implemented encryption method for recovering from a compromised key from an encryption key pool in a cloud-based collaborative platform comprising:
- identifying a plurality of data files, the data files encrypted with a first plurality of encryption keys;
determining a plurality of encryption key files, wherein the plurality of encryption key files comprise the first plurality of encryption keys encrypted with the compromised key;
determining a first plurality of corrective action criteria for an encryption key pool;
determining a second plurality of corrective action criteria for the plurality of encrypted data files;
determining a third plurality of corrective action criteria for the plurality of encryption key files;
adjusting the encryption key pool based on the first plurality of corrective action criteria;
adjusting the plurality of encrypted data files based on the second plurality of corrective action criteria; and
adjusting the plurality of encryption key files based on the third plurality of corrective action criteria;
wherein, the data files are accessed by and/or collaborated upon among multiple users or collaborators in the cloud-based encryption platform.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption process includes the following parts: Upload encryption, download decryption, and a central piece of infrastructure called the Interval Key Server (IKS). During both upload and download, the encryption and decryption processes are performed while the files are being uploaded/downloaded, (e.g., the files are being encrypted/decrypted as they are being streamed).
-
Citations
5 Claims
-
1. A computer-implemented encryption method for recovering from a compromised key from an encryption key pool in a cloud-based collaborative platform comprising:
-
identifying a plurality of data files, the data files encrypted with a first plurality of encryption keys; determining a plurality of encryption key files, wherein the plurality of encryption key files comprise the first plurality of encryption keys encrypted with the compromised key; determining a first plurality of corrective action criteria for an encryption key pool; determining a second plurality of corrective action criteria for the plurality of encrypted data files; determining a third plurality of corrective action criteria for the plurality of encryption key files; adjusting the encryption key pool based on the first plurality of corrective action criteria; adjusting the plurality of encrypted data files based on the second plurality of corrective action criteria; and adjusting the plurality of encryption key files based on the third plurality of corrective action criteria; wherein, the data files are accessed by and/or collaborated upon among multiple users or collaborators in the cloud-based encryption platform. - View Dependent Claims (2, 3, 4, 5)
-
Specification