SYSTEMS AND METHODS FOR PROVIDING FILE LEVEL SECURITY
First Claim
1. A computer-implemented method of providing file level security, the method comprising:
- at a network-based file storage and retrieval system including at least one processor and memory storing instructions, the at least one processor executing the instructions to perform the operations of;
authenticating a user to said system;
causing said processor to operate in a secure file uploading mode, including;
receiving a user selection of a target upload file;
shredding said target upload file into a plurality of file shreds;
adding non-operational bits of data to each file shred;
encrypting each file shred; and
separately storing said encrypted file shreds in a plurality of data storage locations.
0 Assignments
0 Petitions
Accused Products
Abstract
Storage end points, whether they are local, remote, network, or cloud, such as DROPBOX and APPLE, present security issues for the general public and corporate consumers. These storage end points are not always encrypted. Even when the end user does perform encryption, the drawback to normal implementations is that the entirety of the file, the file key, and the key store are encrypted and stored in a single location. Computers can be hacked and encryption can be broken when given access and time. Disclosed is a system and method that enhances file level security by shredding the file, file pointers, and key store into parts, allowing the parts to be stored in different storage end points specified by the user.
26 Citations
16 Claims
-
1. A computer-implemented method of providing file level security, the method comprising:
at a network-based file storage and retrieval system including at least one processor and memory storing instructions, the at least one processor executing the instructions to perform the operations of; authenticating a user to said system; causing said processor to operate in a secure file uploading mode, including; receiving a user selection of a target upload file; shredding said target upload file into a plurality of file shreds; adding non-operational bits of data to each file shred; encrypting each file shred; and separately storing said encrypted file shreds in a plurality of data storage locations. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
2. The method of claim 2, further comprising:
causing said processor to operate in a secure file downloading mode, including; receiving a user selection of a target download file; establishing data communication with a plurality of data storage locations containing separately stored encrypted file shreds of said target download file; decrypting said separately stored encrypted file shreds of said target download file; removing non-operational bits of data from each file shred of said target download file; reforming said target download file from said file shreds of said target download file; and presenting said reformed target download file to a user. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
Specification