SHARING ENCRYPTED DATA WITH ENHANCED SECURITY
First Claim
1. A computer-implemented method, comprising:
- generating an encryption key based on a password;
encrypting plain-text data to generate an output file including encrypted data, at a first computing device, using the encryption key to generate encrypted data;
communicating the output file from the first computing device to a second computing device; and
communicating the encryption key from the first computing device to the second computer, wherein the encryption key is configured to enable generation of the plain-text data from the output file.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are described herein for sharing encrypted data with enhanced security. In some configurations, an encryption key is generated from a password by the use of a password-based key generation technology. In addition, input data is encrypted using the encryption key. The encrypted data and the generated key may be then shared with a remote computer, such as a server. The encrypted data can then be decrypted at the remote computer by the use of the key. By the use of the technologies described herein, the contents of an encrypted file may be accessed at a remote computer without requiring a user to share the actual password.
25 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
generating an encryption key based on a password; encrypting plain-text data to generate an output file including encrypted data, at a first computing device, using the encryption key to generate encrypted data; communicating the output file from the first computing device to a second computing device; and communicating the encryption key from the first computing device to the second computer, wherein the encryption key is configured to enable generation of the plain-text data from the output file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device, comprising:
-
a processor; a memory having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to:
-
generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification