×

Sharing Encrypted Documents Within and Outside an Organization

  • US 20200136812A1
  • Filed: 12/30/2019
  • Published: 04/30/2020
  • Est. Priority Date: 08/10/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprises:

  • providing an information management system having a key management server, a first computing device and a second computing device;

    providing the key management server having a first secret and a first seed token;

    providing the first computing device having a first encryption service module, wherein the first encryption service module having a second secret and a second seed token;

    providing the second computing device having a second encryption service module;

    detecting a file save operation on a document by the first encryption service module;

    at the first encryption service module, collecting user information;

    at the first encryption service module, creating a document identifier for the document;

    at the first encryption service module, creating a first encryption key with the document identifier, the user information, the second seed token and the second secret;

    at the first encryption service module, creating a second encryption key;

    at the first encryption service module, encrypting the document with the second encryption key to produce encrypted content;

    at the first encryption service module, encrypting the second encryption key with the first encryption key to produce an encrypted second encryption key;

    at the first encryption service module, storing the document identifier, the user information, the first seed token, the second seed token, the encrypted second encryption key and the encrypted content in an encrypted document;

    detecting a file open operation on the encrypted document by the second encryption service module;

    at the second encryption service module, retrieving the document identifier, the user information and the first seed token in the encrypted document;

    at the second encryption service module, sending the document identifier, the user information and the first seed token to the key management server;

    at the key management server, creating a third encryption key with the document identifier, the user information, the first seed token and the first secret;

    at the second encryption service module, receiving the third encryption key from the key management server;

    at the second encryption service module, decrypting encrypted second encryption key in the encrypted document with the third encryption key to produce a fourth encryption key; and

    at the second encryption service module, decrypting encrypted content in the encrypted document with the fourth encryption key to produce unencrypted content.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×