Method and apparatus for a transaction-based secure storage file system
First Claim
Patent Images
1. A method for generating a secure storage file system, comprising:
- encrypting data using a symmetric key to obtain encrypted data;
encrypting the symmetric key using a public key to obtain an encrypted symmetric key;
storing the encrypted data and the encrypted symmetric key as part of the secure storage file system if the public key is associated with a user who only has read permission;
generating an encrypted hashed data if the public key is associated with a user who has write permission; and
storing the encrypted data, the encrypted symmetric key, and the encrypted hashed data as part of the secure storage file system if the public key is associated with the user who has write permission.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for generating a secure storage file system, including encrypting data using a symmetric key to obtain encrypted data, encrypting the symmetric key using a public key to obtain an encrypted symmetric key, storing the encrypted data and the encrypted symmetric key if the public key is associated with a user who only has read permission, generating an encrypted hashed data if the public key is associated with a user who has write permission, and storing the encrypted data, the encrypted symmetric key, and the encrypted hash data if the public key is associated with the user who has write permission.
-
Citations
35 Claims
-
1. A method for generating a secure storage file system, comprising:
-
encrypting data using a symmetric key to obtain encrypted data; encrypting the symmetric key using a public key to obtain an encrypted symmetric key; storing the encrypted data and the encrypted symmetric key as part of the secure storage file system if the public key is associated with a user who only has read permission; generating an encrypted hashed data if the public key is associated with a user who has write permission; and storing the encrypted data, the encrypted symmetric key, and the encrypted hashed data as part of the secure storage file system if the public key is associated with the user who has write permission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system generating a secure storage file system, comprising:
-
a processor; a memory; a storage device; a computer display; and software instructions stored in the memory for enabling the computer system under control of the processor, to perform; encrypting data using a symmetric key to obtain encrypted data; encrypting the symmetric key using a public key to obtain an encrypted symmetric key; storing the encrypted data and the encrypted symmetric key as part of the secure storage file system if the public key is associated with a user who only has read permission; generating an encrypted hashed data if the public key is associated with a user who has write permission; and storing the encrypted data, the encrypted symmetric key, and the encrypted hashed data as part of the secure storage file system if the public key is associated with the user who has write permission. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A secure storage file system comprising:
-
a storage provider storing encrypted data, wherein storing the encrypted data comprises; encrypting data using a symmetric key to obtain encrypted data; encrypting the symmetric key using a public key to obtain an encrypted symmetric key; storing the encrypted data and the encrypted symmetric key as part of the secure storage file system if the public key is associated with a user who only has read permission; generating an encrypted hashed data if the public key is associated with a user who has write permission; and storing the encrypted data, the encrypted symmetric key, and the encrypted hashed data as part of the secure storage file system if the public key is associated with the user who has write permission; and a client device, wherein the client device comprises a client kernel for encrypting and decrypting the encrypted data, and a client application using the encrypted data. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for updating a data view in a secure storage file system, comprising:
-
requesting an encrypted data, an encrypted symmetric key, an encrypted hashed data, and a transaction list associated with the encrypted data from a storage provider, wherein the storage provider stores the encrypted data using the secure storage file systems wherein the data is encrypted using the symmetric key, and wherein the symmetric key is encrypted using a public key; decrypting the encrypted symmetric key associated with the encrypted data using a private key associated with the public key to obtain the symmetric key; decrypting the encrypted data using the symmetric key to obtain a data view; verifying a transaction within the transaction list to determine if an author of the transaction had write permission at the time of the transaction, wherein verifying the transaction comprises determining whether the encrypted hashed data is correct; and updating the data view according to the transaction if the transaction is verified. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
-
35. An apparatus for generating a secure storage file system, comprising:
-
means for encrypting data using a symmetric key to obtain encrypted data; means for encrypting the symmetric key using a public key to obtain an encrypted symmetric key; means for storing the encrypted data and the encrypted symmetric key as part of the secure storage file system if the public key is associated with a user who only has read permission; means for generating an encrypted hashed data if the public key is associated with a user who has write permission; and means for storing the encrypted data, the encrypted symmetric key, and the encrypted hash data as part of the secure storage file system if the public key is associated with the user who has write permission.
-
Specification