×

Encrypted key cache

  • US 7,886,364 B2
  • Filed: 08/18/2005
  • Issued: 02/08/2011
  • Est. Priority Date: 03/26/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. One or more non-transitory computer storage media having stored thereon a plurality of instructions that, when executed by one or more processors of a computer, cause the one or more processors to perform the following acts:

  • receive a request, corresponding to a user, to access an encrypted file;

    obtain an access control entry (ACE) from an access control list (ACL) of a plurality of ACEs, the ACE corresponding to both the user and the requested encrypted file, wherein the ACE includes an encrypted version of a symmetric key that was used to encrypt the encrypted file;

    access an encrypted key cache, the encrypted key cache having multiple ACE-to-symmetric-key-mapped entries, each entry having a reference to one or more ACEs mapped to at least one unencrypted symmetric key;

    identify at least one entry of the multiple ACE-to-symmetric-key-mapped entries of the encrypted key cache that has a reference to an ACE that both matches the ACE of the ACL and is mapped to an unencrypted symmetric key that matches the symmetric key that was used to encrypt the encrypted file;

    responsive to identifying the at least one identified entry, decrypt the encrypted file using the mapped unencrypted symmetric key from the identified entry of the encrypted key cache; and

    responsive to failing to identify the at least one identified entry, decrypt the encrypted symmetric key from the ACE of the ACL and decrypt the unencrypted file using the decrypted symmetric key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×