×

Secure file access using a file access server

  • US 8,621,036 B1
  • Filed: 11/17/2010
  • Issued: 12/31/2013
  • Est. Priority Date: 11/17/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A secure file access system, comprising:

  • a processor of a computing device;

    a file access module, executing on the processor of the computing device, configured to;

    receive a request, from a computer program executing on the computing device, to access an encrypted file, the encrypted file including an encrypted first segment and an encrypted second segment, the encrypted first segment having a different decryption key than the encrypted second segment, the encrypted first segment including or indicating file access permission data, a save date for the file, a file identifier, and a hash of at least a portion of the file;

    send an access query indicating a requested designated action to be performed on the file and including the encrypted first segment and a user identifier to a file access server via a communication network, the hash for use by the file access server to determine integrity of the access query, and the access query enabling the file access server, after decryption of the encrypted first segment using a first decryption key, to authorize or deny access to the encrypted second segment based, at least in part, on the user identifier, the hash, the file identifier, and the file access permission data, the file access permission data indicating whether a user indicated by the user identifier may perform each designated action of a set of one or more designated actions, including the requested designated action, on the file;

    receive an access reply from the file access server, the access reply indicating whether access to the encrypted second segment including the requested designated action is authorized and including key information for decrypting the encrypted second segment only if the file access server has authorized access, the key information including a second decryption key for decrypting the encrypted second segment or information enabling a second computing device to generate or access the second decryption key for decrypting the encrypted second segment;

    if access to the encrypted second segment is authorized, receive a latest version of the file at the file access module if the access query did not request the latest version of the file by way of the access server enforcing versioning control by checking a version of the file stored at a remote data store identified by the access query based on the save date and the hash and by checking the version against a latest version of the file stored at the remote data store to determine whether the access query requested the latest version of the file, and if the access query did not request the latest version of the file, then the file access server serving the latest version of the file to the computing device; and

    decrypt the encrypted second segment of the file or the latest version of the file using the second decryption key to enable the computer program to access the second segment of the file or the latest version of the file in accordance with the requested designated action.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×