×

Systems and methods for secure hybrid third-party data storage

  • US 9,076,004 B1
  • Filed: 05/07/2014
  • Issued: 07/07/2015
  • Est. Priority Date: 05/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for secure hybrid third-party data storage, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, at a trusted proxy system, an access request from a client system to access an encrypted file stored under a user account at a third-party storage system, wherein the requested access requires decryption of the encrypted file, wherein the trusted proxy system is owned by an owner of the encrypted file and the third-party storage system is not owned by the owner of the encrypted file;

    retrieving, in response to the request, from the third-party storage system and for the trusted proxy system;

    the encrypted file;

    a decryption key that has been encrypted with a client-side key, wherein an asymmetric key pair designated for the user account comprises an encryption key and the encrypted decryption key;

    receiving, at the trusted proxy system, the client-side key, without exposing the client-side key to the third-party storage system;

    decrypting the encrypted decryption key with the client-side key at the trusted proxy system rather than at the third-party storage system responsive to the trusted proxy system being owned by the owner of the encrypted file and the third-party storage system not being owned by the owner of the encrypted file;

    using the decryption key to access an unencrypted version of the encrypted file at the trusted proxy system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×