×

Transparent client-side cryptography for network applications

  • US 9,094,379 B1
  • Filed: 12/29/2010
  • Issued: 07/28/2015
  • Est. Priority Date: 12/29/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of securely storing user data over a network, the method comprising:

  • by one or more computer systems comprising computer hardware;

    intercepting user data associated with a user from a local network application, the user data sent by the local network application to a remote network application implemented in a remote content site configured to provide access to the remote network application, the remote network application capable of storing and sharing data received from the user with other users of the remote network application;

    responsive to intercepting the user data, accessing a remote network application to determine one or more data fields from a set of data fields accessible at the remote network application that are capable of accepting encrypted data, wherein at least some fields from the set of data fields are not eligible to store encrypted data, and wherein said accessing the remote network application to determine the one or more data fields further comprises overriding an indication that at least one data field is not eligible to store encrypted data and including the at least one data field in the one or more data fields that are capable of accepting encrypted data;

    determining whether the user data is associated with the one or more data fields; and

    in response to determining that the user data is associated with the one or more data fields;

    encrypting the user data with a data encryption key to obtain encrypted user data;

    encrypting the data encryption key with one or more keys of authorized recipients to produce one or more receiver keys, the authorized recipients comprising users with accounts at the remote network application who are associated with the user at the remote network application; and

    providing a message comprising the encrypted user data and the one or more receiver keys to the local network application, such that the local network application is configured to direct the message to the remote network application for storage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×