Systems and methods for secure data sharing
First Claim
1. A method for encrypting data, comprising:
- receiving, using a hardware processor, a request to encrypt the data;
retrieving a workgroup key associated with the data;
generating a file-level key based on unique information associated with the data and the workgroup key, wherein the data is encrypted based on the file-level key;
receiving a request from an entity to access the encrypted data, wherein the entity is not a member of a workgroup associated with the workgroup key; and
sharing the file-level key with the entity.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key associated with the data file and unique information associated with the data file. The file-level key may be used to encrypt and split data. Systems and methods are also provided for sharing data without replicating the data on an end user machine. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.
-
Citations
19 Claims
-
1. A method for encrypting data, comprising:
-
receiving, using a hardware processor, a request to encrypt the data; retrieving a workgroup key associated with the data; generating a file-level key based on unique information associated with the data and the workgroup key, wherein the data is encrypted based on the file-level key; receiving a request from an entity to access the encrypted data, wherein the entity is not a member of a workgroup associated with the workgroup key; and sharing the file-level key with the entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for encrypting data, comprising a hardware processor configured to:
-
receive a request to encrypt the data; retrieve a workgroup key associated with the data; generate a file-level key based on unique information associated with the data and the workgroup key, wherein the data is encrypted based on the file-level key; receive a request from an entity to access the encrypted data, wherein the entity is not a member of a workgroup associated with the workgroup key; and share the file-level key with the entity. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium comprising instructions that, when executed by processing circuitry, cause a computer system to carry out a method for secure workgroup communication, the method comprising:
-
receiving, using a hardware processor, a request to encrypt the data; retrieving a workgroup key associated with the data; generating a file-level key based on unique information associated with the data and the workgroup key, wherein the data is encrypted based on the file-level key; receiving a request from an entity to access the encrypted data, wherein the entity is not a member of a workgroup associated with the workgroup key; and sharing the file-level key with the entity.
-
Specification