Secure storage for shared documents
First Claim
1. A method for managing data storage using a network computer that performs actions, comprising:
- providing data and a public key to a secure storage application, wherein the data and the public key are provided by a user or an application;
generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on an identifier that is included in the instruction set information;
extracting a pass phrase from the seed file based on an offset value and a length value that are included in the instruction set information;
generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file;
launching and executing an encryption engine, on the network computer, to encrypt the data using the encryption key;
generating header information that includes the instruction set, wherein the header information is encrypted using the public key; and
generating a secure bundle that includes the public key, the encrypted header information, and the encrypted data, wherein the secure bundle is provided to the user that provided the data and the public key or the application that provided the data and the public key.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.
39 Citations
26 Claims
-
1. A method for managing data storage using a network computer that performs actions, comprising:
-
providing data and a public key to a secure storage application, wherein the data and the public key are provided by a user or an application; generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on an identifier that is included in the instruction set information; extracting a pass phrase from the seed file based on an offset value and a length value that are included in the instruction set information; generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; launching and executing an encryption engine, on the network computer, to encrypt the data using the encryption key; generating header information that includes the instruction set, wherein the header information is encrypted using the public key; and generating a secure bundle that includes the public key, the encrypted header information, and the encrypted data, wherein the secure bundle is provided to the user that provided the data and the public key or the application that provided the data and the public key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for managing data storage, comprising:
-
a network computer, comprising; a transceiver that communicates over the network; a memory that stores at least instructions; and a processor device that executes instructions that perform actions, including; providing data and a public key to a secure storage application, wherein the data and the public key are provided by a user or an application; generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on an identifier that is included in the instruction set information; extracting a pass phrase from the seed file based on an offset value and a length value that are included in the instruction set information; generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; launching and executing an encryption engine, on the network computer, to encrypt the data using the encryption key; generating header information that includes the instruction set, wherein the header information is encrypted using the public key; and generating a secure bundle that includes the public key, the encrypted header information, and the encrypted data, wherein the secure bundle is provided to the user that provided the data and the public key or the application that provided the data and the public key; and a client computer, comprising; a second transceiver that communicates over the network; a second memory that stores at least instructions; and a second processor device that executes instructions that perform actions, including; providing the data and the public key to the secure storage application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A processor readable non-transitory storage media that includes instructions for managing data storage, wherein execution of the instructions by a hardware processor performs actions, comprising:
-
providing data and a public key to a secure storage application, wherein the data and the public key are provided by a user or an application; generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on an identifier that is included in the instruction set information; extracting a pass phrase from the seed file based on an offset value and a length value that are included in the instruction set information; generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; launching and executing an encryption engine, on a network computer, to encrypt the data using the encryption key; generating header information that includes the instruction set, wherein the header information is encrypted using the public key; and generating a secure bundle that includes the public key, the encrypted header information, and the encrypted data, wherein the secure bundle is provided to the user that provided the data and the public key or the application that provided the data and the public key. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A network computer for managing data storage, comprising:
-
a transceiver that communicates over the network; a memory that stores at least instructions; and a processor device that executes instructions that perform actions, including; providing data and a public key to a secure storage application, wherein the data and the public key are provided by a user or an application; generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on an identifier that is included in the instruction set information; extracting a pass phrase from the seed file based on an offset value and a length value that are included in the instruction set information; generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; launching and executing an encryption engine, on the network computer, to encrypt the data using the encryption key; generating header information that includes the instruction set, wherein the header information is encrypted using the public key; and generating a secure bundle that includes the public key, the encrypted header information, and the encrypted data, wherein the secure bundle is provided to the user that provided the data and the public key or the application that provided the data and the public key. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification