Methods and apparatus to securely share data
First Claim
Patent Images
1. A method of securely sharing data, comprising:
- generating, at a first device of a first user of a cloud service, an archive file representative of a drive of the first device;
encrypting, by executing an instruction with a processor, the archive file with an encryption key to form an encrypted archive file;
wrapping, by executing an instruction with the processor, the encryption key with key data associated with a second user of the cloud service;
provisioning the encrypted archive file with the wrapped encryption key; and
conveying the provisioned, encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of the second user of the cloud service based on the wrapped encryption key, the decrypted archive file to be mounted to an operating system of the second device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device.
-
Citations
17 Claims
-
1. A method of securely sharing data, comprising:
-
generating, at a first device of a first user of a cloud service, an archive file representative of a drive of the first device; encrypting, by executing an instruction with a processor, the archive file with an encryption key to form an encrypted archive file; wrapping, by executing an instruction with the processor, the encryption key with key data associated with a second user of the cloud service; provisioning the encrypted archive file with the wrapped encryption key; and conveying the provisioned, encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of the second user of the cloud service based on the wrapped encryption key, the decrypted archive file to be mounted to an operating system of the second device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A tangible computer readable storage medium comprising instructions that, when executed, cause a first device of a first user of a cloud service to at least:
-
generate an archive file representative of a drive of the first device; encrypt, with an encryption key, the archive file to form an encrypted archive file; wrap the encryption key with key data associated with a second user of the cloud service; provision the encrypted archive file with the wrapped encryption key; and convey the provisioned, encrypted archive file to a cloud service provider of the cloud service, the encrypted archive file to be decrypted by a second device of the second user of the cloud service based on the wrapped encryption key, the decrypted archive file to be mounted to an operating system of the second device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus, comprising:
-
memory to store data associated with a first user of a cloud service; a processor; an archive generator to generate an archive file representative of first data of the memory; an encryption engine to encrypt the archive file to form an encrypted archive file with an encryption key; a trusted execution environment to; wrap the encryption key with key data associated with a second user of the cloud service; and provision the encrypted archive file with the wrapped encryption key; and a communicator to convey the provisioned, encrypted archive file to a computing device of a cloud service provider, the encrypted archive file to be decrypted by a second computing device of the second user of the cloud service based on the wrapped encryption key, the decrypted archive file to be mounted to an operating system of the second computing device;
at least one of the archive generator, the encryption engine, the trusted execution environment, and the communicator implemented by the processor. - View Dependent Claims (14, 15, 16, 17)
-
Specification