System and method for secure storage, transfer and retrieval of content addressable information
First Claim
1. A method of managing a plurality of digital assets stored in a computer system comprising at least a first computer, each of the plurality of digital assets accessible via a corresponding identifier generated based on at least a portion of the contents of the digital asset, the plurality of digital assets comprising a first digital asset, the first digital asset comprising encrypted data and having associated metadata, wherein the first digital asset is stored in an encrypted format, the method comprising acts of:
- (A) creating a first descriptor file that comprises at least some of the metadata associated with the first digital asset, including the corresponding identifier of the first digital asset, and at least one searchable keyword that describes the encrypted data of the first digital asset; and
(B) storing the first descriptor file on the computer system, wherein the first descriptor file is accessible as one of the plurality of digital assets via a corresponding identifier for the first descriptor file generated based on at least a portion of the contents of the first descriptor file, and wherein the first descriptor file is stored in an unencrypted format; and
(C) creating the corresponding identifier for the first descriptor file, the corresponding identifier being a unique identifier comprising information that identifies the first descriptor file as belonging to a class of digital assets that comprise metadata relating to other digital assets.
2 Assignments
0 Petitions
Accused Products
Abstract
An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
-
Citations
15 Claims
-
1. A method of managing a plurality of digital assets stored in a computer system comprising at least a first computer, each of the plurality of digital assets accessible via a corresponding identifier generated based on at least a portion of the contents of the digital asset, the plurality of digital assets comprising a first digital asset, the first digital asset comprising encrypted data and having associated metadata, wherein the first digital asset is stored in an encrypted format, the method comprising acts of:
-
(A) creating a first descriptor file that comprises at least some of the metadata associated with the first digital asset, including the corresponding identifier of the first digital asset, and at least one searchable keyword that describes the encrypted data of the first digital asset; and (B) storing the first descriptor file on the computer system, wherein the first descriptor file is accessible as one of the plurality of digital assets via a corresponding identifier for the first descriptor file generated based on at least a portion of the contents of the first descriptor file, and wherein the first descriptor file is stored in an unencrypted format; and (C) creating the corresponding identifier for the first descriptor file, the corresponding identifier being a unique identifier comprising information that identifies the first descriptor file as belonging to a class of digital assets that comprise metadata relating to other digital assets. - View Dependent Claims (2, 3, 4, 5)
-
-
6. At least one non-transitory computer readable medium encoded with instruction that, when executed on a computer system, perform a method of managing a plurality of digital assets stored in the computer system, wherein the computer system comprises at least a first computer, the plurality of digital assets comprising a first digital asset, the first digital asset comprising encrypted data and having associated metadata, wherein the first digital asset is stored in an encrypted format and is accessible via a corresponding identifier generated based on at least a portion of the contents of the digital asset, the method comprising acts of:
-
(A) creating a first descriptor file that comprises the corresponding identifier of the first digital asset and at least some of the metadata associated with the first digital asset, including at least one searchable keyword that describes the encrypted data of the first digital asset; and (B) storing the first descriptor file on the computer system, wherein the first descriptor file is accessible to a file system of the computer system as one of the plurality of digital assets via a corresponding identifier for the first descriptor file generated based on at least a portion of the contents of the first descriptor file, and wherein the first descriptor file is stored in an unencrypted format; and (C) creating the corresponding identifier for the first descriptor file, the corresponding identifier being a unique identifier comprising information that identifies the first descriptor file as belonging to a class of digital assets that comprise metadata relating to other digital assets. - View Dependent Claims (7, 8, 9, 10)
-
-
11. At least one computer, in a computer system, for managing a plurality of digital assets stored in the computer system, each of the plurality of digital assets accessible via an identifier of a first type, wherein the plurality of digital assets comprises a first digital asset, the first digital asset comprising encrypted data and having associated metadata, wherein the first digital asset is stored in an encrypted format, the at least one computer comprising:
-
at least one storage device; and at least one controller, coupled to the at least one storage device, that; (A) creates a first descriptor file that comprises at least the identifier associated with the first digital asset and at least one searchable keyword that describes the encrypted data of the first digital asset; and (B) stores, on the at least one storage device, the first descriptor file, wherein the first descriptor file is accessible as one of the plurality of digital assets via an identifier of the first type, and wherein the first descriptor file is stored in an unencrypted format; and (C) creates the corresponding identifier for the first descriptor file, the corresponding identifier being a unique identifier comprising information that identifies the first descriptor file as belonging to a class of digital assets that comprise metadata relating to other digital assets. - View Dependent Claims (12, 13, 14, 15)
-
Specification