×

File sharing with client side encryption

  • US 9,537,918 B2
  • Filed: 10/02/2013
  • Issued: 01/03/2017
  • Est. Priority Date: 10/02/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for sharing encrypted data within a client-server distributed data storage system, the method comprising:

  • encrypting multiple data sets of a first computing device using symmetric encryption keys, wherein each of the data sets is encrypted using a different symmetric encryption key among the symmetric encryption keys;

    sharing the encrypted data sets with a second computing device; and

    sending the symmetric encryption keys to the second computing device via a secured channel, wherein the symmetric encryption keys are suitable for decrypting the encrypted data sets at the second computing device; and

    establishing the secured channel between the first computing device and the second computing device, wherein data transferred through the secured channel are encrypted so that the server cannot access contents of the data, wherein the secured channel is through a server connected with the first and second computing devices, the server cannot access the contents of the secured channel and cannot access contents of the encrypted data sets,wherein the step of establishing the secured channel includes;

    determining a starting message between the first and second computing devices;

    generating, by the first computing device, a first middle encrypted message by encrypting the starting message with a first private key of the first computing device;

    sending, to the second computing device, the first middle encrypted message;

    receiving, from the second computing device, a second middle encrypted message, wherein the second middle encrypted message is generated by the second computing device by encrypting the starting message with a second private key of the second computing device; and

    generating, by the first computing device, a common key for the secured channel by encrypting the second middle encrypted message using the first private key.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×