Secure storage for shared documents
First Claim
1. A method for managing data storage using a network computer having one or more processor devices that perform actions, comprising:
- employing the one or more processor devices to generate instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on the instruction set information;
employing the one or more processor devices to extract a pass phrase from the seed file based on the instruction set information;
employing the one or more processor devices to generate an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file;
employing the one or more processor devices to launch and execute an encryption engine, on the network computer, to encrypt data using the encryption key; and
employing the one or more processor devices to generate a secure bundle that includes a public key, the encrypted header information, and the encrypted data, wherein the secure bundle is presented to a provider of the data and the public key.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.
36 Citations
24 Claims
-
1. A method for managing data storage using a network computer having one or more processor devices that perform actions, comprising:
-
employing the one or more processor devices to generate instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on the instruction set information; employing the one or more processor devices to extract a pass phrase from the seed file based on the instruction set information; employing the one or more processor devices to generate an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; employing the one or more processor devices to launch and execute an encryption engine, on the network computer, to encrypt data using the encryption key; and employing the one or more processor devices to generate a secure bundle that includes a public key, the encrypted header information, and the encrypted data, wherein the secure bundle is presented to a provider of the data and the public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for managing data storage, comprising:
a network computer, comprising; a transceiver that communicates over the network; a memory that stores at least instructions; and one or more processor devices that execute instructions that perform actions, including; generating instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on the instruction set information; extracting a pass phrase from the seed file based on the instruction set information; generating an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; launching and executing an encryption engine, on the network computer, to encrypt data using the encryption key; and generating a secure bundle that includes a public key, the encrypted header information, and the encrypted data, wherein the secure bundle is presented to a provider of the data and the public key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A processor readable non-transitory storage media that includes instructions for managing data storage, wherein execution of the instructions by one or more processor devices performs actions, comprising:
-
employing the one or more processor devices to generate instruction set information that references at least a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on the instruction set information; employing the one or more processor devices to extract a pass phrase from the seed file based on the instruction set information; employing the one or more processor devices to generate an encryption key based on the instruction set information and the pass phrase that is extracted from the seed file; employing the one or more processor devices to launch and execute an encryption engine, on the network computer, to encrypt data using the encryption key; and employing the one or more processor devices to generate a secure bundle that includes a public key, the encrypted header information, and the encrypted data, wherein the secure bundle is presented to a provider of the data and the public key. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification