Secure storage for shared documents
First Claim
1. A method for providing a secure bundle that is employed to manage data storage using a network computer, wherein the secure bundle comprises:
- an identifier that is provided to uniquely identify and reference the secure bundle;
a first collection that includes each of a plurality of public keys that correspond to a different party, wherein each party is authorized to employ their corresponding public key to decrypt one or more portions of encrypted file data that is included in the secure bundle;
a second collection that includes one or more headers that correspond to the one or more portions of the encrypted file data, wherein a header is encrypted with a same public key that is employed to encrypt a corresponding portion of the encrypted file data, and wherein each header includes instruction set information, and wherein the identifier, the first collection and the second collection are appended to the encrypted file data; and
wherein the network computer includes one or more processors that perform actions, including;
generating the instruction set information that references a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on identifying information that is included in the instruction set information; and
generating one or more encryption keys based on the instruction set information and the pass phrase that is extracted from the seed file, wherein the one or more encryption keys are employed to encrypt the file data, and wherein a signal, provided by a sensor, is used to introduce entropy in the generation of the one or more encryption keys.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.
-
Citations
18 Claims
-
1. A method for providing a secure bundle that is employed to manage data storage using a network computer, wherein the secure bundle comprises:
-
an identifier that is provided to uniquely identify and reference the secure bundle; a first collection that includes each of a plurality of public keys that correspond to a different party, wherein each party is authorized to employ their corresponding public key to decrypt one or more portions of encrypted file data that is included in the secure bundle; a second collection that includes one or more headers that correspond to the one or more portions of the encrypted file data, wherein a header is encrypted with a same public key that is employed to encrypt a corresponding portion of the encrypted file data, and wherein each header includes instruction set information, and wherein the identifier, the first collection and the second collection are appended to the encrypted file data; and wherein the network computer includes one or more processors that perform actions, including; generating the instruction set information that references a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on identifying information that is included in the instruction set information; and generating one or more encryption keys based on the instruction set information and the pass phrase that is extracted from the seed file, wherein the one or more encryption keys are employed to encrypt the file data, and wherein a signal, provided by a sensor, is used to introduce entropy in the generation of the one or more encryption keys. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for managing data storage, comprising:
a network computer, comprising; a transceiver that communicates over the network; a memory that stores at least instructions; and one or more processor devices that execute instructions that perform actions on a secure bundle data structure, including; generating instruction set information that references a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on identifying information that is included in the instruction set information; and generating one or more encryption keys based on the instruction set information and a pass phrase that is extracted from the seed file, wherein the one or more encryption keys are employed to encrypt the file data, and wherein a signal, provided by a sensor, is used to introduce entropy in the generation of the one or more encryption keys; and wherein the secure bundle data structure comprises; an identifier that is provided to uniquely identify and reference the secure bundle data structure; a first collection that includes each of a plurality of public keys that correspond to a different party, wherein each party is authorized to employ their corresponding public key to decrypt one or more portions of encrypted file data that is included in the secure bundle; and a second collection that includes one or more headers that correspond to the one or more portions of the encrypted file data, wherein a header is encrypted with a same public key that is employed to encrypt a corresponding portion of the encrypted file data, and wherein each header includes instruction set information, and wherein the identifier, the first collection and the second collection are appended to the encrypted file data, wherein the secure bundle is presented to at least one provider of at least one portion of the file data and at least one public key. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A processor readable non-transitory storage media that includes instructions for managing data storage, wherein execution of the instructions by a hardware processor performs actions on a secure bundle data structure, comprising:
-
generating instruction set information that references a seed file that is installed on the network computer, wherein the seed file is determined from a plurality of seed files based on identifying information that is included in the instruction set information; and generating one or more encryption keys based on the instruction set information and a pass phrase that is extracted from the seed file, wherein the one or more encryption keys are employed to encrypt the file data, and wherein a signal, provided by a sensor, is used to introduce entropy in the generation of the one or more encryption keys; and wherein the secure bundle data structure comprises; an identifier that is provided to uniquely identify and reference the secure bundle data structure; a first collection that includes each of a plurality of public keys that correspond to a different party, wherein each party is authorized to employ their corresponding public key to decrypt one or more portions of encrypted file data that is included in the secure bundle; and a second collection that includes one or more headers that correspond to the one or more portions of the encrypted file data, wherein a header is encrypted with a same public key that is employed to encrypt a corresponding portion of the encrypted file data, and wherein each header includes instruction set information, and wherein the identifier, the first collection and the second collection are appended to the encrypted file data, wherein the secure bundle is presented to at least one provider of at least one portion of the file data and at least one public key. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification