×

Network encrypted data object stored on an encrypted file system

  • US 9,697,378 B2
  • Filed: 12/13/2013
  • Issued: 07/04/2017
  • Est. Priority Date: 12/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a target machine, an encrypted first data object from a build machine via a network in an encrypted file system;

    determining the encrypted first data object was encrypted by the build machine with a first encryption key;

    determining that the encrypted first data object is to be stored in the encrypted file system;

    conserving the target machine resources by bypassing a decryption/re-encryption process for the file;

    encrypting the first encryption key with a second encryption key, in response to the determining that the encrypted first data object is to be stored in the encrypted file system;

    attaching the encrypted first encryption key to the encrypted first data object as metadata, in response to the determining that the encrypted first data object is to be stored in the encrypted file system;

    storing the encrypted first data object in the encrypted file system, wherein the encrypted first data object is associated with the encrypted first encryption key as metadata;

    receiving a command to use the encrypted first data object;

    decrypting the encrypted first encryption key with the second encryption key; and

    decrypting the encrypted first data object with the decrypted first encryption keys;

    receiving an unencrypted second data object;

    determining that the unencrypted second data object is to be stored in the encrypted file system;

    encrypting the unencrypted second data object with a third encryption key, in response to the determining that the second data object is to be stored in the encrypted file system;

    encrypting the third encryption key with the second encryption key, in response to the determining that the second data object is to be stored in the encrypted file system;

    attaching the encrypted third encryption key to the encrypted second data object; and

    storing the encrypted second data object in the encrypted file system, wherein the encrypted second data object is associated with the encrypted third encryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×