Encrypted synchronization
First Claim
Patent Images
1. A system for dynamic encryption key selection, comprising:
- a processor configured to;
receive a request to store a file to be protected;
detect whether the file to be protected is to be synchronized;
andencrypt the file to be protected using a selected encryption key;
wherein;
when it is detected that the file to be protected is to be synchronized, the selected encryption key is a same encryption key that is to be utilized to encrypt across any other instances the file to be synchronized and protected, wherein the same encryption key was selected among a plurality of encryption key options;
when the request indicates the file to be protected is to be synchronized with another instance of the file, the selected encryption key to encrypt the file to be protected is an encryption key that was utilized to encrypt the another instance of the file; and
when it is detected that the file to be protected is not to be synchronized, the selected encryption key is a unique encryption key, wherein each encryption key to be utilized to encrypt each of any different instances of the file to be protected but not synchronized is unique for each of the any different instances and selecting the unique encryption key includes generating a new encryption key; and
a memory coupled to the processor and configured to provide the processor with instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
A request to store a file to be protected is received. It is detected whether the file to be protected is a file to be synchronized. The encryption key is selected based on the detection of whether the file is a file to be synchronized. The file to be protected is encrypted using the selected encryption key.
-
Citations
20 Claims
-
1. A system for dynamic encryption key selection, comprising:
-
a processor configured to; receive a request to store a file to be protected; detect whether the file to be protected is to be synchronized; and encrypt the file to be protected using a selected encryption key; wherein; when it is detected that the file to be protected is to be synchronized, the selected encryption key is a same encryption key that is to be utilized to encrypt across any other instances the file to be synchronized and protected, wherein the same encryption key was selected among a plurality of encryption key options; when the request indicates the file to be protected is to be synchronized with another instance of the file, the selected encryption key to encrypt the file to be protected is an encryption key that was utilized to encrypt the another instance of the file; and when it is detected that the file to be protected is not to be synchronized, the selected encryption key is a unique encryption key, wherein each encryption key to be utilized to encrypt each of any different instances of the file to be protected but not synchronized is unique for each of the any different instances and selecting the unique encryption key includes generating a new encryption key; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for dynamic encryption key selection, comprising:
-
receiving a request to store a file to be protected; using a processor to detect whether the file to be protected is a file to be synchronized; and encrypting the file to be protected using a selected encryption key; wherein; when it is detected that the file to be protected is to be synchronized, the selected encryption key is a same encryption key that is to be utilized to encrypt across any other instances the file to be synchronized and protected, wherein the same encryption key was selected among a plurality of encryption key options; when the request indicates the file to be protected is to be synchronized with another instance of the file, the selected encryption key to encrypt the file to be protected is an encryption key that was utilized to encrypt the another instance of the file; and when it is detected that the file to be protected is not to be synchronized, the selected encryption key is a unique encryption key, wherein each encryption key to be utilized to encrypt each of any different instances of the file to be protected but not synchronized is unique for each of the any different instances and selecting the unique encryption key includes generating a new encryption key. - View Dependent Claims (19, 20)
-
-
18. A computer program product for dynamic encryption key selection, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving a request to store a file to be protected; detecting whether the file to be protected is a file to be synchronized; and encrypting the file to be protected using a selected encryption key; wherein; when it is detected that the file to be protected is to be synchronized, the selected encryption key is a same encryption key that is to be utilized to encrypt across any other instances the file to be synchronized and protected, wherein the same encryption key was selected among a plurality of encryption key options; when the request indicates the file to be protected is to be synchronized with another instance of the file, the selected encryption key to encrypt the file to be protected is an encryption key that was utilized to encrypt the another instance of the file; and when it is detected that the file to be protected is not to be synchronized, the selected encryption key is a unique encryption key, wherein each encryption key to be utilized to encrypt each of any different instances of the file to be protected but not synchronized is unique for each of the any different instances and selecting the unique encryption key includes generating a new encryption key.
-
Specification