×

Encryption-based data access management

  • US 9,805,210 B2
  • Filed: 02/26/2015
  • Issued: 10/31/2017
  • Est. Priority Date: 12/12/2012
  • Status: Active Grant
First Claim
Patent Images

1. One or more non-transitory computer-readable media storing computer-readable instructions that, when executed by a hardware processor, cause a system to:

  • receive a request to decrypt data stored at a first network location in encrypted format;

    request a validation token from a second network location using an identifier and a password;

    request a first encryption secret from a third network location, a first portion of the data having been encrypted using the first encryption secret, the first portion of the data comprising directory data and file header information for the data;

    request a second encryption secret from a fourth network location, a second portion of the data having been encrypted using the second encryption secret, the second portion of the data comprising file data;

    generate a decryption key using the first encryption secret and the second encryption secret; and

    decrypt the data using the decryption key.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×