×

Cloud key escrow system

  • US 9,900,288 B2
  • Filed: 11/18/2014
  • Issued: 02/20/2018
  • Est. Priority Date: 06/17/2011
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system including at least one processor and a memory, in a computer networking environment including a plurality of computing systems, a computer-implemented method for allowing a user to store encrypted, third-party-accessible data in a data store, the method comprising:

  • receiving at a data storage system encrypted data from a user, wherein the encrypted data was encrypted prior to having been received and the encryption having been completed prior to being received by the data storage system, wherein the received encrypted data is an encrypted key which is stored as a plurality of shares, the shares being mathematical transformations of the user'"'"'s private key, and wherein each share is provided to one of the verified third parties;

    storing the received encrypted data in the data storage system according to a predefined policy, the encryption preventing the storage system from decrypting the encrypted data, the policy allowing the encrypted data to be released upon receiving at least a threshold number of requests from verified third parties; and

    the data storage system implementing a verifiable secret sharing scheme to verify that the encrypted data can be decrypted without the data storage system having the ability to decrypt the encrypted data.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×