×

Process to access a data storage device of a cloud computer system with the help of a modified Domain Name System (DNS)

  • US 10,050,944 B2
  • Filed: 10/27/2014
  • Issued: 08/14/2018
  • Est. Priority Date: 12/05/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for accessing a data storage device of a cloud computer system through a gateway computer system configured to connect with the cloud computer system over a network, the gateway computer system storing at least one cryptographic key, the at least one cryptographic key being a file-specific symmetric key, the cloud computer system being associated with a URL and the gateway computer system being associated with an IP address, the method comprising:

  • storing, in an association file on a first user terminal, an association of a domain contained in the URL with the IP address, the first user terminal corresponding to a user associated with an asymmetric cryptographic key pair including a public key and a private key;

    creating a first protected connection between the first user terminal and the gateway computer system over the network by,inputting the URL into a program of the first user terminal,obtaining, by an operating system of the first user terminal, the IP address in response to receiving a request from the program, the request addressed to a DNS server, the request being for name resolution of the URL, the obtaining including,first accessing the association file to determine whether the association file contains an association for the domain contained in the URL,second accessing the association file to read the IP address associated with the domain contained in the URL in response to determining that the association file contains an association of the domain contained in the URL in the first accessing,transferring the IP address to the program in response to the second accessing, andsetting up, by the program, the first protected connection between the first user terminal and the gateway computer system using the IP address in response to the obtaining, the setting up being performed in accordance with TCP/IP protocol;

    transferring a file from the first user terminal to the gateway computer system over the first protected connection;

    setting up a first session between the gateway computer system and the cloud computer system over the network;

    encrypting the file by the gateway computer system using the at least one cryptographic key;

    transferring the encrypted file from the gateway computer system to the cloud computer system through the first session;

    encrypting, by the gateway computer system, the file-specific symmetric key using the public key of the user to generate a first ciphertext;

    transferring the first ciphertext to the cloud computer system through the first session;

    storing the first ciphertext in association with the encrypted file in the data storage device of the cloud computer system;

    deleting the file-specific symmetric key from the gateway computer system;

    inputting, by the user, an identifier of another user to the first user terminal, the other user being associated with an asymmetric cryptographic key pair including a public key and a private key;

    transferring the identifier from the first user terminal to the gateway computer system over the first protected connection;

    specifying, by the user over the first protected connection, access privileges for the other user corresponding to the file stored in the data storage device of the cloud computer system; and

    storing, by the gateway computer system, the specified access privileges in association with the identifier by,reading, by the gateway computer system, the first ciphertext from the cloud computer system,decrypting the first ciphertext using the private key of the user to obtain the file-specific symmetric key with which the file was encrypted,producing, by the gateway computer system, a second ciphertext by encrypting the file-specific symmetric key using the public key of the other user,transferring the second ciphertext from the gateway computer system to the cloud computer system, andstoring the second ciphertext in association with the encrypted file in the data storage device of the cloud computer system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×