Exclusive encryption
First Claim
Patent Images
1. A method comprising:
- receiving an encrypted identifier;
verifying, without decrypting the encrypted identifier, that the encrypted identifier is an encryption of another identifier that conforms to a syntax; and
verifying, without decrypting the encrypted identifier, that the encrypted identifier is not an encryption of the same other identifier as one or more other encrypted identifiers.
1 Assignment
0 Petitions
Accused Products
Abstract
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
100 Citations
30 Claims
-
1. A method comprising:
-
receiving an encrypted identifier;
verifying, without decrypting the encrypted identifier, that the encrypted identifier is an encryption of another identifier that conforms to a syntax; and
verifying, without decrypting the encrypted identifier, that the encrypted identifier is not an encryption of the same other identifier as one or more other encrypted identifiers. - View Dependent Claims (2, 3, 4)
-
-
5. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to:
-
receive an encrypted identifier;
verify, without decrypting the encrypted identifier, that the encrypted identifier is an encryption of another identifier that conforms to a syntax; and
verify, without decrypting the encrypted identifier, that the encrypted identifier is not an encryption of the same other identifier as one or more other encrypted identifiers. - View Dependent Claims (6, 7, 8)
-
-
9. A system comprising:
-
means for receiving an encrypted identifier;
means for verifying, without decrypting the encrypted identifier, that the encrypted identifier is an encryption of another identifier that conforms to a syntax; and
means for verifying, without decrypting the encrypted identifier, that the encrypted identifier is not an encryption of the same other identifier as one or more other encrypted identifiers. - View Dependent Claims (10, 11, 12)
-
-
13. A system comprising:
-
a plurality of encrypted identifiers;
a syntax verifier to determine whether a newly received encrypted identifier is an encryption of a legal name without decrypting the newly received encrypted identifier; and
a duplication identifier to determine whether the newly received encrypted identifier is an encryption of the same name as any of the plurality of encrypted identifiers without decrypting either the newly received encrypted identifier or any of the plurality of encrypted identifiers. - View Dependent Claims (14, 15, 16)
-
-
17. A method implemented at a computing device, the method comprising:
-
receiving a directory entry that is encrypted, wherein the computing device does not have a key needed for decrypting the directory entry;
verifying that the directory entry is an encryption of a syntactically legal name; and
verifying that the directory entry is not an encryption of the same name as any other directory entry maintained by the computing device. - View Dependent Claims (18, 19, 20, 21)
-
-
22. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to:
-
receive a directory entry that is encrypted, wherein the computing device does not have a key needed for decrypting the directory entry;
verify that the directory entry is an encryption of a syntactically legal name; and
verify that the directory entry is not an encryption of the same name as any other directory entry maintained by the computing device. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A system comprising:
-
a plurality of encrypted directory entries;
a syntax verifier to determine whether a new encrypted directory entry is an encryption of a legal name without decrypting the new encrypted directory entry; and
a duplication identifier to determine whether the new encrypted directory entry is an encryption of the same name as any of the plurality of encrypted directory entries without decrypting either the new encrypted directory entry or any of the plurality of encrypted directory entries. - View Dependent Claims (28, 29, 30)
-
Specification