×

Storing encrypted objects

  • US 8,650,657 B1
  • Filed: 05/18/2011
  • Issued: 02/11/2014
  • Est. Priority Date: 05/18/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by one or more processors, the method comprising:

  • receiving, in a request from an application server system and at a key server system, a resource in unencrypted form and a wrapped key, the wrapped key including a resource encryption key and a user identifier that have been encrypted using a master key, wherein the user identifier identifies a user that is permitted to use the resource encryption key to decrypt the resource, and wherein the request does not include a plaintext of the user identifier;

    decrypting the wrapped key to access the resource encryption key;

    encrypting the resource in unencrypted form into an encrypted resource with the resource encryption key;

    sending, to the application server system, the encrypted resource;

    receiving, from an application server system and at the key server system, authentication credentials and a second wrapped key, the second wrapped key including the resource encryption key and the user identifier that have been encrypted using the master key;

    decrypting the second wrapped key to generate an unwrapped key that includes the resource encryption key and the user identifier in unencrypted form;

    accessing the user identifier from the unwrapped key;

    determining that the received authentication credentials correspond to the accessed user identifier; and

    in response to determining that the received authentication credentials correspond to the accessed user identifier, sending the resource encryption key in unecrypted form to an application server system such that that application server system can decrypt the encrypted resource using the resource encryption key in unencrypted form.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×