System and method for synchronizing an encrypted file with a remote storage
First Claim
Patent Images
1. A computer-implemented method comprising:
- providing a portable memory device including a user application, an encryption key, and authentication information, wherein the user application is stored in a general area of the portable memory device that is accessible with a password of the portable memory device, and wherein the encryption key and the authentication information are stored in a hidden area of the portable memory device that is accessible by the user application;
allowing an access to the user application that is stored in the general area of the portable memory device upon receiving the password of the portable memory device;
running the user application from the general area of the portable memory device, wherein the user application accesses the authentication information stored in the hidden area of the portable memory device and provides a secure access to an encrypted file that is encrypted with the encryption key and stored in the storage of the cloud storage system;
launching a process for detecting an update to the encrypted file, wherein the process compares a local copy of the encrypted file stored in a secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system; and
synchronizing the local copy of the encrypted file stored in the secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for synchronizing an encrypted file with a remote storage is disclosed. According to one embodiment, a computer-implemented method comprises providing a user with a user application and an encryption key in a portable memory device. The user runs the user application to securely access to a storage on a cloud storage system. A file is encrypted with the encryption key stored in the portable memory device and synchronized with the cloud storage system.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
providing a portable memory device including a user application, an encryption key, and authentication information, wherein the user application is stored in a general area of the portable memory device that is accessible with a password of the portable memory device, and wherein the encryption key and the authentication information are stored in a hidden area of the portable memory device that is accessible by the user application; allowing an access to the user application that is stored in the general area of the portable memory device upon receiving the password of the portable memory device; running the user application from the general area of the portable memory device, wherein the user application accesses the authentication information stored in the hidden area of the portable memory device and provides a secure access to an encrypted file that is encrypted with the encryption key and stored in the storage of the cloud storage system; launching a process for detecting an update to the encrypted file, wherein the process compares a local copy of the encrypted file stored in a secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system; and synchronizing the local copy of the encrypted file stored in the secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium having stored thereon computer-readable instructions, which instructions when executed by a processor cause the processor to perform operations comprising:
-
providing a portable memory device including a user application, an encryption key, and authentication information, wherein the user application is stored in a general area of the portable memory device that is accessible with a password of the portable memory device, and wherein the encryption key and the authentication information are stored in a hidden area of the portable memory device that is accessible by the user application; allowing an access to the user application that is stored in the general area of the portable memory device upon receiving the password of the portable memory device; running the user application from the general area of the portable memory device, wherein the user application accesses the authentication information stored in the hidden area of the portable memory device and provides a secure access to an encrypted file that is encrypted with the encryption key and stored in the storage of the cloud storage system; launching a process for detecting an update to the encrypted file, wherein the process compares a local copy of the encrypted file stored in a secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system; and synchronizing the local copy of the encrypted file stored in the secure area of the portable memory device and the encrypted file stored in the storage of the cloud storage system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification