Method and system for encrypting files and storing the encrypted files in a storage file system
Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to prov...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Conrad Jakob Ron Steinfeld Linus Chang |
description | Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2552522A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2552522A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2552522A3</originalsourceid><addsrcrecordid>eNrjZIj3TS3JyE9RSMxLUSiuLC5JzVVIyy9SSM1LLqosKMnMS1dIy8xJLYbIl-QXgURKMlJhClJToPKZeQqJYAWJ6algIahpPAysaYk5xam8UJqbQd7NNcTZQze1ID8-tbggMTk1L7Uk3t3JyNTUyNTIyNGYsAoAfr874w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><source>esp@cenet</source><creator>Conrad Jakob ; Ron Steinfeld ; Linus Chang</creator><creatorcontrib>Conrad Jakob ; Ron Steinfeld ; Linus Chang</creatorcontrib><description>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180131&DB=EPODOC&CC=GB&NR=2552522A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180131&DB=EPODOC&CC=GB&NR=2552522A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Conrad Jakob</creatorcontrib><creatorcontrib>Ron Steinfeld</creatorcontrib><creatorcontrib>Linus Chang</creatorcontrib><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><description>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIj3TS3JyE9RSMxLUSiuLC5JzVVIyy9SSM1LLqosKMnMS1dIy8xJLYbIl-QXgURKMlJhClJToPKZeQqJYAWJ6algIahpPAysaYk5xam8UJqbQd7NNcTZQze1ID8-tbggMTk1L7Uk3t3JyNTUyNTIyNGYsAoAfr874w</recordid><startdate>20180131</startdate><enddate>20180131</enddate><creator>Conrad Jakob</creator><creator>Ron Steinfeld</creator><creator>Linus Chang</creator><scope>EVB</scope></search><sort><creationdate>20180131</creationdate><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><author>Conrad Jakob ; Ron Steinfeld ; Linus Chang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2552522A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Conrad Jakob</creatorcontrib><creatorcontrib>Ron Steinfeld</creatorcontrib><creatorcontrib>Linus Chang</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Conrad Jakob</au><au>Ron Steinfeld</au><au>Linus Chang</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><date>2018-01-31</date><risdate>2018</risdate><abstract>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_GB2552522A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Method and system for encrypting files and storing the encrypted files in a storage file system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T15%3A16%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Conrad%20Jakob&rft.date=2018-01-31&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2552522A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |