Method and system for encrypting files and storing the encrypted files in a storage file system

Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to prov...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Conrad Jakob, Ron Steinfeld, Linus Chang
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Conrad Jakob
Ron Steinfeld
Linus Chang
description Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2552522A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2552522A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2552522A3</originalsourceid><addsrcrecordid>eNrjZIj3TS3JyE9RSMxLUSiuLC5JzVVIyy9SSM1LLqosKMnMS1dIy8xJLYbIl-QXgURKMlJhClJToPKZeQqJYAWJ6algIahpPAysaYk5xam8UJqbQd7NNcTZQze1ID8-tbggMTk1L7Uk3t3JyNTUyNTIyNGYsAoAfr874w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><source>esp@cenet</source><creator>Conrad Jakob ; Ron Steinfeld ; Linus Chang</creator><creatorcontrib>Conrad Jakob ; Ron Steinfeld ; Linus Chang</creatorcontrib><description>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180131&amp;DB=EPODOC&amp;CC=GB&amp;NR=2552522A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180131&amp;DB=EPODOC&amp;CC=GB&amp;NR=2552522A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Conrad Jakob</creatorcontrib><creatorcontrib>Ron Steinfeld</creatorcontrib><creatorcontrib>Linus Chang</creatorcontrib><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><description>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIj3TS3JyE9RSMxLUSiuLC5JzVVIyy9SSM1LLqosKMnMS1dIy8xJLYbIl-QXgURKMlJhClJToPKZeQqJYAWJ6algIahpPAysaYk5xam8UJqbQd7NNcTZQze1ID8-tbggMTk1L7Uk3t3JyNTUyNTIyNGYsAoAfr874w</recordid><startdate>20180131</startdate><enddate>20180131</enddate><creator>Conrad Jakob</creator><creator>Ron Steinfeld</creator><creator>Linus Chang</creator><scope>EVB</scope></search><sort><creationdate>20180131</creationdate><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><author>Conrad Jakob ; Ron Steinfeld ; Linus Chang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2552522A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Conrad Jakob</creatorcontrib><creatorcontrib>Ron Steinfeld</creatorcontrib><creatorcontrib>Linus Chang</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Conrad Jakob</au><au>Ron Steinfeld</au><au>Linus Chang</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method and system for encrypting files and storing the encrypted files in a storage file system</title><date>2018-01-31</date><risdate>2018</risdate><abstract>Method and system of encrypting, authenticating and storing file names and contents, and controlling file access by allocating different encryption keys to different groups or portions of files. A software encryption layer 108 sits between a caller application 106 and storage file system 102 to provide these functions. The storage system may be a cloud system. A master key may be used to derive subordinate keys, the latter being distributed to allow selective access to predetermined subsets of files. There may be a dedicated set of keys for each directory. Different types of key may be used for different levels of access, the levels may include listing path names of a directory, or access to parts of or all of a file, or to all files of a directory, or of a directory and its children. The encryption may be symmetric, and may further be resistant to an attack from a quantum computing device. The file content may be split into blocks which are encrypted separately and have an authentication tag calculated independently. Also provided is a computer program product.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_GB2552522A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Method and system for encrypting files and storing the encrypted files in a storage file system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T15%3A16%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Conrad%20Jakob&rft.date=2018-01-31&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2552522A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true