Movatterモバイル変換


[0]ホーム

URL:


US20150324303A1 - Systems and methods for secure hybrid third-party data storage - Google Patents

Systems and methods for secure hybrid third-party data storage
Download PDF

Info

Publication number
US20150324303A1
US20150324303A1US14/720,684US201514720684AUS2015324303A1US 20150324303 A1US20150324303 A1US 20150324303A1US 201514720684 AUS201514720684 AUS 201514720684AUS 2015324303 A1US2015324303 A1US 2015324303A1
Authority
US
United States
Prior art keywords
key
file
encrypted file
encrypted
trusted proxy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/720,684
Inventor
Walter Bogorad
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gen Digital Inc
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec CorpfiledCriticalSymantec Corp
Priority to US14/720,684priorityCriticalpatent/US20150324303A1/en
Assigned to SYMANTEC CORPORATIONreassignmentSYMANTEC CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BOGORAD, WALTER
Publication of US20150324303A1publicationCriticalpatent/US20150324303A1/en
Assigned to NortonLifeLock Inc.reassignmentNortonLifeLock Inc.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: SYMANTEC CORPORATION
Assigned to Gen Digital Inc.reassignmentGen Digital Inc.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: NortonLifeLock Inc.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The disclosed computer-implemented method for secure hybrid third-party data storage may include (1) identifying, at a trusted proxy system, an access request from a client system to access an encrypted file stored under a user account at a third-party storage system, where the requested access requires decryption of the encrypted file, (2) retrieving, from the third-party storage system, (i) the encrypted file and (ii) a decryption key that has been encrypted with a cryptographic key, where an asymmetric key pair designated for the user account includes an encryption key and the encrypted decryption key, (3) decrypting, at the trusted proxy system, the decryption key with the cryptographic key, and (4) using the decryption key to access an unencrypted version of the encrypted file at the trusted proxy system. Various other methods, systems, and computer-readable media are also disclosed.

Description

Claims (20)

What is claimed is:
1. A computer-implemented method for secure hybrid third-party data storage, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
identifying, at a trusted proxy system, an access request from a client system to access an encrypted file stored under a user account at a third-party storage system, wherein the requested access requires decryption of the encrypted file;
retrieving, in response to the request, from the third-party storage system and for the trusted proxy system:
the encrypted file;
a decryption key that has been encrypted with a cryptographic key, wherein an asymmetric key pair designated for the user account comprises an encryption key and the encrypted decryption key;
decrypting, at the trusted proxy system, the decryption key with the cryptographic key;
using the decryption key to access an unencrypted version of the encrypted file at the trusted proxy system.
2. The computer-implemented method ofclaim 1, further comprising retrieving the cryptographic key at the trusted proxy system and from a key store.
3. The computer-implemented method ofclaim 2, wherein the trusted proxy system and the key store are located within a network and the third-party storage system is not located within the network.
4. The computer-implemented method ofclaim 2, wherein:
the trusted proxy system operates within a demilitarized zone of an enterprise network;
the key store exists within the enterprise network but outside the demilitarized zone;
retrieving the cryptographic key at the trusted proxy system and from the key store comprises retrieving the cryptographic key via a key store bridge within the demilitarized zone that communicates with the key store.
5. The computer-implemented method ofclaim 4, wherein at least one of the trusted proxy system, the key store bridge, and the key store receive an authentication token from the client system that validates access to the cryptographic key from the key store.
6. The computer-implemented method ofclaim 1, wherein the trusted proxy system is owned by an owner of the encrypted file and the third-party storage system is not owned by the owner of the encrypted file.
7. The computer-implemented method ofclaim 1, wherein accessing the encrypted file comprises transmitting the unencrypted version of the encrypted file to the client system.
8. The computer-implemented method ofclaim 1, wherein using the decryption key to access the unencrypted version of the encrypted file comprises:
generating, at the trusted proxy system, metadata describing the unencrypted version of the encrypted file;
providing the metadata to at least one of the client system and the third-party storage system.
9. The computer-implemented method ofclaim 8, wherein generating the metadata describing the unencrypted version of the encrypted file comprises at least one of:
performing a scan on the unencrypted version of the encrypted file at the trusted proxy system;
creating, at the trusted proxy system, an index entry of the unencrypted version of the encrypted file based on content within the unencrypted version of the encrypted file;
generating, at the trusted proxy system, a preview of the unencrypted version of the encrypted file based on content within the unencrypted version of the encrypted file.
10. The computer-implemented method ofclaim 1, wherein accessing the encrypted file comprises:
identifying, at the trusted proxy system, a policy for scanning the unencrypted version of the encrypted file;
scanning, at the trusted proxy system, the unencrypted version of the encrypted file based on the policy.
11. The computer-implemented method ofclaim 1, wherein using the decryption key to access the encrypted file comprises:
retrieving, from the third-party storage system and for the trusted proxy system, a file key used to encrypt the encrypted file, wherein the file key is encrypted with the encryption key;
decrypting, at the trusted proxy system, the file key with the decryption key;
decrypting, at the trusted proxy system, the encrypted file with the file key.
12. The computer-implemented method ofclaim 1, wherein:
accessing the encrypted file comprises providing access to the unencrypted version of the encrypted file to an additional user account;
an additional asymmetric key pair is designated for the additional user account, the asymmetric key pair comprising an additional encryption key and an additional decryption key that has been encrypted with an additional cryptographic key.
13. The computer-implemented method ofclaim 12, wherein providing access to the unencrypted version of the encrypted file to the additional user account comprises:
retrieving, from the third-party storage system and for the trusted proxy system, the additional encryption key and a file key used to encrypt the encrypted file, wherein the file key is encrypted with the encryption key;
decrypting, at the trusted proxy system, the file key with the decryption key;
encrypting, at the trusted proxy system, a copy of the file key with the additional encryption key;
transmitting the encrypted copy of the file key from the trusted proxy system to the third-party storage system.
14. The computer-implemented method ofclaim 1, further comprising:
receiving, at the trusted proxy system, the unencrypted version of the encrypted file from the client system;
generating the encrypted file at the trusted proxy system by:
generating a file key based on at least one characteristic of the unencrypted version of the encrypted file;
encrypting the unencrypted version of the encrypted file with the file key;
encrypting the file key with the encryption key;
transmitting the encrypted file and the encrypted file key to the third-party storage system.
15. The computer-implemented method ofclaim 14, further comprising deduplicating the encrypted file with an additional encrypted file that is encrypted with the file key.
16. The computer-implemented method ofclaim 1, wherein the third-party storage system lacks access to:
the unencrypted version of the encrypted file;
an unencrypted version of the decryption key;
the cryptographic key.
17. The computer-implemented method ofclaim 1, wherein using the decryption key to access the unencrypted version of the encrypted file comprises:
retrieving, from the third-party storage system and for the trusted proxy system, an additional asymmetric key pair designated for a plurality of user accounts comprising the user account, the additional asymmetric key pair comprising an additional encryption key and an additional decryption key that has been encrypted with the encryption key;
decrypting, at the trusted proxy system, the additional decryption key with the decryption key;
retrieving, from the third-party storage system and for the trusted proxy system, a file key used to encrypt the encrypted file, wherein the file key is encrypted with the additional encryption key;
decrypting, at the trusted proxy system, the file key with the additional decryption key;
decrypting, at the trusted proxy system, the encrypted file with the file key.
18. A system for secure hybrid third-party data storage, the system comprising:
an identification module, stored in memory, that identifies, at a trusted proxy system, an access request from a client system to access an encrypted file stored under a user account at a third-party storage system, wherein the requested access requires decryption of the encrypted file;
a retrieving module, stored in memory, that retrieves, in response to the request, from the third-party storage system and for the trusted proxy system:
the encrypted file;
a decryption key that has been encrypted with a cryptographic key, wherein an asymmetric key pair designated for the user account by an encryption key and the encrypted decryption key;
a decryption module, stored in memory, that decrypts, at the trusted proxy system, the decryption key with the cryptographic key;
a using module, stored in memory, that uses the decryption key to access an unencrypted version of the encrypted file at the trusted proxy system;
at least one physical processor that executes the identification module, the retrieving module, the decryption module, and the using module.
19. The system ofclaim 18, further comprising a receiving module that retrieves the cryptographic key at the trusted proxy system and from a key store.
20. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
identify, at a trusted proxy system, an access request from a client system to access an encrypted file stored under a user account at a third-party storage system, wherein the requested access requires decryption of the encrypted file;
retrieve, in response to the request, from the third-party storage system and for the trusted proxy system:
the encrypted file;
a decryption key that has been encrypted with a cryptographic key, wherein an asymmetric key pair designated for the user account comprises an encryption key and the encrypted decryption key;
decrypt, at the trusted proxy system, the decryption key with the cryptographic key;
use the decryption key to access an unencrypted version of the encrypted file at the trusted proxy system.
US14/720,6842014-05-072015-05-22Systems and methods for secure hybrid third-party data storageAbandonedUS20150324303A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/720,684US20150324303A1 (en)2014-05-072015-05-22Systems and methods for secure hybrid third-party data storage

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US14/271,967US9076004B1 (en)2014-05-072014-05-07Systems and methods for secure hybrid third-party data storage
US14/720,684US20150324303A1 (en)2014-05-072015-05-22Systems and methods for secure hybrid third-party data storage

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/271,967ContinuationUS9076004B1 (en)2014-05-072014-05-07Systems and methods for secure hybrid third-party data storage

Publications (1)

Publication NumberPublication Date
US20150324303A1true US20150324303A1 (en)2015-11-12

Family

ID=53492017

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/271,967ActiveUS9076004B1 (en)2014-05-072014-05-07Systems and methods for secure hybrid third-party data storage
US14/720,684AbandonedUS20150324303A1 (en)2014-05-072015-05-22Systems and methods for secure hybrid third-party data storage

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/271,967ActiveUS9076004B1 (en)2014-05-072014-05-07Systems and methods for secure hybrid third-party data storage

Country Status (1)

CountryLink
US (2)US9076004B1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160364927A1 (en)*2015-06-152016-12-15Blub0X Technology Holdings, Inc.Web-cloud hosted unified physical security system
JP2017138688A (en)*2016-02-022017-08-10株式会社リコー Information processing apparatus, information processing system information processing method, and program
US10305895B2 (en)2015-04-142019-05-28Blubox Security, Inc.Multi-factor and multi-mode biometric physical access control device
WO2022001683A1 (en)2020-07-032022-01-06Huawei Technologies Co., Ltd.Database access control service in networks

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9202076B1 (en)2013-07-262015-12-01Symantec CorporationSystems and methods for sharing data stored on secure third-party storage platforms
US10764037B2 (en)*2014-12-232020-09-01Nokia Technologies OyMethod and apparatus for duplicated data management in cloud computing
CN107113314B (en)*2015-01-192020-06-19诺基亚技术有限公司Method and device for heterogeneous data storage management in cloud computing
DE112015006149B4 (en)2015-02-132022-09-29NEC Laboratories Europe GmbH Method for storing a terminal data file in a storage unit and system and proxy unit therefor
US9906361B1 (en)2015-06-262018-02-27EMC IP Holding Company LLCStorage system with master key hierarchy configured for efficient shredding of stored encrypted data items
US9779269B1 (en)*2015-08-062017-10-03EMC IP Holding Company LLCStorage system comprising per-tenant encryption keys supporting deduplication across multiple tenants
US9735962B1 (en)*2015-09-302017-08-15EMC IP Holding Company LLCThree layer key wrapping for securing encryption keys in a data storage system
US10601782B2 (en)*2016-04-012020-03-24Egnyte, Inc.Systems and methods for proxying encryption key communications between a cloud storage system and a customer security module
US10594721B1 (en)2016-11-092020-03-17StratoKey Pty Ltd.Proxy computer system to provide selective decryption
US10798064B1 (en)*2016-11-092020-10-06StratoKey Pty Ltd.Proxy computer system to provide encryption as a service
US10121021B1 (en)*2018-04-112018-11-06Capital One Services, LlcSystem and method for automatically securing sensitive data in public cloud using a serverless architecture
US12135682B1 (en)*2018-09-142024-11-05StratoKey Pty Ltd.Archival system and service for use with third-party network services
US11080409B2 (en)*2018-11-072021-08-03Ngd Systems, Inc.SSD content encryption and authentication
US11128460B2 (en)2018-12-042021-09-21EMC IP Holding Company LLCClient-side encryption supporting deduplication across single or multiple tenants in a storage system
CN109474423B (en)*2018-12-102022-10-21平安科技(深圳)有限公司Data encryption and decryption method, server and storage medium
US10936751B1 (en)*2018-12-142021-03-02StratoKey Pty Ltd.Selective anonymization of data maintained by third-party network services
US12189815B1 (en)2018-12-142025-01-07Stratokey Pty LtdSelective replacement of data maintained by third-party network services
US11741409B1 (en)2019-12-262023-08-29StratoKey Pty Ltd.Compliance management system
US11416874B1 (en)2019-12-262022-08-16StratoKey Pty Ltd.Compliance management system
US11019033B1 (en)2019-12-272021-05-25EMC IP Holding Company LLCTrust domain secure enclaves in cloud infrastructure
CN113382029B (en)*2020-03-102024-09-06阿里巴巴集团控股有限公司File data processing method and device
US20230274015A1 (en)*2020-06-112023-08-31Nec CorporationManagement device, encryption terminal, user terminal, encryption system, management method, encryption method, and computer-readable medium
US11388248B1 (en)2021-08-182022-07-12StratoKey Pty Ltd.Dynamic domain discovery and proxy configuration
CN114218597B (en)*2021-12-302023-10-10北京荣达天下信息科技有限公司Method and system suitable for privacy data confidentiality in enterprises
CN114844693B (en)*2022-04-272024-03-26深圳云创数安科技有限公司Lightweight communication data encryption method, device, equipment and storage medium
CN115883199A (en)*2022-11-292023-03-31中国农业银行股份有限公司 A file transmission method, device, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030174841A1 (en)*2002-03-152003-09-18Novell Inc.Methods, systems, and data structures for secure data content presentation
US20090313353A1 (en)*2007-10-152009-12-17University Of Southern CaliforniaCopyrighted content delivery over p2p file-sharing networks
US20120297188A1 (en)*2011-05-202012-11-22Van Der Linden RobertProviding multiple layers of security to file storage by an external storage provider
US20120297189A1 (en)*2011-05-182012-11-22Citrix Systems, Inc.Systems and Methods for Secure Handling of Data
US20130111217A1 (en)*2011-10-282013-05-02Logmein, Inc.Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
US20140115328A1 (en)*2012-10-222014-04-24SymantecFormat friendly encryption
US20140122866A1 (en)*2012-10-312014-05-01Vmware, Inc.Crypto Proxy for Cloud Storage Services
US20140181443A1 (en)*2012-12-212014-06-26Commvault Systems, Inc.Archiving using data obtained during backup of primary storage
US20140269728A1 (en)*2013-03-152014-09-18Rajkumar JalanProcessing data packets using a policy based network path
US20140281545A1 (en)*2013-03-122014-09-18Commvault Systems, Inc.Multi-layer embedded encryption

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7200230B2 (en)2000-04-062007-04-03Macrovision CorporationSystem and method for controlling and enforcing access rights to encrypted media
US6947556B1 (en)2000-08-212005-09-20International Business Machines CorporationSecure data storage and retrieval with key management and user authentication
US20020071560A1 (en)2000-12-122002-06-13Kurn David MichaelComputer system having an autonomous process for centralized cryptographic key administration
US7711122B2 (en)2001-03-092010-05-04Arcot Systems, Inc.Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
US7062656B2 (en)2002-02-222006-06-13International Busness Machines CorporationMethod for providing secure access to information held in a shared respiratory
JP3864867B2 (en)2002-07-232007-01-10ソニー株式会社 Information processing apparatus, information processing method, and computer program
WO2007091002A1 (en)2006-02-072007-08-16Nextenders (India) Private LimitedDocument security management system
US7505978B2 (en)2006-02-132009-03-17International Business Machines CorporationAggregating content of disparate data types from disparate data sources for single point access
US7487219B1 (en)2008-02-152009-02-03International Business Machines CorporationVirtual storage device from multiple online accounts
US20100306176A1 (en)*2009-01-282010-12-02Digitiliti, Inc.Deduplication of files
US8751826B2 (en)2009-04-012014-06-10Salesforce.Com, Inc.Enhanced system security
US8799322B2 (en)*2009-07-242014-08-05Cisco Technology, Inc.Policy driven cloud storage management and cloud storage policy router
US8769131B2 (en)2010-04-162014-07-01Oracle America, Inc.Cloud connector key
US8495392B1 (en)*2010-09-022013-07-23Symantec CorporationSystems and methods for securely deduplicating data owned by multiple entities
US9270459B2 (en)2011-09-202016-02-23Cloudbyte, Inc.Techniques for achieving tenant data confidentiality from cloud service provider administrators
US8458494B1 (en)2012-03-262013-06-04Symantec CorporationSystems and methods for secure third-party data storage

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030174841A1 (en)*2002-03-152003-09-18Novell Inc.Methods, systems, and data structures for secure data content presentation
US20090313353A1 (en)*2007-10-152009-12-17University Of Southern CaliforniaCopyrighted content delivery over p2p file-sharing networks
US20120297189A1 (en)*2011-05-182012-11-22Citrix Systems, Inc.Systems and Methods for Secure Handling of Data
US20120297188A1 (en)*2011-05-202012-11-22Van Der Linden RobertProviding multiple layers of security to file storage by an external storage provider
US20130111217A1 (en)*2011-10-282013-05-02Logmein, Inc.Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
US20140115328A1 (en)*2012-10-222014-04-24SymantecFormat friendly encryption
US20140122866A1 (en)*2012-10-312014-05-01Vmware, Inc.Crypto Proxy for Cloud Storage Services
US20140181443A1 (en)*2012-12-212014-06-26Commvault Systems, Inc.Archiving using data obtained during backup of primary storage
US20140281545A1 (en)*2013-03-122014-09-18Commvault Systems, Inc.Multi-layer embedded encryption
US20140269728A1 (en)*2013-03-152014-09-18Rajkumar JalanProcessing data packets using a policy based network path

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10305895B2 (en)2015-04-142019-05-28Blubox Security, Inc.Multi-factor and multi-mode biometric physical access control device
US20160364927A1 (en)*2015-06-152016-12-15Blub0X Technology Holdings, Inc.Web-cloud hosted unified physical security system
US10554758B2 (en)*2015-06-152020-02-04Blub0X Security, Inc.Web-cloud hosted unified physical security system
US10757194B2 (en)2015-06-152020-08-25Blubøx Security, Inc.Web-cloud hosted unified physical security system
US11595479B2 (en)2015-06-152023-02-28Blubøx Security, Inc.Web-cloud hosted unified physical security system
US12425479B2 (en)2015-06-152025-09-23Blubox Security, Inc.Web-cloud hosted unified physical security system
JP2017138688A (en)*2016-02-022017-08-10株式会社リコー Information processing apparatus, information processing system information processing method, and program
WO2022001683A1 (en)2020-07-032022-01-06Huawei Technologies Co., Ltd.Database access control service in networks
EP4168905A4 (en)*2020-07-032023-11-08Huawei Technologies Co., Ltd.Database access control service in networks

Also Published As

Publication numberPublication date
US9076004B1 (en)2015-07-07

Similar Documents

PublicationPublication DateTitle
US9076004B1 (en)Systems and methods for secure hybrid third-party data storage
CA2868766C (en)Systems and methods for secure third-party data storage
US8966287B2 (en)Systems and methods for secure third-party data storage
US9258122B1 (en)Systems and methods for securing data at third-party storage services
US9202076B1 (en)Systems and methods for sharing data stored on secure third-party storage platforms
US9203815B1 (en)Systems and methods for secure third-party data storage
US10157290B1 (en)Systems and methods for encrypting files
US8904503B2 (en)Systems and methods for providing access to data accounts within user profiles via cloud-based storage services
US9529733B1 (en)Systems and methods for securely accessing encrypted data stores
US9246944B1 (en)Systems and methods for enforcing data loss prevention policies on mobile devices
EP3449607B1 (en)Systems and methods for managing encryption keys for single-sign-on applications
US10015173B1 (en)Systems and methods for location-aware access to cloud data stores
US10824571B1 (en)Separate cryptographic keys for protecting different operations on data
US20180322294A1 (en)Copy protection for secured files
US10645073B1 (en)Systems and methods for authenticating applications installed on computing devices
US10469457B1 (en)Systems and methods for securely sharing cloud-service credentials within a network of computing devices
US11184169B1 (en)Systems and methods for crowd-storing encrypiion keys
US9749299B1 (en)Systems and methods for image-based encryption of cloud data
US10462113B1 (en)Systems and methods for securing push authentications
US10192056B1 (en)Systems and methods for authenticating whole disk encryption systems
WO2019040182A1 (en)Systems and methods for encrypting files
US11336639B1 (en)Systems and methods for managing a need-to-know domain name system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SYMANTEC CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOGORAD, WALTER;REEL/FRAME:035703/0078

Effective date:20140501

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:NORTONLIFELOCK INC., ARIZONA

Free format text:CHANGE OF NAME;ASSIGNOR:SYMANTEC CORPORATION;REEL/FRAME:051935/0228

Effective date:20191104

ASAssignment

Owner name:GEN DIGITAL INC., ARIZONA

Free format text:CHANGE OF NAME;ASSIGNOR:NORTONLIFELOCK INC.;REEL/FRAME:062714/0605

Effective date:20221107


[8]ページ先頭

©2009-2025 Movatter.jp