`
`
`as) United States
`
`
`
`
`
`
`
`
`
`a2) Patent Application Publication co) Pub. No.: US 2014/0013112 Al
`
`
`
`
`
`
`
`(43) Pub. Date: Jan. 9, 2014
`
`Cidonet al.
`
`
`US 20140013112A1
`
`
`
`(54)
`
`
`
`ENCRYPTING FILES WITHIN A CLOUD
`
`
`
`COMPUTING ENVIRONMENT
`
`
`
`
`
`
`
`
`
`
`
`(60) Provisional application No. 61/603,910,filed on Feb.
`
`
`
`
`
`27, 2012, provisional application No. 61/306,578,
`
`
`
`
`filed on Feb. 22, 2010.
`
`
`
`
`Publication Classification
`
`
`
`
`(51)
`
`
`
`
`
`Int. Cl.
`GO6F 21/62
`
`
`
`(52) U.S.CL
`
`
`
`
`CPC vieececsceceeseceteeeteeneeeee GO06F 21/6218 (2013.01)
`USPC veeecceccccccessesseceeeesseeseeeseenteeseecneenaeeeseee 713/165
`
`
`
`
`
`(2006.01)
`
`
`
`
`
`
`
`
`
`
`ABSTRACT
`(57)
`
`
`
`
`
`
`
`
`A system, computer readable medium and a method for
`
`
`
`
`
`
`
`
`
`encrypting a file, the method mayincluderetrieving thefile
`
`
`
`
`
`
`
`
`
`from a storage service; segmenting thefile into multiple file
`
`
`
`
`
`
`
`segments; calculating a file segmentsignature for each of the
`
`
`
`
`
`
`
`
`multiple file segments to provide multiple file segmentsig-
`
`
`
`
`
`
`
`
`natures; encrypting each of the multiple file segments to
`
`
`
`
`
`
`
`provide multiple encryptedfile segments by using encryption
`
`
`
`
`
`
`
`
`
`keys that are in response to the multiple file segment signa-
`
`
`
`
`
`
`
`
`tures; wherein the multiple encrypted file segments form an
`
`
`
`
`
`
`
`
`
`encrypted file; and sending the multiple encrypted file seg-
`
`
`
`
`ments to the storage service.
`
`
`
`(71)
`
`
`
`(72)
`
`
`
`(21)
`
`(22)
`
`
`
`
`(63)
`
`
`
`
`
`
`
`
`
`Applicants: Asaf Cidon, San Francisco, CA (US);
`
`
`
`
`Gopal Madan Prabandham,Los Altos,
`
`
`
`
`
`
`CA (US); Israel Cidon, Palo Alto, CA
`
`
`
`(US); Shetty Chandrashekhar,
`
`
`
`
`
`Naperville, IL (US); Lior Gavish, San
`
`
`
`
`Francisco, CA (US); Barak Srour,
`
`
`
`Mountain View, CA (US)
`
`
`
`
`
`
`Inventors: Asaf Cidon, San Francisco, CA (US);
`
`
`
`
`Gopal Madan Prabandham,Los Altos,
`
`
`
`
`
`
`CA (US); Israel Cidon, Palo Alto, CA
`
`
`
`(US); Shetty Chandrashekhar,
`
`
`
`
`
`Naperville, IL (US); Lior Gavish, San
`
`
`
`
`Francisco, CA (US); Barak Srour,
`
`
`
`Mountain View, CA (US)
`
`
`
`
`
`
`Filed:
`
`
`
`
`
`Appl. No.: 13/726,641
`
`
`
`Dec. 26, 2012
`
`
`
`
`Related U.S. Application Data
`
`
`
`Continuation-in-part of application No. 13/031,628,
`
`
`
`
`
`
`
`
`filed on Feb. 22, 2011, now Pat. No. 8,527,549.
`
`
`
`
`
`{
`:
`i
`i
`:
`
`t {Lal
`i
`i
`
`Page 1 of 43
`
`Netskope Exhibit 1004
`
`Page 1 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 1 of 22
`
`
`
`US 2014/0013112 Al
`
`ii/iz,:;ty4hef4f;boeeees
`eseLP,UA4HfjferentOTnnn3LO’,
`.iPetey,
`Zeo3ewennaee:;wegfotextes,at
`
`neg,ia,
`eterna
`
`;ii;ii3i
`
`Seecencenccecceed
`
`preerenenenenen
`
`
`
` poeti:3ilesssassnnasnaae!Y 4::4i,ot$ cageeetbocagecet|;t¢bcagene
`
`
`
`Z
`
`poten,
`
`
`
`, ‘‘‘‘‘‘‘‘4‘‘;J
`
`
`
`~~,
`
`
`
`peewee:
`
`
`ey
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`danenrenrenernronronsnnreorennnnnrronenrnnerrenenrnnnreds
`
`ff
`(1.
`
`ii3ii
`
`
`
`
`
`
`
`
`
`
`
`3Se,i/%4here,4
`
`
`
`
`
`Cty
`
`%,
`eppeeees
`
`
`
`ccbedbece
`
`wnERCATT,
`
`"hes
`
`,ined
`4tenets,
`
`Page 2 of 43
`
`Netskope Exhibit 1004
`
`Page 2 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`eesfoccnnnennenneentnennnnnntcteeennenn<reteiftie)4£°ogees;4om.43éoo&i‘xaioijit4‘=aii2aiii;i=7iiigeceiit-*éit3qi<perereecbeeenernnsveel¢4:‘i%passsnashonnsanseswett°iifiJoceeeecceererreeerrcreerennnsrerrieseseeseriteessiseeeh|ftiti/—tii:/xtitifoO‘54sareetrs‘if*{é—tihoseii=ititii’‘:aon2.iiti5o.‘t_‘=eox
`
`assansscanssasnel
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.fpoGEETty<rerereredleeerereredbhtttalon
`
`
`
`wesod,
`
`f,g/f
`
`
`
`
`
`US 2014/0013112 Al
`
`
`
`ey
`
`a2iCond
`aecen}
`
`[ooveeneececercecerecececensscecenssecresssecensseeserssecreseeees,t
`
`
`
`
`
`prooranernnnneon
`
`
`
`
`
`
`
`
`
`74
`
`:
`
`x
`
`ay
`
`
`
`7itttt“NNf;iitiittitNitiit
`
`Soenenueeuuneecenuunrucnnd
`
`
`
`
`
`
`
`
`
`
`
`fomed|ian
`
`
` ine:pend3iyatfe%-Podondi=iiiiioOiiyitaiidiyoe3iiit%«iiidiyweaifiyitELLEES
`
`fo]foemaifttWOverttNwett"4‘|titS$itit2seeeeeenygevececenypoyfi|iEpothdpeng|=iSoti1meiteeiianpomCeoEmLanmesssenenenensnessrorsrsonesssessasnsnsnsnsnsnssseressorstee
`i“
`
`Page 3 of 43
`
`Netskope Exhibit 1004
`
`Page 3 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 3 of 22
`
`
`
`US 2014/0013112 Al
`
`etifee|prrvecenencceerenyitapfitjttit4i}t4ttit‘ttt4%OEii“te,iea,4itseeodti444‘iiijjit44i4ttiir
` f.tft‘‘ttttttftit
`
`\}
`{:
`
`;{{::\
`
`t
`
`
`PERERaAerPRDeeEEREDDTERRORAEEDROOREEPDeeITra,
`
`a‘:;{:
`ii
`:i{:;{:;{:;{
`
`i
`
`
`
`
`
`
`
`
`
`
`
`i
`
`tO|iwang}deecereersereeceehiOd;titii4i:
`porseneedinsaessnapossanssensesansy:‘‘‘HHi‘‘‘oh45erry44ftii7;;:i44iiii&ittftwe
`ititfiLecseaccanencsensnrsassnsscsncseesnrsonsarened
`poseeneans
`
`
`
`*,*
`
`%,
`
`",%,%
`‘,*
`
`i*}yi4f4i4;4rive|ot|otiiverejti4i4i¢i‘}‘,j%4f5,
`
`oysy
`igx
`ott
`tf
`
`s=&
`ae
`
`Page 4 of 43
`
`Netskope Exhibit 1004
`
`Page 4 of 43
`
`Netskope Exhibit 1004
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 4 of 22
`
`
`
`US 2014/0013112 Al
`
`ti
`
`| iiii):
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`44;4;444
`
`4
`
`4
`
`|
`
`pecvecees
`1
`
`or,
`
`
`.
`olsgerrecteceeay
`as
`erg
`|5
`
`iafhsbeonnnei.|g
`|Coateae¢i
`|5
`.:
`*,;i
`4‘
`;t
`4‘
`stead‘
`|Zi
`
`
`‘,;‘iifhit,
`
`
`
`
`
`
`4f:tew|‘y|2e|%,|te|inewst‘
`ii*
`9oe
`berefe
`;‘fs
`
`%5pemn|
`|58
`z
`tt
`:iSenses.
`|
`i
`
`
`ifaset£4||
`|
`
`
`t'siti“ce
`
`|
`itA
`
`||
`|5
`cee
`bees:
`|ié
`
`
`
`ute|taZrat“fytpfhaegLhdbebeO45
`
`
`
`ieonnod{leeonong
`
`
`
`
`
`74444444444444444444444444444443
`
`
`
`fe,weroe
`‘‘
`‘
`
`geneaadtORROREEEEELEEEEESbeac)ZOG
`
`tAead;tAfoecechesteeon;j|::OiiyLoG4acenn;t
`
`;ti‘
`
`
`
`
`om
`|
`Se|,‘
`0%pen
`;rEtang,i4
`
`itGitespreneeennenceelifiipeiath||C
`t‘
`rhbree
`ion_|
`:
`
`24“ot“iyint
`|:tehyatti6%beean;
`i4
`‘
`,
`oy544hewheatti
`;t
`i
`
`;“ag:8||ja:|.|
`Soere
`
`ae|%iZR|:Santbad
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`’iititpMonnett4‘iGESfae2ne|i‘eetOkcagyBeet‘iiilee;iPPwd0|Sedebwy|;tiit4we)(tnea|;ey‘5ay|;SheehitiiiiftirggeByiZipCoytiiifsiiiiit;tiit;t4‘;‘‘
`
`
`
`
`
`
`
`
`
`
`
`
`feeayee|bugte3Rnan,CAEoa|iiOeOyaeiianneiodeiC4amt;ttedfeES|ioven;tcont‘“ft“at,oeoti“l,itf;‘t;‘ethvindGyii6,FFbool“Tea|4‘iitii4snagversesgit,Onniiigentfece|4aSheer,ifia2@Gitiii,ton|5beeehCeetiitpl,Sdoe|ii
`
`
`iPeoniOoat,pie
`;i4teat
`iaAonmosshe4fee.
`iii
`ibe&4eea.
`;‘t
`444#-s
`iit
`
`iGsiyMeae
`osZed
`i
`i
`;fires
`beheewe
`
`i
`i
`;Ay2%,Ey4
`i)
`ia4eee
`|
`:Sears
`|
`go
`ahfee‘eyge
`?res
`on4eashe
`vn
`:
`
`
`
` rarei+itenesiiere,ta|5
`cdpeei
`
`Ceetiient
`i%Beebes
`poops,
`Pe.
`i
`B&a%&
` xeesyoeqr“64%thwe,“Ze.sectriereneriert
`
`
`
`coveeeceeeenneeeerseerercecersecrey|
`
`‘elres—bediors
`
`Page 5 of 43
`
`Netskope Exhibit 1004
`
`Page 5 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 5 of 22
`
`
`
`US 2014/0013112 Al
`
`icmnsessecsnconconconsesonssosatggrontonsonsarsnsconenronsorsnes
`
`“ay,ampr
`
`
`
`i
`
`
`
` iii3qpreocancsrssnrsrsscerscnscensesssssessenssenscessersnrsens,;,4{oyii{heeli{gregi;ogi4iLgeStyiplas‘ESSunioepeze1aeyai|FABatenberti|OES,onLaygtUt“eyiee(eeéi1£362ohomayi1ptt,Ayfifher,itfo@&awaCdfeetjLeeAfepSpiH44ct¥gfeiee3ii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`",
`
`sy,
`
`
`
`ey
`
`agesve
`
`
`
`
`
`fiitiporn,ineitf/srennonytfft[receeyi4tSpenedi“Neo
`aeses.Aft
`
` t
`
`
`
`es
`<8
`“y
`
`~
`
`—S
`
`ow
`
`Page 6 of 43
`
`Netskope Exhibit 1004
`
`Page 6 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`

`

`Patent Application Publication
`
`Jan. 9,2014 Sheet 6 of 22
`
`US 2014/0013112 Al
`
`SeneennnEneeeneeeeennnnneenreeneneneteeetr
`
`;}:}}}}3
`
`BLYme%
`
`nnleencereeencccoet
`
`|
`
`tne
`
`es“£3f2i
`EY
`apo
`fo]
`
`ttttttittttttttt
`
`aXs
`£3
`
`vanoadHltter»
`
`~~
`of
`
`3Ay
`myt
`Ne aks
`
`3raae :
`
`bs
`bedi
`
`’
`
`canner
`
`fe“nd
`
`pa
`
`7i
`
`LD
`
`agree.
`
`reyva
`
`Er
`
`wigLed
`
`a
`
`45iii4i3ii;
`manent
`i
`
`y
`
`+i45‘
`
`eceereccenecee
`
`&
`
`ena
`heen,
`nannnnnts
`Aa
`y
`
`a15hen‘:iiitiiiPFiiiii
`
`a
`
`fiiitPeres,4“ee
`ere‘ey|faba|i
`
`a é
`
`mF}
`he
`
`poh
`
`eeeeeeneeerneeneerteenprennerfiennnneennnnneneern
`
`5 t
`
`. e
`
`dNe6
`
`reaget
`rte,
`ore.
`Srl
`lgeen
`13
`o
`pennies
`:
`
`Page 7 of 43
`
`Netskope Exhibit 1004
`
`Page 7 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 7 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`|
`
`tttthogiaa£,044eree}
`
`
` porting oo.SalttfreeiLeohiiiiiieennenncnrdiiiii.42eetessa,24wa,et|uoiii
`
`
`
`<
`“eee
`irs
`We
`see
`eee
`
`we&*,
`
`
`vagerets,
`
`8
`
`
`
`
`
`
`
`
`
`
`
`dee
`-
`naeannennnennnnnnnnennnennnsng
`
`|
`
`”
`
`Memnet?
`
`anteen,
`iiiit3iii
`
`Opes
`seinen,
`:
`avesnnnennnceneannnuennnannninaaninsnancennananananinaneinnnningnncnnnaannannnnnnnennnn
`'
`
`ts
`rd,
`
`|
`
`yer
`
`been
`
`
`
`Ss
`
`y;
`ititiftttftittiittitIfftittftittititiiftttftittitifttti
`S
`
`tttitiiftttftittititiftftttiittitiiftttftittiittitiiftttftitt
`heres
`
`
`A,
`
`poten,
`
`
`
`covwnceercnreryperreceneeeres
`
`
`
`,ter,‘j3%¢°ri
`odeoF,
`
`
`
`
`
`
`
`Page 8 of 43
`
`Netskope Exhibit 1004
`
`Page 8 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 8 of 22
`
`
`
`US 2014/0013112 Al
`
`er
`‘cone
`
`“eeeet
`
` Pre
`?
`
`ayAg
`
`
`
`aT
`Ledf
`
`
`
`“F
`
`
`setten,
`RSE
`
`
`ofacnnnnnnnnnennnnnnennnnnnnnneng
`
`
`
`g%"teen
`
`arnnenenrrnrren
`
`
`
`titttttI
`
`
`
`:
`
`:
`
`
`(
`
`ea
`
`ihe
`
`
`
`f
`aanennnennende
`
`
`
`
`
`
`
`
`
`
`|
` itee4iii5}‘43iiijiiiiij:reteitoeigrytenna”3Zaoe,iatKerneli‘ccxs®4PreeMYt:eyiMehetii54preeen,provrreesteseee4haeitnewaant?}ion.;t£93".iemGL|weytdfd|t4aiof“enatfudi‘ab
`
`
`
`
`
`
`
`eywal
`“eget“ad
`¥5i‘43iiiii3iiijiiiiieeeiialeivai
`
`
`on
`
`Pein
`
`Le,
`
`oe
`
`
`
`SF...
`
`
`4
`
`
`
`
`
`
`
`
`
`
` mecca?ipntoo,iSeoPose”:PeediLEEii
`
`iiii
`
`afeanee
`
`Od...1,,
`
`Ӥ
`
`a :
`
`i
`soaenaneasefnceacensenacencennenneennepeanansnnsnaenannn
`
`a%~Xwef
`
`oh
`
`3
`
`
`
`
`
`rea
`Led
`
`
`
`
`
`
`
`
`
`sreeeeceececee
`
`
`
`i.
`
`-ii}}ii:i}{
`
`
`
`oennnnnnnnnene
`r
`
`tes
`
`gon
`
`es,
`
`orate?
`
`air
`
`optics,
`
`f
`éhnwennnnnenpeennn
`een
`7
`i
`
`
`
`
`
`aseeres
`
`henereenenerened
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CFR,
`colwe
`Aaenceeeeneeencenceneemeeecenseencnetanccencneceencanscenenenceneeeneneceenensceeceeseeneeeneeeeeenceesceeceeseeneeeceecceneeencemeeesenneeensenseencnnscadecenenneenncenscancnnscenceascancenmonnl
`
`
`Prenat
`rtm,
`heb
`ares
`edcor,
`ees
`
`“ee,
`s
`eeeeeuneeneers
`angenannenennnapennannnennnnannnh
`Fenceteeterstnnntnntnnngnstnnsnnnnnn
`i
`f
`~~
`
`
`
`
`rgtyCBs
`
`
`
`gee
`
`“opCnt,
`
`cae
`
`ate
`
`g
`
`
`port,aes!
`cece
`wottnaene
`“5.
`fatA
`coon
`whee
`pene
`:
`'
`
`
`
`8“
`éro
`sage”
`
`23
`
`
`
`
`oye
`
`
`
`
`
`u
`
`
`
`
`
`
`i|tiii
`
`
`
`4y
`
`nF
`3
`
`sgenty enue tng
`ws
`ont Sa?
`Sty ek
`

`
`oy
`tex
`xwo
`
`=dat
`
`
`
`
`Page 9 of 43
`
`Netskope Exhibit 1004
`
`Page 9 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 9 of 22
`
`
`
`US 2014/0013112 Al
`
`Patent Application Publication
`
`
`
`
`
`po
`
`ary
`
`eageees
`
`Cael
`
`Page 10 of 43
`
`Netskope Exhibit 1004
`
`Page 10 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`
`
`
`Jan. 9,2014 Sheet 10 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`
`
`Patent Application Publication Le
`
`et}"
`
`oY
`
`oy
`
`Page 11 of 43
`
`Netskope Exhibit 1004
`
`Page 11 of 43
`
`Netskope Exhibit 1004
`
`

`

`Patent Application Publication
`
`Jan. 9,2014 Sheet 11 of 22
`
`US 2014/0013112 Al
`
`o
`
`
`
`
`
`
`
`gg
`kt
`g
`e
`_
`i
`of
`:
`:
`‘
`peesfo
`x
`
`{
`;
`{
`ei
`‘
`8
`S
`S
`3
`
`
`mL A
`§ i
`;
`
`ene3

`3
`8

`i
`3 a
`:
`on
`=
`:
`:
`i
`eee :
`ae
`i
`i
`y
`<ea
`‘
`:
`Paty
`
`
`i
`oS
`i
`i
`:
`~
`isd
`i
`i
`=
`ed
`t
`‘
`i
`‘
`hal
`y
`.
`‘
`s
`f
`i
`=
`;
`‘
`i
`:
`
`i
`4s
`=
`i
`{
`sorte
`~

`>
`eee
`i
`:
`—~ So To
`i
`ce
`oral
`Se t
`RS
`ge ehh,
`Se
`a ces
`Ets
`Gs
` ea
`~eyo
`Sane
`nS
`“_
`ae
`see
`
`Btn,
`
`Sees
`
`eecesteecesesess
`
`
`
`
`
`
`possssssssssty peneennerennenenseenannennnEeOn
`
`
`si
`a
`a
`:
`“
`
`
`
`
`ii
`
`.
`
`3
`s
`:
`\
`apne se
`we"
`i
`8
`Pen
`Y
` ogyf
`i
`s
`Sf
`eS
`i
`—
`i
`g
`‘
`“
`=
`:
`
`ii
`
` 4
`
`3N
`
`gp
`eh
`eh
`Ase
`
`=
`SS
`os
`na
`Ss
`ene
`
`t
`
`pessssssssssessthy,
`
`r4
`4
`
`333333888
`e®8
`g8
`igs
`:
`g
`ot” a
`a
`per
`i
`Saverio a
`i
`ADS
`i
`i
`:
`ee
`g
`:
`<
`i

`s
`ee
`5
`.
`‘
`BBeg
`~
`:
`&
`moe se
`Sy
`:
`os
`at
`“
`yf
`i BR i
`{
`
`=
`3
`8
`3
`Sevens
`en ASS
`nanogeet
`;
`i
`=
`;
`:
`:
`Se
`8
`i
`g
`=
`3
`—
`i
`:
`3
`: ee
`~
`8
`i
`Ge

`
`
`i
`i
`a
`~<..
`$
`y
`3
`$
`3
`
`:
`
`os
`>
`t‘
`promnncneeertS
`mo
`‘
`=
`i
`i

`\
`y
`a
`i
`os
`i
`Se
`i
`;
`Sc
`\
`g
`s
`g
`{
`{
`i
`:
`i
`{
`{
`{
`i
`:
`i
`‘
`Soe se)
`i
`%
`:
`\
`hy
`i
`3
`s
`~tn
`%
`+
`cae
`ee
`i
`i
`;
`‘
`sexi
`‘
`:
`:
`if
`g
`i
`Ref
`i
`oS
`:
`i
`iif?
`:
`y
`3
`x
`—
`EF FF peneGeaesenenenenengeneges
`“~
`y
`3
`i
`3
`iff
`gk
`sey,
`x
`
`
`
`Hi¢@ f Si as i i = t ‘
`
`
`
`
`
`
`sf
`:
`i er
`wh
`a
`i
`:
`i
`ee ae
`y
`t
`=
`i
`:
`i
`{

`Ss
`go
`owt
`i
`:
`:
`i
`-
`{
`a
`i
`Shoe
`i
`‘
`Ss ©
`‘
`\
`g
`3
`i
`3 a :
`:
`
`SOsoonPrreortecennneenann,: wees o3 { i
`
`
`
`eee fneeeeeeeeeeenti:
`i
`as
`y
`:
`:
`1.
`;
`;
`ee
`g
`Reiewey
`s
`8
`=

`ean Oo
`;
`i
`so
`i
`{
`oO
`x
`y
`g
`_
`3
`g
`pee
`8.
`ened
`ee
`:
`x

`ep
`i

`{
`aes
`y
`“he. al
`-
`t
`i
`i
`en
`seenet
`cS
`:
`os
`‘
`i
`{
`i
`f
`Fem
`i
`{
`‘
`{
`<
`ah
`s
`'
`‘
`i
`:
`‘
`‘
`‘
`<
`<
`eal
`‘
`t
`‘
`weetbt
`:

`:
`i
`t
`‘
`t
`‘
`<
`
`£i
`
`i{
`
`XN{
`i
`t
`‘
`i
`{
`{
`i
`{
`{
`i
`{
`{
`g
`&
`g
`g
`S
`g
`i
`‘
`i
`+
`<
`y
`
`
`
`
`
`
`
`
`
`:
`age
`a
`

`
`N
`sssososs

`
`oat
`
`
`
`
`
`PececeeeeeececeeeeeeeeeetheCeeCEbsbtbeCeeeetagseses
`
`Lent
`8
`s
`23
`‘
`i
`=<
`y
`sf
`=a
`ss
`‘ Bf
`
`aS
`oASY
`,
`:
`< et” EF
`nnnnha
`Aon
`a
`oS
`i
`\
`oe
`< a
`;
`\
`i
`{
`s
`8
`i
`g
`:
`{
`$
`8
`y
`8
`annafuennenneneenenbensng,
`. ee
`|
`pone
`a
`ne oe
`oe
`Sewer
`t
`g
`a
`\
`
`gsoso
`
`oO poe
`neenaei33 en
`jeeeeeeeeeeceeeeeedh
`
`Nace
`att
`—~
`
`Meee
`
`ft4,he
`
`_
`poane SEoS
`te,
`3
`£z ee
`
`renner
`
`ih
`=
`
`
`
`eye
`i
`aS {
`3
`~
`3
`;
`
`i
`:
`
`i{
`i
`{
`{
`{
`3
`3
`{
`{
`“ben.
`
`
`
`‘
`
`
`
`
`
`eee
`
`~
`
`=
`x
`
`
`
`~
`
`g
`3
`g
`g
`8
`peal
`i
`ee
`|
`ay
`med
`when
`Bane
`es
`&
`8
`i
`
`
`jesencensssssesfi&,
`
`beaaaaanaaeetpZ
`
`
`¢f
`
`f
`een
`Lavennnnnned
`
`
`
` POPPERPPPPPPPPERPIPPEPPEPREDPPPELELLDDDIEEESEIIDDLEEEELIDDLIEEpLIDDLLEEELLDDYLEEEELEDDREEEEELDf¢
`
`Page 12 of 43
`
`Netskope Exhibit 1004
`
`Page 12 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`poosecscanacenrbecsssnanerenacsenes
`qf
`
`
`
`i‘geei2iwhei4i
`odoeii2iiiiZi:gprs
`ifalOrdiononi“4CeaiAAELLL,ioo;thcs{faem5iZsfoe|aeoetAiji£3ndoh.eeeyifoe,2hiEtei5eeeii4fsCo|hyBna,“ii2eZ|wef,tycmiaia|heet“ziigBe|Oa|$egynpg"Sytog?Badeninnnai-[7aa)$e;POameewnte4h,ia:aaghi£3peeséiiABee|ed12tot:iiBegeTenbh|womWdOraai12IG|Aty
`iooosHeefi4iaPe|‘oadiwegyi44.
`ii%ii
`i|fe‘iiiiiiiiiiiiiiiiii.iiodiiitaoti}
`oe|ws,ig|Gtehoaoyi‘eat
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 12 of 22
`
`
`
`US 2014/0013112 Al
`
`i
`
`aoy2aaeveewewySvopree*,*,54a4¥ieovennnenen
`
`easeeneneneenSERREBEE
`
`
`
`5%
`Sosg&
`yo
`
`4
`
`
`
`
`
`Page 13 of 43
`
`Netskope Exhibit 1004
`
`Page 13 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 13 of 22
`
`
`
`US 2014/0013112 Al
`
`we
`
`
`
`
`
`
`
`
`
`
`
`penetttterttetittetimine,
`
`SeG&
`
`ChOe
`
`mo
`
`bh,FE
`
`r
`
`fie
`
`
`
`freceeccercenerseeneee
`
`
`
`he
`
`"hecancercererreceseaeet
`
`i
`
`
`
`
`
`gree
`
`“£3
`
`Page 14 of 43
`
`Netskope Exhibit 1004
`
`
`rs,ft-4mefwfaeee!|eekf|eeeveersEeliennnennnensnareerenneennnncnenens|-irtiwapi
`oonin3wewy@ashe.*oanee“€f,we|oogw@““BeRBGerece
`wryxyfecesyenonfad
`sages.soa“3WhheegeeEdOGoteadseBemTh|eenantnnantennantnnantnnnantnnantnnnsnsnnanannersnnansdfbfone
`ie,dh,WGNESte.
`oaeeaeoy7Oyomwya“syre“%oo“of
`4|iiiii||i£$%iaeiEiayiiiii||iiiii||i
`
`
`cevacereerncennnerertfiiiganyr,8Ps
`
`
`
`
`
`
`
`
`
`ow
`
`es
`
`t:i
`1470
`
`
`
`a
`
`&
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 14 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 14 of 22
`
`
`
`US 2014/0013112 Al
`
` 3vageven
`
`
`
`
`
`a44%dachors.
`
`
`

`
`eeeeeee
`
`rsgh“teen
`
`Page 15 of 43
`
`Netskope Exhibit 1004
`
`Page 15 of 43
`
`Netskope Exhibit 1004
`
`
`

`

`
`
`
`Jan. 9,2014 Sheet 15 of 22
`
`
`
`US 2014/0013112 Al
`
`z
`
`
`
`Patent Application Publication
`
`
`
`
`
`‘4£&4
`
`LL.
`
`Oeaneees
`
`Page 16 of 43
`
`Netskope Exhibit 1004
`
`Page 16 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 16 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`aa
`
`PA
`
`ote
`
`
`LYS
`
`ie¥
`
`
`
`ith
`
`Page 17 of 43
`
`Netskope Exhibit 1004
`
`Page 17 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 17 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`Page 18 of 43
`
`Netskope Exhibit 1004
`
`Page 18 of 43
`
`Netskope Exhibit 1004
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 18 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`cm]
`
`
`
`ay
`
`ceedeeegr
`wa
`
`no4Gonett
`
`refrrtn,
`Geareek,Lad
`fob,fopy,teed
`
`
`ON
`4
`heehee,
`
`-_%,
`
`“oon
`‘ccer?
`
`
`
`enerees
`
`aggre
`
`Page 19 of 43
`
`Netskope Exhibit 1004
`
`Page 19 of 43
`
`Netskope Exhibit 1004
`
`
`

`

`Patent Application Publication
`
`
`
`
`Jan. 9,2014 Sheet 19 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`frondarrrrrRSpocoBED”
`
`4
`47%
`oY%,
`een
`
`aiybebeoes
`
`weneees
`
`Page 20 of 43
`
`Netskope Exhibit 1004
`
`Page 20 of 43
`
`Netskope Exhibit 1004
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 20 of 22
`
`
`
`US 2014/0013112 Al
`
`‘,$A
`
`reey
`
`bed
`
`rn
`
`nteet
`
`
`
`
`
`Page 21 of 43
`
`Netskope Exhibit 1004
`
`Page 21 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 21 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`
`
`
`
`
`
`Page 22 of 43
`
`Netskope Exhibit 1004
`
`Page 22 of 43
`
`Netskope Exhibit 1004
`
`
`

`

`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 22 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`Page 23 of 43
`
`Netskope Exhibit 1004
`
`Page 23 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`US 2014/0013112 Al
`
`
`Jan. 9, 2014
`
`
`
`ENCRYPTING FILES WITHIN A CLOUD
`
`
`
`COMPUTING ENVIRONMENT
`
`
`
`
`
`
`
`RELATED APPLICATIONS
`
`
`
`
`
`
`
`
`
`[0001] This application claims priority from U.S. provi-
`
`
`
`
`
`
`
`
`
`
`sional patent Ser. No. 61/603,910 filing date Feb. 27, 2012,
`
`
`
`
`
`
`
`this application is a continuation in part of U.S. patent appli-
`
`
`
`
`
`
`
`
`
`
`cation Ser. No. 13/031,628 filing date Feb. 22, 2011 which in
`
`
`
`
`
`
`
`
`
`turn claimspriority from U.S. provisional patent Ser. No.
`
`
`
`
`
`
`
`
`61/306,578 filing date Feb. 22, 2010, all patent applications
`
`
`
`
`are incorporated herein by reference.
`
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`[0002] The advances and reduced costs of network con-
`
`
`
`
`
`
`
`
`nected mobile devices in recent years have brought a dramatic
`
`
`
`
`
`
`
`
`
`change in user behavior. The typical user owns multiple per-
`
`
`
`
`
`
`
`
`sonal devices ranging from desktop and laptop computers,
`
`
`
`
`
`
`
`notebooks, tablets, smart phones and electronic books. Con-
`
`
`
`
`
`
`
`there is a growing need to share data among
`sequently,
`
`
`
`
`
`
`
`devices, as well as to guarantee its availability despite the fact
`
`
`
`
`
`
`
`
`that devices may be turned off, disconnected and replaced.
`
`
`
`
`
`
`The penetration of such technology is rapidly increasing in
`
`
`
`
`
`
`
`organizationsofall sizes. As a result, users are mixing enter-
`
`
`
`
`
`
`
`
`prise files, documents and applications together with their
`
`
`personal media.
`
`
`
`
`
`
`
`
`
`
`[0003]
`To this end, the use of cloud-based storage for shar-
`
`
`
`
`
`
`
`
`ing information between different devices and also among
`
`
`
`
`
`
`
`
`group of users has become a standard. Many consumer com-
`
`
`
`
`
`
`
`mercial offerings such as Dropbox, Box, iCloud, Google
`
`
`
`
`
`
`
`
`Drive and Sugarsync have gained widespread user popularity.
`
`
`
`
`
`
`
`
`[0004] These services offer cloud-basedstorage that is con-
`
`
`
`
`
`
`
`nected to the devices through apps or through a browser
`
`
`
`
`
`
`
`
`interface. The apps presentto the user a directory structure of
`
`
`
`
`
`
`
`files organized in folders similar to the appearance of native
`
`
`
`
`
`
`application such as MS Explorer. In certain operating systems
`
`
`
`
`
`
`
`
`(Windows, Apple OS X)the folder are accessedvia the native
`
`
`
`
`
`
`
`
`
`file browser application. The folders on the device are syn-
`
`
`
`
`
`
`
`
`chronized with the storage on the cloud and therefore main-
`
`
`
`
`
`
`
`
`
`
`tain a coherentfile and directory state and view across all
`
`
`
`
`
`
`
`
`
`devices.
`In certain cases (e.g. Sugarsync) the files are
`
`
`
`
`
`
`
`
`uploaded to the cloud but are not necessarily automatically
`
`
`
`synchronizedtoall devices.
`
`
`
`
`
`
`
`In addition to the web-storage services, there is a
`[0005]
`
`
`
`
`
`
`parallel trend of uploading unstructured data, in particular
`
`
`
`
`
`
`company documents, to SaaS (Software as a Service) ser-
`
`
`
`
`
`
`
`vices. New cloud-based enterprise application such as Sales-
`
`
`
`
`
`
`
`force.com, Success Factors, and Box, and consumer-based
`
`
`
`
`
`
`
`
`applications such as Google Docs and Gmail, are essentially
`
`
`
`
`
`
`
`independent documentrepositories. These new services have
`
`
`
`
`
`
`
`caused a major migration of documents from the corporate
`
`
`
`storage to web-based SaaS.
`
`
`
`
`
`
`
`FIG.1 illustrates enterprise based services 20 such
`[0006]
`
`
`
`
`
`
`
`
`
`
`as Salesforce 21, Jive 23 and Box 24 andothers (such as 22),
`
`
`
`
`
`
`
`consumer based services 10 such as Dropbox 13, Gmail 11
`
`
`
`
`
`
`
`
`and others 12, that are accessed by an enterprise system 30
`
`
`
`
`
`
`
`
`
`that includes a database 31, access control, DLP (Data Loss
`
`
`
`
`
`
`Prevention), DMS (Document Management Service) and
`
`
`
`analytics modules 32-35.
`
`
`
`
`
`
`
`
`[0007] This trend has caused several major problems.
`
`
`
`
`
`
`
`
`
`[0008]
`a. The cloud storage resides outside the enterprise
`
`
`
`
`
`
`storage and managementsystems. It is impossible for IT
`
`
`
`
`
`
`managers to understand what type of data is placed in
`
`
`
`
`
`
`these services,
`track the content evolution/changes,
`
`
`
`
`
`
`
`
`
`police the access and usage of the content and prevent
`
`
`
`
`
`misplacement, duplication and unauthorized access.
`
`
`
`
`
`
`
`There may be certain organizational data that is not
`
`
`
`
`
`
`
`allowed on someorall of these services. Finally, the
`
`
`
`
`
`
`consumer-oriented services are easy to break-in using
`
`
`
`
`
`
`
`Phishing or password breaking, and have sharing capa-
`
`
`
`
`
`
`
`bilities that may cause enterprise data to be shared by
`
`
`
`
`
`
`
`mistake with unauthorized parties (inside or outside the
`
`organization).
`
`
`
`
`
`
`
`b. Cloud storage is usually implementedas a data
`[0009]
`
`
`
`
`
`
`
`center level storage and therefore is expensive compared
`
`
`
`
`
`
`
`
`to the on-device storage. 2011 technology andprices
`
`
`
`
`
`
`
`have resulted in a 1 TB of storage for a typical home
`
`
`
`
`
`entertainment system or desktop computer, and 32 GB
`
`
`
`
`
`
`
`for a typical smart phoneora tablet. Similarly, within
`
`
`
`
`
`
`
`
`organizations,
`the data owned and shared by an
`
`
`
`
`
`
`
`employee within organization file systems and current
`
`
`
`
`
`
`
`content managementsystemsoffer even larger amounts
`
`
`
`
`
`
`
`of storage. In comparison popular cloudstorage services
`
`
`
`
`
`
`
`
`typically offer only 2-5 GB of storage for free. Conse-
`
`
`
`
`
`
`
`quently, there are several orders ofmagnitude difference
`
`
`
`
`
`
`
`
`
`between the quantity of storage that
`is used and
`
`
`
`
`
`
`
`
`addressed by the user and the reasonably priced cloud
`
`
`
`
`
`
`
`
`storage solution that can be offered to that user. Even
`when the user does not wish to access all addressable
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage but only “relevant” topical material, the current
`solutionsare static and manual. The user needsto select
`
`
`
`
`
`
`
`
`
`which file he wants to share and move them to the cloud
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage directory. This maylead to situation that the data
`the user wouldlike to access is not available online.
`
`
`
`
`
`
`
`
`
`
`
`SUMMARY OF THE INVENTION
`
`
`
`
`
`
`
`[0010] According to an embodimentof the invention there
`
`
`
`
`
`
`
`may be provided a methodfor encrypting a file, the method
`
`
`
`
`
`
`
`
`
`may include: retrieving thefile from a storage service; seg-
`
`
`
`
`
`
`
`
`
`menting the file into multiple file segments; calculating a file
`
`
`
`
`
`
`
`
`segment signature for each of the multiple file segments to
`
`
`
`
`
`
`
`provide multiple file segment signatures; encrypting each of
`
`
`
`
`
`
`
`
`the multiple file segments to provide multiple encryptedfile
`
`
`
`
`
`
`
`
`segments by using encryption keys that are in responseto the
`
`
`
`
`
`
`
`multiple file segment signatures; wherein the multiple
`
`
`
`
`
`
`
`
`encrypted file segments form an encryptedfile; and sending
`
`
`
`
`
`
`
`
`the multiple encrypted file segments to the storage service.
`
`
`
`
`
`
`
`
`
`[0011] The method mayinclude deleting the file from the
`
`
`storage service.
`
`
`
`
`
`
`
`[0012] The method may include calculating each encryp-
`
`
`
`
`
`
`tion key in response to a file segment signature associated
`
`
`
`
`
`
`
`with a file segmentthat is encrypted by the encryption key.
`
`
`
`
`
`
`
`
`[0013] The method mayinclude associating with the mul-
`
`
`
`
`
`
`
`
`tiple encrypted file segments the multiple file segment signa-
`tures.
`
`
`
`
`
`
`
`[0014] The segmenting, the calculating and the encrypting
`
`
`
`
`maybe executed by a managementserver.
`
`
`
`
`
`
`
`
`[0015] The method mayinclude flagging the encryptedfile
`
`
`
`as being encrypted.
`
`
`
`
`
`
`
`
`[0016] The method mayinclude flagging the encryptedfile
`
`
`
`
`
`
`
`
`as being encryptedbyaltering a file type ofthe encryptedfile.
`
`
`
`
`
`
`
`[0017] The method mayinclude exposing the encryptedfile
`
`
`
`
`
`
`
`to auser ofthe managementserver through an interface ofthe
`
`
`storage service.
`
`
`
`
`
`
`
`[0018] Thesegmenting may include separating text content
`
`
`
`
`
`
`of the file and image contentofthefile.
`
`
`
`
`
`
`
`[0019] The method may include preventing the segment-
`
`
`
`
`
`
`
`
`ing, the calculating and the encryptingofthefile ifthe file has
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 24 of 43
`
`Netskope Exhibit 1004
`
`Page 24 of 43
`
`Netskope Exhibit 1004
`
`

`

`
`
`US 2014/0013112 Al
`
`
`Jan. 9, 2014
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0035] The method mayincluderetrievingthefile from the
`been modified by a user of the storage service during a pre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage service, wherein the storage service applies a first
`determined period from a momentofthe retrieving ofthe file
`
`
`
`
`
`
`
`
`
`de-duplication policy; wherein the segmenting ofthefile by
`by the managementserver.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the file management server is executed while a applying a
`[0020] The method mayinclude preventing the deletion of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second de-duplication policy that differs from the first de-
`the file if the file has been modified by a user of the storage
`
`
`
`
`
`
`
`
`duplication policy.
`service during a predeterminedperiod from a momentof the
`
`
`
`
`
`
`
`
`[0036] The method whereinat least one ofthe management
`retrieving ofthefile.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`server and the storage service belong to a cloud computing
`[0021] The segmenting may includefinding initialfile seg-
`environment.
`
`
`
`
`
`
`
`ments by applyinga first segmentation process; and defining
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0037] The method may includeretrieving the file from a
`each file segment as may include multiple initial file seg-
`
`
`
`
`
`
`
`ments.
`
`dedicated folder that is allocated forfiles to be encrypted.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0038] The method may include creating a new folder for
`[0022] The finding of the initial file segments may include
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`files to be encrypted, wherein the folderis exposed to the user.
`applying at least one process out of Rabin fingerprint process
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0039] The method mayincluderetrieving the file from a
`and cyclic redundancy code (CRC)process.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`dedicated folder that is allocated to files to be encrypted.
`[0023] The segmenting of the file into multiple file seg-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0040] The method mayinclude flagging the encryptedfile
`ments is executed independentofafile segmentation scheme
`
`
`
`
`
`
`
`
`
`as being encrypted.
`applied onthefile by the storage service.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0041] The method mayinclude changinga type ofa file to
`[0024] The segmenting ofthefile to multiple file segments
`
`
`
`
`
`
`
`
`
`
`
`
`a type that is indicative of the encryption ofthefile.
`is executed independent of a file segmentation scheme
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0042] The method mayinclude sendingthefile to a cache
`applied on the file by the storage service for de-duplication
`
`
`
`
`
`
`
`
`memory before starting the segmenting,the calculating, and
`purposes.
`
`
`
`
`
`
`
`
`
`
`the encrypting actions.
`Thefile is associated with a certain user; wherein the
`[0025]
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0043] There may be provided a method for decrypting an
`method mayinclude using different segmentation parameters
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encrypted file, the method may include: receiving a request,
`for segmenting anotherfile that is associated with another
`
`
`
`
`
`
`
`user that differs from the certain user.
`
`
`
`
`
`
`
`by a managementserver, to provide at least one encryption
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`key for decrypting at least one encrypted file segment of the
`[0026]
`Thefile is associated with a certain user; wherein the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encryptedfile by a user device, after the management server
`method mayinclude using different encryption parameters
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`generated the encryptedfile to be of a specific file type and
`for encrypting anotherfile that is associated with another user
`
`
`
`
`
`
`
`
`
`after a storage service stored the encrypted file; wherein the
`that differs from the certain user.
`
`
`
`
`
`
`
`
`
`
`
`
`
`request may includeafile segmentsignature; determining, by
`
`
`
`
`
`
`
`[0027]
`Thefile is associated with a userof certain group of
`
`
`
`
`
`
`
`the managementserver, whetherthe user device is authorized
`
`
`
`
`
`
`
`
`
`users; wherein the method may include using different seg-
`
`
`
`
`
`
`
`
`
`
`to decrypt the at least one encryptedfile segment; and sending
`
`
`
`
`
`
`
`
`mentation parameters for segmenting anotherfile that is asso-
`
`
`
`
`
`
`
`
`
`the at least one encryption key to the user device if it is
`
`
`
`
`
`
`
`
`ciated with another user that belongs to another group of
`
`
`
`
`
`
`
`
`users.
`determinedthat the user device is authorized to decryptthe at
`
`
`
`
`
`
`least one encrypted file segment.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thefile is associated with a userof certain group of
`[0028]
`[0044] A single encryption key maybe used for encrypting
`
`
`
`
`
`
`
`
`
`user; wherein the method mayinclude using different encryp-
`
`
`
`
`
`all the file segments ofa file.
`
`
`
`
`
`
`
`
`tion parameters for segmenting anotherfile that is associated
`
`
`
`
`
`
`
`
`[0045] Theat least one encryption key may be generated in
`
`
`
`
`
`
`
`
`with another user that belongs to another group of users.
`
`
`
`
`
`
`
`
`response to a content of at the least one encryptedfile seg-
`
`
`
`
`
`
`
`
`[0029] The method may include addinga useridentifier to
`ment.
`
`
`
`
`
`
`
`
`
`
`each file segment; wherein the useridentifier identifies a user
`
`
`
`
`
`
`
`
`[0046] The method may includereceiving the request from
`associated with thefile.
`
`
`
`
`
`
`
`
`
`
`an application that is regarded by the operating system hosted
`
`
`
`
`
`
`
`
`[0030] The method wherein identicalfile segments may be
`
`
`
`
`
`
`
`by the user device to be associated with files ofthe certain file
`
`
`
`
`
`
`associated with identical encryption keys.
`type.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0031] The method mayincluderetrievingthefile from the
`[0047] The method whereinat least one ofthe management
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage service, wherein thefile is stored in a storage entity in
`server and the storage service belong to a cloud computing
`
`
`
`
`
`
`
`an encrypted form and is decrypted by the storage service to
`environment.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be provided in a decrypted form to the managementserver;
`[0048] There may be provided a method for decrypting an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the encrypting by the managementserveris executed
`encryptedfile, the method mayinclude: retrieving, by a user
`
`
`
`
`
`
`
`
`
`
`
`
`
`independentof a decryption applied by the storage service.
`device, ofone or more file segmentsignatures associated with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0032] The managementserver and the storage service may
`one or more encrypted file segments of an encryptedfile;
`
`
`
`
`
`
`
`
`
`
`
`
`be located in a cloud computing environment.
`wherein eachfile segment signature is mapped to a decryption
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0033] The method mayincluderetrievingthefile from the
`key that facilitates a decry

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

PTO Denying Access

Refresh this Document
Go to the Docket