`
`
`as) United States
`
`
`
`
`
`
`
`
`
`a2) Patent Application Publication co) Pub. No.: US 2014/0013112 Al
`
`
`
`
`
`
`
`(43) Pub. Date: Jan. 9, 2014
`
`Cidonet al.
`
`
`US 20140013112A1
`
`
`
`(54)
`
`
`
`ENCRYPTING FILES WITHIN A CLOUD
`
`
`
`COMPUTING ENVIRONMENT
`
`
`
`
`
`
`
`
`
`
`
`(60) Provisional application No. 61/603,910,filed on Feb.
`
`
`
`
`
`27, 2012, provisional application No. 61/306,578,
`
`
`
`
`filed on Feb. 22, 2010.
`
`
`
`
`Publication Classification
`
`
`
`
`(51)
`
`
`
`
`
`Int. Cl.
`GO6F 21/62
`
`
`
`(52) U.S.CL
`
`
`
`
`CPC vieececsceceeseceteeeteeneeeee GO06F 21/6218 (2013.01)
`USPC veeecceccccccessesseceeeesseeseeeseenteeseecneenaeeeseee 713/165
`
`
`
`
`
`(2006.01)
`
`
`
`
`
`
`
`
`
`
`ABSTRACT
`(57)
`
`
`
`
`
`
`
`
`A system, computer readable medium and a method for
`
`
`
`
`
`
`
`
`
`encrypting a file, the method mayincluderetrieving thefile
`
`
`
`
`
`
`
`
`
`from a storage service; segmenting thefile into multiple file
`
`
`
`
`
`
`
`segments; calculating a file segmentsignature for each of the
`
`
`
`
`
`
`
`
`multiple file segments to provide multiple file segmentsig-
`
`
`
`
`
`
`
`
`natures; encrypting each of the multiple file segments to
`
`
`
`
`
`
`
`provide multiple encryptedfile segments by using encryption
`
`
`
`
`
`
`
`
`
`keys that are in response to the multiple file segment signa-
`
`
`
`
`
`
`
`
`tures; wherein the multiple encrypted file segments form an
`
`
`
`
`
`
`
`
`
`encrypted file; and sending the multiple encrypted file seg-
`
`
`
`
`ments to the storage service.
`
`
`
`(71)
`
`
`
`(72)
`
`
`
`(21)
`
`(22)
`
`
`
`
`(63)
`
`
`
`
`
`
`
`
`
`Applicants: Asaf Cidon, San Francisco, CA (US);
`
`
`
`
`Gopal Madan Prabandham,Los Altos,
`
`
`
`
`
`
`CA (US); Israel Cidon, Palo Alto, CA
`
`
`
`(US); Shetty Chandrashekhar,
`
`
`
`
`
`Naperville, IL (US); Lior Gavish, San
`
`
`
`
`Francisco, CA (US); Barak Srour,
`
`
`
`Mountain View, CA (US)
`
`
`
`
`
`
`Inventors: Asaf Cidon, San Francisco, CA (US);
`
`
`
`
`Gopal Madan Prabandham,Los Altos,
`
`
`
`
`
`
`CA (US); Israel Cidon, Palo Alto, CA
`
`
`
`(US); Shetty Chandrashekhar,
`
`
`
`
`
`Naperville, IL (US); Lior Gavish, San
`
`
`
`
`Francisco, CA (US); Barak Srour,
`
`
`
`Mountain View, CA (US)
`
`
`
`
`
`
`Filed:
`
`
`
`
`
`Appl. No.: 13/726,641
`
`
`
`Dec. 26, 2012
`
`
`
`
`Related U.S. Application Data
`
`
`
`Continuation-in-part of application No. 13/031,628,
`
`
`
`
`
`
`
`
`filed on Feb. 22, 2011, now Pat. No. 8,527,549.
`
`
`
`
`
`{
`:
`i
`i
`:
`
`t {Lal
`i
`i
`
`Page 1 of 43
`
`Netskope Exhibit 1004
`
`Page 1 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 1 of 22
`
`
`
`US 2014/0013112 Al
`
`ii/iz,:;ty4hef4f;boeeees
`eseLP,UA4HfjferentOTnnn3LO’,
`.iPetey,
`Zeo3ewennaee:;wegfotextes,at
`
`neg,ia,
`eterna
`
`;ii;ii3i
`
`Seecencenccecceed
`
`preerenenenenen
`
`
`
` poeti:3ilesssassnnasnaae!Y 4::4i,ot$ cageeetbocagecet|;t¢bcagene
`
`
`
`Z
`
`poten,
`
`
`
`, ‘‘‘‘‘‘‘‘4‘‘;J
`
`
`
`~~,
`
`
`
`peewee:
`
`
`ey
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`danenrenrenernronronsnnreorennnnnrronenrnnerrenenrnnnreds
`
`ff
`(1.
`
`ii3ii
`
`
`
`
`
`
`
`
`
`
`
`3Se,i/%4here,4
`
`
`
`
`
`Cty
`
`%,
`eppeeees
`
`
`
`ccbedbece
`
`wnERCATT,
`
`"hes
`
`,ined
`4tenets,
`
`Page 2 of 43
`
`Netskope Exhibit 1004
`
`Page 2 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`eesfoccnnnennenneentnennnnnntcteeennenn<reteiftie)4£°ogees;4om.43éoo&i‘xaioijit4‘=aii2aiii;i=7iiigeceiit-*éit3qi<perereecbeeenernnsveel¢4:‘i%passsnashonnsanseswett°iifiJoceeeecceererreeerrcreerennnsrerrieseseeseriteessiseeeh|ftiti/—tii:/xtitifoO‘54sareetrs‘if*{é—tihoseii=ititii’‘:aon2.iiti5o.‘t_‘=eox
`
`assansscanssasnel
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.fpoGEETty<rerereredleeerereredbhtttalon
`
`
`
`wesod,
`
`f,g/f
`
`
`
`
`
`US 2014/0013112 Al
`
`
`
`ey
`
`a2iCond
`aecen}
`
`[ooveeneececercecerecececensscecenssecresssecensseeserssecreseeees,t
`
`
`
`
`
`prooranernnnneon
`
`
`
`
`
`
`
`
`
`74
`
`:
`
`x
`
`ay
`
`
`
`7itttt“NNf;iitiittitNitiit
`
`Soenenueeuuneecenuunrucnnd
`
`
`
`
`
`
`
`
`
`
`
`fomed|ian
`
`
` ine:pend3iyatfe%-Podondi=iiiiioOiiyitaiidiyoe3iiit%«iiidiyweaifiyitELLEES
`
`fo]foemaifttWOverttNwett"4‘|titS$itit2seeeeeenygevececenypoyfi|iEpothdpeng|=iSoti1meiteeiianpomCeoEmLanmesssenenenensnessrorsrsonesssessasnsnsnsnsnsnssseressorstee
`i“
`
`Page 3 of 43
`
`Netskope Exhibit 1004
`
`Page 3 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 3 of 22
`
`
`
`US 2014/0013112 Al
`
`etifee|prrvecenencceerenyitapfitjttit4i}t4ttit‘ttt4%OEii“te,iea,4itseeodti444‘iiijjit44i4ttiir
` f.tft‘‘ttttttftit
`
`\}
`{:
`
`;{{::\
`
`t
`
`
`PERERaAerPRDeeEEREDDTERRORAEEDROOREEPDeeITra,
`
`a‘:;{:
`ii
`:i{:;{:;{:;{
`
`i
`
`
`
`
`
`
`
`
`
`
`
`i
`
`tO|iwang}deecereersereeceehiOd;titii4i:
`porseneedinsaessnapossanssensesansy:‘‘‘HHi‘‘‘oh45erry44ftii7;;:i44iiii&ittftwe
`ititfiLecseaccanencsensnrsassnsscsncseesnrsonsarened
`poseeneans
`
`
`
`*,*
`
`%,
`
`",%,%
`‘,*
`
`i*}yi4f4i4;4rive|ot|otiiverejti4i4i¢i‘}‘,j%4f5,
`
`oysy
`igx
`ott
`tf
`
`s=&
`ae
`
`Page 4 of 43
`
`Netskope Exhibit 1004
`
`Page 4 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 4 of 22
`
`
`
`US 2014/0013112 Al
`
`ti
`
`| iiii):
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`44;4;444
`
`4
`
`4
`
`|
`
`pecvecees
`1
`
`or,
`
`
`.
`olsgerrecteceeay
`as
`erg
`|5
`
`iafhsbeonnnei.|g
`|Coateae¢i
`|5
`.:
`*,;i
`4‘
`;t
`4‘
`stead‘
`|Zi
`
`
`‘,;‘iifhit,
`
`
`
`
`
`
`4f:tew|‘y|2e|%,|te|inewst‘
`ii*
`9oe
`berefe
`;‘fs
`
`%5pemn|
`|58
`z
`tt
`:iSenses.
`|
`i
`
`
`ifaset£4||
`|
`
`
`t'siti“ce
`
`|
`itA
`
`||
`|5
`cee
`bees:
`|ié
`
`
`
`ute|taZrat“fytpfhaegLhdbebeO45
`
`
`
`ieonnod{leeonong
`
`
`
`
`
`74444444444444444444444444444443
`
`
`
`fe,weroe
`‘‘
`‘
`
`geneaadtORROREEEEELEEEEESbeac)ZOG
`
`tAead;tAfoecechesteeon;j|::OiiyLoG4acenn;t
`
`;ti‘
`
`
`
`
`om
`|
`Se|,‘
`0%pen
`;rEtang,i4
`
`itGitespreneeennenceelifiipeiath||C
`t‘
`rhbree
`ion_|
`:
`
`24“ot“iyint
`|:tehyatti6%beean;
`i4
`‘
`,
`oy544hewheatti
`;t
`i
`
`;“ag:8||ja:|.|
`Soere
`
`ae|%iZR|:Santbad
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`’iititpMonnett4‘iGESfae2ne|i‘eetOkcagyBeet‘iiilee;iPPwd0|Sedebwy|;tiit4we)(tnea|;ey‘5ay|;SheehitiiiiftirggeByiZipCoytiiifsiiiiit;tiit;t4‘;‘‘
`
`
`
`
`
`
`
`
`
`
`
`
`feeayee|bugte3Rnan,CAEoa|iiOeOyaeiianneiodeiC4amt;ttedfeES|ioven;tcont‘“ft“at,oeoti“l,itf;‘t;‘ethvindGyii6,FFbool“Tea|4‘iitii4snagversesgit,Onniiigentfece|4aSheer,ifia2@Gitiii,ton|5beeehCeetiitpl,Sdoe|ii
`
`
`iPeoniOoat,pie
`;i4teat
`iaAonmosshe4fee.
`iii
`ibe&4eea.
`;‘t
`444#-s
`iit
`
`iGsiyMeae
`osZed
`i
`i
`;fires
`beheewe
`
`i
`i
`;Ay2%,Ey4
`i)
`ia4eee
`|
`:Sears
`|
`go
`ahfee‘eyge
`?res
`on4eashe
`vn
`:
`
`
`
` rarei+itenesiiere,ta|5
`cdpeei
`
`Ceetiient
`i%Beebes
`poops,
`Pe.
`i
`B&a%&
` xeesyoeqr“64%thwe,“Ze.sectriereneriert
`
`
`
`coveeeceeeenneeeerseerercecersecrey|
`
`‘elres—bediors
`
`Page 5 of 43
`
`Netskope Exhibit 1004
`
`Page 5 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 5 of 22
`
`
`
`US 2014/0013112 Al
`
`icmnsessecsnconconconsesonssosatggrontonsonsarsnsconenronsorsnes
`
`“ay,ampr
`
`
`
`i
`
`
`
` iii3qpreocancsrssnrsrsscerscnscensesssssessenssenscessersnrsens,;,4{oyii{heeli{gregi;ogi4iLgeStyiplas‘ESSunioepeze1aeyai|FABatenberti|OES,onLaygtUt“eyiee(eeéi1£362ohomayi1ptt,Ayfifher,itfo@&awaCdfeetjLeeAfepSpiH44ct¥gfeiee3ii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`",
`
`sy,
`
`
`
`ey
`
`agesve
`
`
`
`
`
`fiitiporn,ineitf/srennonytfft[receeyi4tSpenedi“Neo
`aeses.Aft
`
` t
`
`
`
`es
`<8
`“y
`
`~
`
`—S
`
`ow
`
`Page 6 of 43
`
`Netskope Exhibit 1004
`
`Page 6 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`Patent Application Publication
`
`Jan. 9,2014 Sheet 6 of 22
`
`US 2014/0013112 Al
`
`SeneennnEneeeneeeeennnnneenreeneneneteeetr
`
`;}:}}}}3
`
`BLYme%
`
`nnleencereeencccoet
`
`|
`
`tne
`
`es“£3f2i
`EY
`apo
`fo]
`
`ttttttittttttttt
`
`aXs
`£3
`
`vanoadHltter»
`
`~~
`of
`
`3Ay
`myt
`Ne aks
`
`3raae :
`
`bs
`bedi
`
`’
`
`canner
`
`fe“nd
`
`pa
`
`7i
`
`LD
`
`agree.
`
`reyva
`
`Er
`
`wigLed
`
`a
`
`45iii4i3ii;
`manent
`i
`
`y
`
`+i45‘
`
`eceereccenecee
`
`&
`
`ena
`heen,
`nannnnnts
`Aa
`y
`
`a15hen‘:iiitiiiPFiiiii
`
`a
`
`fiiitPeres,4“ee
`ere‘ey|faba|i
`
`a é
`
`mF}
`he
`
`poh
`
`eeeeeeneeerneeneerteenprennerfiennnneennnnneneern
`
`5 t
`
`. e
`
`dNe6
`
`reaget
`rte,
`ore.
`Srl
`lgeen
`13
`o
`pennies
`:
`
`Page 7 of 43
`
`Netskope Exhibit 1004
`
`Page 7 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 7 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`|
`
`tttthogiaa£,044eree}
`
`
` porting oo.SalttfreeiLeohiiiiiieennenncnrdiiiii.42eetessa,24wa,et|uoiii
`
`
`
`<
`“eee
`irs
`We
`see
`eee
`
`we&*,
`
`
`vagerets,
`
`8
`
`
`
`
`
`
`
`
`
`
`
`dee
`-
`naeannennnennnnnnnnennnennnsng
`
`|
`
`”
`
`Memnet?
`
`anteen,
`iiiit3iii
`
`Opes
`seinen,
`:
`avesnnnennnceneannnuennnannninaaninsnancennananananinaneinnnningnncnnnaannannnnnnnennnn
`'
`
`ts
`rd,
`
`|
`
`yer
`
`been
`
`
`
`Ss
`
`y;
`ititiftttftittiittitIfftittftittititiiftttftittitifttti
`S
`
`tttitiiftttftittititiftftttiittitiiftttftittiittitiiftttftitt
`heres
`
`
`A,
`
`poten,
`
`
`
`covwnceercnreryperreceneeeres
`
`
`
`,ter,‘j3%¢°ri
`odeoF,
`
`
`
`
`
`
`
`Page 8 of 43
`
`Netskope Exhibit 1004
`
`Page 8 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 8 of 22
`
`
`
`US 2014/0013112 Al
`
`er
`‘cone
`
`“eeeet
`
` Pre
`?
`
`ayAg
`
`
`
`aT
`Ledf
`
`
`
`“F
`
`
`setten,
`RSE
`
`
`ofacnnnnnnnnnennnnnnennnnnnnnneng
`
`
`
`g%"teen
`
`arnnenenrrnrren
`
`
`
`titttttI
`
`
`
`:
`
`:
`
`
`(
`
`ea
`
`ihe
`
`
`
`f
`aanennnennende
`
`
`
`
`
`
`
`
`
`
`|
` itee4iii5}‘43iiijiiiiij:reteitoeigrytenna”3Zaoe,iatKerneli‘ccxs®4PreeMYt:eyiMehetii54preeen,provrreesteseee4haeitnewaant?}ion.;t£93".iemGL|weytdfd|t4aiof“enatfudi‘ab
`
`
`
`
`
`
`
`eywal
`“eget“ad
`¥5i‘43iiiii3iiijiiiiieeeiialeivai
`
`
`on
`
`Pein
`
`Le,
`
`oe
`
`
`
`SF...
`
`
`4
`
`
`
`
`
`
`
`
`
`
` mecca?ipntoo,iSeoPose”:PeediLEEii
`
`iiii
`
`afeanee
`
`Od...1,,
`
`Ӥ
`
`a :
`
`i
`soaenaneasefnceacensenacencennenneennepeanansnnsnaenannn
`
`a%~Xwef
`
`oh
`
`3
`
`
`
`
`
`rea
`Led
`
`
`
`
`
`
`
`
`
`sreeeeceececee
`
`
`
`i.
`
`-ii}}ii:i}{
`
`
`
`oennnnnnnnnene
`r
`
`tes
`
`gon
`
`es,
`
`orate?
`
`air
`
`optics,
`
`f
`éhnwennnnnenpeennn
`een
`7
`i
`
`
`
`
`
`aseeres
`
`henereenenerened
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CFR,
`colwe
`Aaenceeeeneeencenceneemeeecenseencnetanccencneceencanscenenenceneeeneneceenensceeceeseeneeeneeeeeenceesceeceeseeneeeceecceneeencemeeesenneeensenseencnnscadecenenneenncenscancnnscenceascancenmonnl
`
`
`Prenat
`rtm,
`heb
`ares
`edcor,
`ees
`
`“ee,
`s
`eeeeeuneeneers
`angenannenennnapennannnennnnannnh
`Fenceteeterstnnntnntnnngnstnnsnnnnnn
`i
`f
`~~
`
`
`
`
`rgtyCBs
`
`
`
`gee
`
`“opCnt,
`
`cae
`
`ate
`
`g
`
`
`port,aes!
`cece
`wottnaene
`“5.
`fatA
`coon
`whee
`pene
`:
`'
`
`
`
`8“
`éro
`sage”
`
`23
`
`
`
`
`oye
`
`
`
`
`
`u
`
`
`
`
`
`
`i|tiii
`
`
`
`4y
`
`nF
`3
`
`sgenty enue tng
`ws
`ont Sa?
`Sty ek
`
`°
`
`oy
`tex
`xwo
`
`=dat
`
`
`
`
`Page 9 of 43
`
`Netskope Exhibit 1004
`
`Page 9 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 9 of 22
`
`
`
`US 2014/0013112 Al
`
`Patent Application Publication
`
`
`
`
`
`po
`
`ary
`
`eageees
`
`Cael
`
`Page 10 of 43
`
`Netskope Exhibit 1004
`
`Page 10 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 10 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`
`
`Patent Application Publication Le
`
`et}"
`
`oY
`
`oy
`
`Page 11 of 43
`
`Netskope Exhibit 1004
`
`Page 11 of 43
`
`Netskope Exhibit 1004
`
`
`
`Patent Application Publication
`
`Jan. 9,2014 Sheet 11 of 22
`
`US 2014/0013112 Al
`
`o
`
`
`
`
`
`
`
`gg
`kt
`g
`e
`_
`i
`of
`:
`:
`‘
`peesfo
`x
`
`{
`;
`{
`ei
`‘
`8
`S
`S
`3
`
`
`mL A
`§ i
`;
`
`ene3
`¢
`3
`8
`¥
`i
`3 a
`:
`on
`=
`:
`:
`i
`eee :
`ae
`i
`i
`y
`<ea
`‘
`:
`Paty
`
`
`i
`oS
`i
`i
`:
`~
`isd
`i
`i
`=
`ed
`t
`‘
`i
`‘
`hal
`y
`.
`‘
`s
`f
`i
`=
`;
`‘
`i
`:
`
`i
`4s
`=
`i
`{
`sorte
`~
`°
`>
`eee
`i
`:
`—~ So To
`i
`ce
`oral
`Se t
`RS
`ge ehh,
`Se
`a ces
`Ets
`Gs
` ea
`~eyo
`Sane
`nS
`“_
`ae
`see
`
`Btn,
`
`Sees
`
`eecesteecesesess
`
`
`
`
`
`
`possssssssssty peneennerennenenseenannennnEeOn
`
`
`si
`a
`a
`:
`“
`
`
`
`
`ii
`
`.
`
`3
`s
`:
`\
`apne se
`we"
`i
`8
`Pen
`Y
` ogyf
`i
`s
`Sf
`eS
`i
`—
`i
`g
`‘
`“
`=
`:
`
`ii
`
` 4
`
`3N
`
`gp
`eh
`eh
`Ase
`
`=
`SS
`os
`na
`Ss
`ene
`
`t
`
`pessssssssssessthy,
`
`r4
`4
`
`333333888
`e®8
`g8
`igs
`:
`g
`ot” a
`a
`per
`i
`Saverio a
`i
`ADS
`i
`i
`:
`ee
`g
`:
`<
`i
`«
`s
`ee
`5
`.
`‘
`BBeg
`~
`:
`&
`moe se
`Sy
`:
`os
`at
`“
`yf
`i BR i
`{
`
`=
`3
`8
`3
`Sevens
`en ASS
`nanogeet
`;
`i
`=
`;
`:
`:
`Se
`8
`i
`g
`=
`3
`—
`i
`:
`3
`: ee
`~
`8
`i
`Ge
`§
`
`
`i
`i
`a
`~<..
`$
`y
`3
`$
`3
`
`:
`
`os
`>
`t‘
`promnncneeertS
`mo
`‘
`=
`i
`i
`§
`\
`y
`a
`i
`os
`i
`Se
`i
`;
`Sc
`\
`g
`s
`g
`{
`{
`i
`:
`i
`{
`{
`{
`i
`:
`i
`‘
`Soe se)
`i
`%
`:
`\
`hy
`i
`3
`s
`~tn
`%
`+
`cae
`ee
`i
`i
`;
`‘
`sexi
`‘
`:
`:
`if
`g
`i
`Ref
`i
`oS
`:
`i
`iif?
`:
`y
`3
`x
`—
`EF FF peneGeaesenenenenengeneges
`“~
`y
`3
`i
`3
`iff
`gk
`sey,
`x
`
`
`
`Hi¢@ f Si as i i = t ‘
`
`
`
`
`
`
`sf
`:
`i er
`wh
`a
`i
`:
`i
`ee ae
`y
`t
`=
`i
`:
`i
`{
`é
`Ss
`go
`owt
`i
`:
`:
`i
`-
`{
`a
`i
`Shoe
`i
`‘
`Ss ©
`‘
`\
`g
`3
`i
`3 a :
`:
`
`SOsoonPrreortecennneenann,: wees o3 { i
`
`
`
`eee fneeeeeeeeeeenti:
`i
`as
`y
`:
`:
`1.
`;
`;
`ee
`g
`Reiewey
`s
`8
`=
`¢
`ean Oo
`;
`i
`so
`i
`{
`oO
`x
`y
`g
`_
`3
`g
`pee
`8.
`ened
`ee
`:
`x
`¥
`ep
`i
`¢
`{
`aes
`y
`“he. al
`-
`t
`i
`i
`en
`seenet
`cS
`:
`os
`‘
`i
`{
`i
`f
`Fem
`i
`{
`‘
`{
`<
`ah
`s
`'
`‘
`i
`:
`‘
`‘
`‘
`<
`<
`eal
`‘
`t
`‘
`weetbt
`:
`§
`:
`i
`t
`‘
`t
`‘
`<
`
`£i
`
`i{
`
`XN{
`i
`t
`‘
`i
`{
`{
`i
`{
`{
`i
`{
`{
`g
`&
`g
`g
`S
`g
`i
`‘
`i
`+
`<
`y
`
`
`
`
`
`
`
`
`
`:
`age
`a
`
`°
`
`N
`sssososs
`§
`
`oat
`
`
`
`
`
`PececeeeeeececeeeeeeeeeetheCeeCEbsbtbeCeeeetagseses
`
`Lent
`8
`s
`23
`‘
`i
`=<
`y
`sf
`=a
`ss
`‘ Bf
`
`aS
`oASY
`,
`:
`< et” EF
`nnnnha
`Aon
`a
`oS
`i
`\
`oe
`< a
`;
`\
`i
`{
`s
`8
`i
`g
`:
`{
`$
`8
`y
`8
`annafuennenneneenenbensng,
`. ee
`|
`pone
`a
`ne oe
`oe
`Sewer
`t
`g
`a
`\
`
`gsoso
`
`oO poe
`neenaei33 en
`jeeeeeeeeeeceeeeeedh
`
`Nace
`att
`—~
`
`Meee
`
`ft4,he
`
`_
`poane SEoS
`te,
`3
`£z ee
`
`renner
`
`ih
`=
`
`
`
`eye
`i
`aS {
`3
`~
`3
`;
`
`i
`:
`
`i{
`i
`{
`{
`{
`3
`3
`{
`{
`“ben.
`
`
`
`‘
`
`
`
`
`
`eee
`
`~
`
`=
`x
`
`
`
`~
`
`g
`3
`g
`g
`8
`peal
`i
`ee
`|
`ay
`med
`when
`Bane
`es
`&
`8
`i
`
`
`jesencensssssesfi&,
`
`beaaaaanaaeetpZ
`
`
`¢f
`
`f
`een
`Lavennnnnned
`
`
`
` POPPERPPPPPPPPERPIPPEPPEPREDPPPELELLDDDIEEESEIIDDLEEEELIDDLIEEpLIDDLLEEELLDDYLEEEELEDDREEEEELDf¢
`
`Page 12 of 43
`
`Netskope Exhibit 1004
`
`Page 12 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`poosecscanacenrbecsssnanerenacsenes
`qf
`
`
`
`i‘geei2iwhei4i
`odoeii2iiiiZi:gprs
`ifalOrdiononi“4CeaiAAELLL,ioo;thcs{faem5iZsfoe|aeoetAiji£3ndoh.eeeyifoe,2hiEtei5eeeii4fsCo|hyBna,“ii2eZ|wef,tycmiaia|heet“ziigBe|Oa|$egynpg"Sytog?Badeninnnai-[7aa)$e;POameewnte4h,ia:aaghi£3peeséiiABee|ed12tot:iiBegeTenbh|womWdOraai12IG|Aty
`iooosHeefi4iaPe|‘oadiwegyi44.
`ii%ii
`i|fe‘iiiiiiiiiiiiiiiiii.iiodiiitaoti}
`oe|ws,ig|Gtehoaoyi‘eat
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 12 of 22
`
`
`
`US 2014/0013112 Al
`
`i
`
`aoy2aaeveewewySvopree*,*,54a4¥ieovennnenen
`
`easeeneneneenSERREBEE
`
`
`
`5%
`Sosg&
`yo
`
`4
`
`
`
`
`
`Page 13 of 43
`
`Netskope Exhibit 1004
`
`Page 13 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 13 of 22
`
`
`
`US 2014/0013112 Al
`
`we
`
`
`
`
`
`
`
`
`
`
`
`penetttterttetittetimine,
`
`SeG&
`
`ChOe
`
`mo
`
`bh,FE
`
`r
`
`fie
`
`
`
`freceeccercenerseeneee
`
`
`
`he
`
`"hecancercererreceseaeet
`
`i
`
`
`
`
`
`gree
`
`“£3
`
`Page 14 of 43
`
`Netskope Exhibit 1004
`
`
`rs,ft-4mefwfaeee!|eekf|eeeveersEeliennnennnensnareerenneennnncnenens|-irtiwapi
`oonin3wewy@ashe.*oanee“€f,we|oogw@““BeRBGerece
`wryxyfecesyenonfad
`sages.soa“3WhheegeeEdOGoteadseBemTh|eenantnnantennantnnantnnnantnnantnnnsnsnnanannersnnansdfbfone
`ie,dh,WGNESte.
`oaeeaeoy7Oyomwya“syre“%oo“of
`4|iiiii||i£$%iaeiEiayiiiii||iiiii||i
`
`
`cevacereerncennnerertfiiiganyr,8Ps
`
`
`
`
`
`
`
`
`
`ow
`
`es
`
`t:i
`1470
`
`
`
`a
`
`&
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 14 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 14 of 22
`
`
`
`US 2014/0013112 Al
`
` 3vageven
`
`
`
`
`
`a44%dachors.
`
`
`
`«
`
`eeeeeee
`
`rsgh“teen
`
`Page 15 of 43
`
`Netskope Exhibit 1004
`
`Page 15 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`Jan. 9,2014 Sheet 15 of 22
`
`
`
`US 2014/0013112 Al
`
`z
`
`
`
`Patent Application Publication
`
`
`
`
`
`‘4£&4
`
`LL.
`
`Oeaneees
`
`Page 16 of 43
`
`Netskope Exhibit 1004
`
`Page 16 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 16 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`aa
`
`PA
`
`ote
`
`
`LYS
`
`ie¥
`
`
`
`ith
`
`Page 17 of 43
`
`Netskope Exhibit 1004
`
`Page 17 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 17 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`Page 18 of 43
`
`Netskope Exhibit 1004
`
`Page 18 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 18 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`cm]
`
`
`
`ay
`
`ceedeeegr
`wa
`
`no4Gonett
`
`refrrtn,
`Geareek,Lad
`fob,fopy,teed
`
`
`ON
`4
`heehee,
`
`-_%,
`
`“oon
`‘ccer?
`
`
`
`enerees
`
`aggre
`
`Page 19 of 43
`
`Netskope Exhibit 1004
`
`Page 19 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`Patent Application Publication
`
`
`
`
`Jan. 9,2014 Sheet 19 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`frondarrrrrRSpocoBED”
`
`4
`47%
`oY%,
`een
`
`aiybebeoes
`
`weneees
`
`Page 20 of 43
`
`Netskope Exhibit 1004
`
`Page 20 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 20 of 22
`
`
`
`US 2014/0013112 Al
`
`‘,$A
`
`reey
`
`bed
`
`rn
`
`nteet
`
`
`
`
`
`Page 21 of 43
`
`Netskope Exhibit 1004
`
`Page 21 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 21 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`
`
`
`
`
`
`Page 22 of 43
`
`Netskope Exhibit 1004
`
`Page 22 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`
`Patent Application Publication
`
`
`
`
`
`
`Jan. 9,2014 Sheet 22 of 22
`
`
`
`US 2014/0013112 Al
`
`
`
`
`
`Page 23 of 43
`
`Netskope Exhibit 1004
`
`Page 23 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`US 2014/0013112 Al
`
`
`Jan. 9, 2014
`
`
`
`ENCRYPTING FILES WITHIN A CLOUD
`
`
`
`COMPUTING ENVIRONMENT
`
`
`
`
`
`
`
`RELATED APPLICATIONS
`
`
`
`
`
`
`
`
`
`[0001] This application claims priority from U.S. provi-
`
`
`
`
`
`
`
`
`
`
`sional patent Ser. No. 61/603,910 filing date Feb. 27, 2012,
`
`
`
`
`
`
`
`this application is a continuation in part of U.S. patent appli-
`
`
`
`
`
`
`
`
`
`
`cation Ser. No. 13/031,628 filing date Feb. 22, 2011 which in
`
`
`
`
`
`
`
`
`
`turn claimspriority from U.S. provisional patent Ser. No.
`
`
`
`
`
`
`
`
`61/306,578 filing date Feb. 22, 2010, all patent applications
`
`
`
`
`are incorporated herein by reference.
`
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`[0002] The advances and reduced costs of network con-
`
`
`
`
`
`
`
`
`nected mobile devices in recent years have brought a dramatic
`
`
`
`
`
`
`
`
`
`change in user behavior. The typical user owns multiple per-
`
`
`
`
`
`
`
`
`sonal devices ranging from desktop and laptop computers,
`
`
`
`
`
`
`
`notebooks, tablets, smart phones and electronic books. Con-
`
`
`
`
`
`
`
`there is a growing need to share data among
`sequently,
`
`
`
`
`
`
`
`devices, as well as to guarantee its availability despite the fact
`
`
`
`
`
`
`
`
`that devices may be turned off, disconnected and replaced.
`
`
`
`
`
`
`The penetration of such technology is rapidly increasing in
`
`
`
`
`
`
`
`organizationsofall sizes. As a result, users are mixing enter-
`
`
`
`
`
`
`
`
`prise files, documents and applications together with their
`
`
`personal media.
`
`
`
`
`
`
`
`
`
`
`[0003]
`To this end, the use of cloud-based storage for shar-
`
`
`
`
`
`
`
`
`ing information between different devices and also among
`
`
`
`
`
`
`
`
`group of users has become a standard. Many consumer com-
`
`
`
`
`
`
`
`mercial offerings such as Dropbox, Box, iCloud, Google
`
`
`
`
`
`
`
`
`Drive and Sugarsync have gained widespread user popularity.
`
`
`
`
`
`
`
`
`[0004] These services offer cloud-basedstorage that is con-
`
`
`
`
`
`
`
`nected to the devices through apps or through a browser
`
`
`
`
`
`
`
`
`interface. The apps presentto the user a directory structure of
`
`
`
`
`
`
`
`files organized in folders similar to the appearance of native
`
`
`
`
`
`
`application such as MS Explorer. In certain operating systems
`
`
`
`
`
`
`
`
`(Windows, Apple OS X)the folder are accessedvia the native
`
`
`
`
`
`
`
`
`
`file browser application. The folders on the device are syn-
`
`
`
`
`
`
`
`
`chronized with the storage on the cloud and therefore main-
`
`
`
`
`
`
`
`
`
`
`tain a coherentfile and directory state and view across all
`
`
`
`
`
`
`
`
`
`devices.
`In certain cases (e.g. Sugarsync) the files are
`
`
`
`
`
`
`
`
`uploaded to the cloud but are not necessarily automatically
`
`
`
`synchronizedtoall devices.
`
`
`
`
`
`
`
`In addition to the web-storage services, there is a
`[0005]
`
`
`
`
`
`
`parallel trend of uploading unstructured data, in particular
`
`
`
`
`
`
`company documents, to SaaS (Software as a Service) ser-
`
`
`
`
`
`
`
`vices. New cloud-based enterprise application such as Sales-
`
`
`
`
`
`
`
`force.com, Success Factors, and Box, and consumer-based
`
`
`
`
`
`
`
`
`applications such as Google Docs and Gmail, are essentially
`
`
`
`
`
`
`
`independent documentrepositories. These new services have
`
`
`
`
`
`
`
`caused a major migration of documents from the corporate
`
`
`
`storage to web-based SaaS.
`
`
`
`
`
`
`
`FIG.1 illustrates enterprise based services 20 such
`[0006]
`
`
`
`
`
`
`
`
`
`
`as Salesforce 21, Jive 23 and Box 24 andothers (such as 22),
`
`
`
`
`
`
`
`consumer based services 10 such as Dropbox 13, Gmail 11
`
`
`
`
`
`
`
`
`and others 12, that are accessed by an enterprise system 30
`
`
`
`
`
`
`
`
`
`that includes a database 31, access control, DLP (Data Loss
`
`
`
`
`
`
`Prevention), DMS (Document Management Service) and
`
`
`
`analytics modules 32-35.
`
`
`
`
`
`
`
`
`[0007] This trend has caused several major problems.
`
`
`
`
`
`
`
`
`
`[0008]
`a. The cloud storage resides outside the enterprise
`
`
`
`
`
`
`storage and managementsystems. It is impossible for IT
`
`
`
`
`
`
`managers to understand what type of data is placed in
`
`
`
`
`
`
`these services,
`track the content evolution/changes,
`
`
`
`
`
`
`
`
`
`police the access and usage of the content and prevent
`
`
`
`
`
`misplacement, duplication and unauthorized access.
`
`
`
`
`
`
`
`There may be certain organizational data that is not
`
`
`
`
`
`
`
`allowed on someorall of these services. Finally, the
`
`
`
`
`
`
`consumer-oriented services are easy to break-in using
`
`
`
`
`
`
`
`Phishing or password breaking, and have sharing capa-
`
`
`
`
`
`
`
`bilities that may cause enterprise data to be shared by
`
`
`
`
`
`
`
`mistake with unauthorized parties (inside or outside the
`
`organization).
`
`
`
`
`
`
`
`b. Cloud storage is usually implementedas a data
`[0009]
`
`
`
`
`
`
`
`center level storage and therefore is expensive compared
`
`
`
`
`
`
`
`
`to the on-device storage. 2011 technology andprices
`
`
`
`
`
`
`
`have resulted in a 1 TB of storage for a typical home
`
`
`
`
`
`entertainment system or desktop computer, and 32 GB
`
`
`
`
`
`
`
`for a typical smart phoneora tablet. Similarly, within
`
`
`
`
`
`
`
`
`organizations,
`the data owned and shared by an
`
`
`
`
`
`
`
`employee within organization file systems and current
`
`
`
`
`
`
`
`content managementsystemsoffer even larger amounts
`
`
`
`
`
`
`
`of storage. In comparison popular cloudstorage services
`
`
`
`
`
`
`
`
`typically offer only 2-5 GB of storage for free. Conse-
`
`
`
`
`
`
`
`quently, there are several orders ofmagnitude difference
`
`
`
`
`
`
`
`
`
`between the quantity of storage that
`is used and
`
`
`
`
`
`
`
`
`addressed by the user and the reasonably priced cloud
`
`
`
`
`
`
`
`
`storage solution that can be offered to that user. Even
`when the user does not wish to access all addressable
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage but only “relevant” topical material, the current
`solutionsare static and manual. The user needsto select
`
`
`
`
`
`
`
`
`
`which file he wants to share and move them to the cloud
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage directory. This maylead to situation that the data
`the user wouldlike to access is not available online.
`
`
`
`
`
`
`
`
`
`
`
`SUMMARY OF THE INVENTION
`
`
`
`
`
`
`
`[0010] According to an embodimentof the invention there
`
`
`
`
`
`
`
`may be provided a methodfor encrypting a file, the method
`
`
`
`
`
`
`
`
`
`may include: retrieving thefile from a storage service; seg-
`
`
`
`
`
`
`
`
`
`menting the file into multiple file segments; calculating a file
`
`
`
`
`
`
`
`
`segment signature for each of the multiple file segments to
`
`
`
`
`
`
`
`provide multiple file segment signatures; encrypting each of
`
`
`
`
`
`
`
`
`the multiple file segments to provide multiple encryptedfile
`
`
`
`
`
`
`
`
`segments by using encryption keys that are in responseto the
`
`
`
`
`
`
`
`multiple file segment signatures; wherein the multiple
`
`
`
`
`
`
`
`
`encrypted file segments form an encryptedfile; and sending
`
`
`
`
`
`
`
`
`the multiple encrypted file segments to the storage service.
`
`
`
`
`
`
`
`
`
`[0011] The method mayinclude deleting the file from the
`
`
`storage service.
`
`
`
`
`
`
`
`[0012] The method may include calculating each encryp-
`
`
`
`
`
`
`tion key in response to a file segment signature associated
`
`
`
`
`
`
`
`with a file segmentthat is encrypted by the encryption key.
`
`
`
`
`
`
`
`
`[0013] The method mayinclude associating with the mul-
`
`
`
`
`
`
`
`
`tiple encrypted file segments the multiple file segment signa-
`tures.
`
`
`
`
`
`
`
`[0014] The segmenting, the calculating and the encrypting
`
`
`
`
`maybe executed by a managementserver.
`
`
`
`
`
`
`
`
`[0015] The method mayinclude flagging the encryptedfile
`
`
`
`as being encrypted.
`
`
`
`
`
`
`
`
`[0016] The method mayinclude flagging the encryptedfile
`
`
`
`
`
`
`
`
`as being encryptedbyaltering a file type ofthe encryptedfile.
`
`
`
`
`
`
`
`[0017] The method mayinclude exposing the encryptedfile
`
`
`
`
`
`
`
`to auser ofthe managementserver through an interface ofthe
`
`
`storage service.
`
`
`
`
`
`
`
`[0018] Thesegmenting may include separating text content
`
`
`
`
`
`
`of the file and image contentofthefile.
`
`
`
`
`
`
`
`[0019] The method may include preventing the segment-
`
`
`
`
`
`
`
`
`ing, the calculating and the encryptingofthefile ifthe file has
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 24 of 43
`
`Netskope Exhibit 1004
`
`Page 24 of 43
`
`Netskope Exhibit 1004
`
`
`
`
`
`US 2014/0013112 Al
`
`
`Jan. 9, 2014
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0035] The method mayincluderetrievingthefile from the
`been modified by a user of the storage service during a pre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage service, wherein the storage service applies a first
`determined period from a momentofthe retrieving ofthe file
`
`
`
`
`
`
`
`
`
`de-duplication policy; wherein the segmenting ofthefile by
`by the managementserver.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the file management server is executed while a applying a
`[0020] The method mayinclude preventing the deletion of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second de-duplication policy that differs from the first de-
`the file if the file has been modified by a user of the storage
`
`
`
`
`
`
`
`
`duplication policy.
`service during a predeterminedperiod from a momentof the
`
`
`
`
`
`
`
`
`[0036] The method whereinat least one ofthe management
`retrieving ofthefile.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`server and the storage service belong to a cloud computing
`[0021] The segmenting may includefinding initialfile seg-
`environment.
`
`
`
`
`
`
`
`ments by applyinga first segmentation process; and defining
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0037] The method may includeretrieving the file from a
`each file segment as may include multiple initial file seg-
`
`
`
`
`
`
`
`ments.
`
`dedicated folder that is allocated forfiles to be encrypted.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0038] The method may include creating a new folder for
`[0022] The finding of the initial file segments may include
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`files to be encrypted, wherein the folderis exposed to the user.
`applying at least one process out of Rabin fingerprint process
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0039] The method mayincluderetrieving the file from a
`and cyclic redundancy code (CRC)process.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`dedicated folder that is allocated to files to be encrypted.
`[0023] The segmenting of the file into multiple file seg-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0040] The method mayinclude flagging the encryptedfile
`ments is executed independentofafile segmentation scheme
`
`
`
`
`
`
`
`
`
`as being encrypted.
`applied onthefile by the storage service.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0041] The method mayinclude changinga type ofa file to
`[0024] The segmenting ofthefile to multiple file segments
`
`
`
`
`
`
`
`
`
`
`
`
`a type that is indicative of the encryption ofthefile.
`is executed independent of a file segmentation scheme
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0042] The method mayinclude sendingthefile to a cache
`applied on the file by the storage service for de-duplication
`
`
`
`
`
`
`
`
`memory before starting the segmenting,the calculating, and
`purposes.
`
`
`
`
`
`
`
`
`
`
`the encrypting actions.
`Thefile is associated with a certain user; wherein the
`[0025]
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0043] There may be provided a method for decrypting an
`method mayinclude using different segmentation parameters
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encrypted file, the method may include: receiving a request,
`for segmenting anotherfile that is associated with another
`
`
`
`
`
`
`
`user that differs from the certain user.
`
`
`
`
`
`
`
`by a managementserver, to provide at least one encryption
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`key for decrypting at least one encrypted file segment of the
`[0026]
`Thefile is associated with a certain user; wherein the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encryptedfile by a user device, after the management server
`method mayinclude using different encryption parameters
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`generated the encryptedfile to be of a specific file type and
`for encrypting anotherfile that is associated with another user
`
`
`
`
`
`
`
`
`
`after a storage service stored the encrypted file; wherein the
`that differs from the certain user.
`
`
`
`
`
`
`
`
`
`
`
`
`
`request may includeafile segmentsignature; determining, by
`
`
`
`
`
`
`
`[0027]
`Thefile is associated with a userof certain group of
`
`
`
`
`
`
`
`the managementserver, whetherthe user device is authorized
`
`
`
`
`
`
`
`
`
`users; wherein the method may include using different seg-
`
`
`
`
`
`
`
`
`
`
`to decrypt the at least one encryptedfile segment; and sending
`
`
`
`
`
`
`
`
`mentation parameters for segmenting anotherfile that is asso-
`
`
`
`
`
`
`
`
`
`the at least one encryption key to the user device if it is
`
`
`
`
`
`
`
`
`ciated with another user that belongs to another group of
`
`
`
`
`
`
`
`
`users.
`determinedthat the user device is authorized to decryptthe at
`
`
`
`
`
`
`least one encrypted file segment.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thefile is associated with a userof certain group of
`[0028]
`[0044] A single encryption key maybe used for encrypting
`
`
`
`
`
`
`
`
`
`user; wherein the method mayinclude using different encryp-
`
`
`
`
`
`all the file segments ofa file.
`
`
`
`
`
`
`
`
`tion parameters for segmenting anotherfile that is associated
`
`
`
`
`
`
`
`
`[0045] Theat least one encryption key may be generated in
`
`
`
`
`
`
`
`
`with another user that belongs to another group of users.
`
`
`
`
`
`
`
`
`response to a content of at the least one encryptedfile seg-
`
`
`
`
`
`
`
`
`[0029] The method may include addinga useridentifier to
`ment.
`
`
`
`
`
`
`
`
`
`
`each file segment; wherein the useridentifier identifies a user
`
`
`
`
`
`
`
`
`[0046] The method may includereceiving the request from
`associated with thefile.
`
`
`
`
`
`
`
`
`
`
`an application that is regarded by the operating system hosted
`
`
`
`
`
`
`
`
`[0030] The method wherein identicalfile segments may be
`
`
`
`
`
`
`
`by the user device to be associated with files ofthe certain file
`
`
`
`
`
`
`associated with identical encryption keys.
`type.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0031] The method mayincluderetrievingthefile from the
`[0047] The method whereinat least one ofthe management
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`storage service, wherein thefile is stored in a storage entity in
`server and the storage service belong to a cloud computing
`
`
`
`
`
`
`
`an encrypted form and is decrypted by the storage service to
`environment.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be provided in a decrypted form to the managementserver;
`[0048] There may be provided a method for decrypting an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the encrypting by the managementserveris executed
`encryptedfile, the method mayinclude: retrieving, by a user
`
`
`
`
`
`
`
`
`
`
`
`
`
`independentof a decryption applied by the storage service.
`device, ofone or more file segmentsignatures associated with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0032] The managementserver and the storage service may
`one or more encrypted file segments of an encryptedfile;
`
`
`
`
`
`
`
`
`
`
`
`
`be located in a cloud computing environment.
`wherein eachfile segment signature is mapped to a decryption
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[0033] The method mayincluderetrievingthefile from the
`key that facilitates a decry