发明名称 Systems and methods for searching shared encrypted files on third-party storage systems
摘要 A computer-implemented method for searching shared encrypted files on third-party storage systems may include (1) receiving, at a server-side computing system, a request from a user to search at least one encrypted file to which a group of users that includes the user shares access, (2) identifying, in response to the request, at least one encrypted search index compiled for and shared by the group of users that enables the encrypted file to be searched, (3) decrypting the encrypted search index with a key with which each user within the group of users has access, and (4) using the decrypted search index to respond to the request from the user. Various other methods, systems, and computer-readable media are also disclosed.
申请公布号 US9342705(B1) 申请公布日期 2016.05.17
申请号 US201414199158 申请日期 2014.03.06
申请人 Symantec Corporation 发明人 Schneider Scott;Bogorad Walter;Zhang Haibin;Sundaram Sharada
分类号 G06F21/62;G06F17/30 主分类号 G06F21/62
代理机构 ALG INTELLECTUAL PROPERTY, LLC 代理人 ALG INTELLECTUAL PROPERTY, LLC
主权项 1. A computer-implemented method for searching shared encrypted files on third-party storage systems, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: receiving, from a client-side computing device of a first user by a server-side computing system, a request from the first user to share with a second user access to at least one encrypted document to which the first user has access; providing, in response to the request from the first user by the server-side computing system, the second user with access to the encrypted document; receiving, from a client-side computing device of the second user by the server-side computing system, a request from the second user to search the encrypted document to which the second user has access, wherein: a group of users shares access to the encrypted document;the group of users comprises the first user and the second user; identifying, in response to the request from the second user, at least one encrypted search index compiled for and shared by the group of users that enables the encrypted document to be searched, wherein each user within the group of users has access to a key with which the encrypted search index may be decrypted; decrypting, by the server-side computing system, the encrypted search index with the key; using, by the server-side computing system, the decrypted search index to respond to the request from the second user, wherein the server-side computing system comprises the computing device.
地址 Mountain View CA US