主权项 |
1. A computerized method including:
receiving a file on a computer, wherein said file on said computer contains data, wherein said data is unencrypted; placing said file into a replication folder on a local computer storage, wherein said replication folder is a copy of a cloud storage folder, wherein said cloud storage folder includes a PIDlist file, wherein said PIDlist file includes an encryption key for a first user; generating an unencrypted session key from random data; using said unencrypted session key to encrypt said file forming an encrypted copy of said file; using said encryption key for said first user to encrypt said unencrypted session key forming an encrypted session key; placing said encrypted session key into a session key file; and placing said encrypted copy of said file and said session key file onto a cloud storage folder, wherein said encrypted files are encrypted using an unencrypted session key generated from random data, wherein said unencrypted session key is encrypted using an encryption key for a first user that has been retrieved from said cloud based data storage. |