The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 23, 2013

Filed:

Oct. 30, 2007
Applicants:

Neeta Garimella, San Jose, CA (US);

Alexei Kojenov, Beaverton, OR (US);

Shawn P. Mullen, Buda, TX (US);

Ravi A. Shankar, Austin, TX (US);

John Viksne, San Mateo, CA (US);

Inventors:

Neeta Garimella, San Jose, CA (US);

Alexei Kojenov, Beaverton, OR (US);

Shawn P. Mullen, Buda, TX (US);

Ravi A. Shankar, Austin, TX (US);

John Viksne, San Mateo, CA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04K 1/04 (2006.01); H04K 1/10 (2006.01);
U.S. Cl.
CPC ...
Abstract

The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key. The computer encrypts the file encryption key with the active private key of the first keystore.


Find Patent Forward Citations

Loading…