Encrypting file system and method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S286000, C713S152000

Reexamination Certificate

active

06249866

ABSTRACT:

FIELD OF THE INVENTION
The invention relates generally to computer storage techniques, and more particularly to an encrypting file system and method for computer systems.
BACKGROUND OF THE INVENTION
The protection of sensitive data is becoming a very important issue to users of computers. For example, data such as personnel records or customer credit card numbers may be stored on a computer, and if that computer (or even just the storage media) is stolen, the thief has access to the sensitive information. This is especially troublesome with laptop computers, which are frequently stolen by sophisticated thieves. Moreover, information may be misappropriated even when the storage media is not physically taken, such as when an unauthorized individual gains access to a computer (possibly when that computer is simply online) and copies information from some or all of its files. Those authorized to access the sensitive information may not even know that it has been copied.
To protect information, one type of security procedure involves encrypting the data, so that even if the data falls into the wrong hands, it cannot be read without a key. Many application level programs provide some form of such encryption. While better than nothing, however, such existing encryption schemes suffer from myriad problems.
One serious problem is that the encrypted data is still susceptible to a number of attacks. More particularly, applications providing encryption functions use password/pass-phrase derived keys, which are weak by definition due to dictionary attacks and the like. Moreover, attacks improve over time, particularly as hardware improves, and what was once considered safe by one application may no longer be safe.
Also, users tend to lose keys. The problem of lost keys can be eliminated by spreading the key around to multiple users, but this further compromises security. Moreover, each file may have a different password, making recall difficult. Accordingly, for convenience many users will encrypt many files with the same password key used to encrypt one file, whereby divulging a key to another person for one file often results in inadvertently giving that person the key to many other files. Moreover, in order to remove or add user access to one or more files, each file (and every copy of each file) must be decrypted and re-encrypted with the new key, and then redistributed.
Yet another significant problem is that the encryption process is inconvenient, requiring the encrypting and decrypting of each such file during each use. As a result, many typical users tend to neglect security concerns rather than bother with encrypting various files.
Another serious problem is that most applications create temporary files while a user works on a document. These temporary files are not always removed after the original is saved, leaving the sensitive data vulnerable. Also, with contemporary operating systems, application-level encryption runs in the user mode, and thus all the data, including the user's encryption key, can make into the page file, making the task of locating a key quite easy. Lastly, most file encryption applications have built-in encryption algorithms, and are therefore not extendible or flexible in supporting different or multiple algorithms that would allow users to update encryption algorithms as such algorithms improve over time, or to select from among encryption algorithms for particular data, e.g., to make a speed versus strength tradeoff based on the sensitivity of the data being encrypted.
OBJECTS AND SUMMARY OF THE INVENTION
Accordingly, it is a general objective of the present invention to provide an improved system and method for encrypting data that substantially eliminates the above-described problems.
Another objective is to provide a system and method of the above kind that is integrated into a file system.
A related objective is to provide the system and method wherein encryption and decryption work transparently to legitimate users.
In accomplishing those objectives, it is a related objective to provide a system and method as characterized above that provides for the ability to share sensitive data among more than one legitimate user, and wherein adding and removing access for a user is simple.
Yet another objective is to provide a strong cryptographic solution that addresses encrypted data recovery, such as when users lose keys.
Still another objective is to provide a system and method of the above kind that is flexible and extensible.
Briefly, the present invention provides a system and method for encrypting or decrypting data in a file. Whenever a user specifies that a file or its parent directory is encrypted, the encrypting file system receives an encryption key associated with the file. Then, when the system receives a request to write any plaintext file data to disk in an encrypted manner, the file system receives the file data, encrypts the file data into encrypted file data using the encryption key, and writes the encrypted file data to the disk. Conversely, when the system receives a request to read encrypted file data from the disk, the file system reads the encrypted file data, decrypts the read data into decrypted file data using the encryption key, and returns the decrypted file data to the user.
The encryption key is a random number encrypted by the public key of at least one user and at least one recovery agent. These keys are stored with the file, whereby the file can always be decrypted by the private key of either a user or a recovery agent.
Other objects and advantages will become apparent from the following detailed description when taken in conjunction with the drawings, in which:


REFERENCES:
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4386234 (1983-05-01), Ehrsam et al.
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5224166 (1993-06-01), Hartmann, Jr.
patent: 5319705 (1994-06-01), Halter
patent: 5598470 (1997-01-01), Cooper et al.
patent: 5870468 (1999-02-01), Harrison
patent: 5870477 (1999-02-01), Sasaki
patent: 0 681 233 A1 (1995-11-01), None
Copy of Written Opinion in Corresponding PCT Application No. PCT/US98/19049.
Copy of International Search Report in Corresponding PCT Application No. PCT/US98/19049.
Denning, Dorothy E.; Branstad, Dennis K. “A Taxonomy for Key Escrow Encryption Systems”Communications of the ACMvol. 39, No. 3: 34-39. Mar. 1996.
Blaze, Matt. “A Cryptographic File System for Unix”First ACM conferenceNov. 3-5, 1993.
Rivest, R. L.; Shamir, A.; Adleman, L. “A Method for Obtaining Kigital Signatures and Public Key Cryptosystems”Communications of the ACMvol. 21, No. 2: 120-126. Feb. 1978.
Cattaneo, G.; Persiano, G. “Design and Implementation of a Transparent Cryptographic File System for Unix”Dep. Informatica ed Appl., Universita di Salerno, Baronissi(SA)—Italy.
Blaze, Matt. “Key Management in an Encrypting File System”1994 Summer USENIX27-35. Boston, MA Jun. 6-10, 1994.
Eastlake, et al. “RFC 1750: Randomness Recommendations for Security”GlobeCom Network1-28 Dec. 1994.
Editors: Foot, G. H.; Sewell, R. F. “The Public Key Cryptography” vol. 1, No. 1. Jan. 1991.
Editors: Foot, G. H.; Sewell, R. F. “The Public Key” vol. 1, No. 2. Jun. 1991.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Encrypting file system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Encrypting file system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encrypting file system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2452799

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.