SECURE FILE SHARING METHOD AND SYSTEM
    1.
    发明申请

    公开(公告)号:US20200274711A1

    公开(公告)日:2020-08-27

    申请号:US16587847

    申请日:2019-09-30

    Abstract: Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed.

    TAPE BACKUP METHOD
    4.
    发明申请
    TAPE BACKUP METHOD 审中-公开
    磁带备份方法

    公开(公告)号:US20160103770A1

    公开(公告)日:2016-04-14

    申请号:US14918176

    申请日:2015-10-20

    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

    Abstract translation: 提供了可以集成到用于安全地存储和传送数据的任何合适的系统中的安全数据解析器。 安全数据解析器解析数据,然后将数据分割成多个部分,这些部分被清楚地存储或通信。 原始数据的加密,数据的部分或两者可以用于额外的安全性。 安全数据解析器可以用于通过将原始数据分割成可以使用多个通信路径来传送的数据部分来保护运动中的数据。

    Secure file sharing method and system

    公开(公告)号:US10027484B2

    公开(公告)日:2018-07-17

    申请号:US14749172

    申请日:2015-06-24

    Abstract: Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed.

    SECURE FILE SHARING METHOD AND SYSTEM
    7.
    发明申请
    SECURE FILE SHARING METHOD AND SYSTEM 有权
    安全文件共享方法和系统

    公开(公告)号:US20150317487A1

    公开(公告)日:2015-11-05

    申请号:US14749172

    申请日:2015-06-24

    Abstract: Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed.

    Abstract translation: 提供系统和方法来安全地共享数据。 处理器形成用对称密钥加密的数据集的两个或多个共享,数据集与第一用户设备相关联,并且使加密的数据集共享在至少一个远程存储位置中彼此分离存储。 处理器通过分别用与第一用户设备和第二用户设备相关联的第一和第二非对称密钥对的第一非对称密钥加密指示对称密钥的数据来产生第一和第二加密密钥,并且使加密密钥被存储 在至少一个存储位置。 为了恢复数据集,需要预定数量的两个或更多个加密数据集共享,并且需要第一和第二非对称密钥对中的至少一个第二非对称密钥。

    Secure file sharing method and system

    公开(公告)号:US11218312B2

    公开(公告)日:2022-01-04

    申请号:US16587847

    申请日:2019-09-30

    Abstract: Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed.

    SECURE FILE SHARING METHOD AND SYSTEM

    公开(公告)号:US20220131696A1

    公开(公告)日:2022-04-28

    申请号:US17567161

    申请日:2022-01-03

    Abstract: Systems and methods are provided for securely sharing data. A processor forms two or more shares of a data set encrypted with a symmetric key, the data set associated with a first user device, and causes the encrypted data set shares to be stored separately from each other in at least one remote storage location. The processor generates first and second encrypted keys by encrypting data indicative of the symmetric key with a first asymmetric key of first and second asymmetric key pairs associated with the first user device and a second user device, respectively, and causes the encrypted key to be stored in the at least one storage location. To restore the data set, a predetermined number of the two or more encrypted data set shares and at least one of the second asymmetric keys of the first and second asymmetric key pairs are needed.

Patent Agency Ranking