Systems and methods for securing data in motion
First Claim
1. A method for securing the filename of a file to be split and stored on a storage network, the method comprising:
- encrypting, by processing circuitry communicatively coupled to the storage network, the filename of the file using an encryption algorithm;
generating one or more data shares from the file using an information dispersal algorithm, at least one of the one or more data shares having a share name that is associated with the encrypted filename;
storing the generated data shares on one or more data share locations in the storage network; and
regenerating the filename of the file by decrypting the share name of one of the generated data shares.
4 Assignments
0 Petitions
Accused Products
Abstract
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
354 Citations
20 Claims
-
1. A method for securing the filename of a file to be split and stored on a storage network, the method comprising:
-
encrypting, by processing circuitry communicatively coupled to the storage network, the filename of the file using an encryption algorithm; generating one or more data shares from the file using an information dispersal algorithm, at least one of the one or more data shares having a share name that is associated with the encrypted filename; storing the generated data shares on one or more data share locations in the storage network; and regenerating the filename of the file by decrypting the share name of one of the generated data shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing the filename of a file to be split and stored on a storage network, the system comprising:
-
at least one non-transitory computer readable medium storing computer executable instructions; and processing circuitry communicatively coupled to the at least one non-transitory computer readable medium and operable to execute the computer-readable instructions stored thereon, the processing circuitry configured to; encrypt the filename of the file using an encryption algorithm; generate one or more data shares from the file using an information dispersal algorithm, at least one of the one or more data shares having a share name that is associated with the encrypted filename; store the generated data shares on one or more data share locations in the storage network; and regenerate the filename of the file by decrypting the share name of one of the generated data shares. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification