Secure distributed backup for personal device and cloud data
First Claim
1. A storage device or storage disk comprising instructions which, when executed, cause a first device to at least:
- generate a first file chunk and a second file chunk from a file in response to a request from a client device to store the file remotely from the client device,encrypt the first file chunk by a first encryption method;
encrypt the second file chunk by a second encryption method different than the first encryption method;
transmit the first file chunk to a first storage system of a first cloud storage service;
transmit the second file chunk to a second storage system of a second cloud storage service; and
generate a map that (A) identifies a first storage location of the first file chunk and a second storage location of the second file chunk, (B) first encryption information corresponding to the first encryption method and second encryption information corresponding to the second encryption method, and (C) includes first login information to access the first cloud storage service and second login information to access the second cloud storage service; and
transmit the map to a remote device different from the first device and the client device.
11 Assignments
0 Petitions
Accused Products
Abstract
Securely distributing a backup file includes identifying a file to be stored, generating a plurality of file chunks from the file, transmitting from a first device, each of the plurality of file chunks to one of a plurality of storage locations, and generating, at the first device, a map that identifies the storage location for each chunk. Retrieving a distributed backup file includes receiving a request to retrieve a file, obtaining a map corresponding to the file, wherein the map identifies a storage location for each of a plurality of file chunks of the file, retrieving the plurality of file chunks from the identified locations, and generating the requested file by combining the plurality of file chunks.
-
Citations
15 Claims
-
1. A storage device or storage disk comprising instructions which, when executed, cause a first device to at least:
-
generate a first file chunk and a second file chunk from a file in response to a request from a client device to store the file remotely from the client device, encrypt the first file chunk by a first encryption method; encrypt the second file chunk by a second encryption method different than the first encryption method; transmit the first file chunk to a first storage system of a first cloud storage service; transmit the second file chunk to a second storage system of a second cloud storage service; and generate a map that (A) identifies a first storage location of the first file chunk and a second storage location of the second file chunk, (B) first encryption information corresponding to the first encryption method and second encryption information corresponding to the second encryption method, and (C) includes first login information to access the first cloud storage service and second login information to access the second cloud storage service; and transmit the map to a remote device different from the first device and the client device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
a processor; a network interface communicatively coupled to the processor; hardware circuitry communicatively coupled to the processor; and a storage device communicatively coupled to the processor, the hardware circuitry, and the network interface, the storage device including instructions which, when executed, cause the processor to; in response to a request from a client device to store a file remotely from the client device, cause the hardware circuitry to generate a first file chunk and a second file chunk from the file; encrypt the first file chunk by a first encryption method; encrypt the second file chunk by a second encryption method different than the first encryption method; transmit, via the network interface, the first file chunk to a first storage system of a first cloud storage service; transmit, via the network interface, the second file chunk to a second storage system of a second cloud storage service; generate a map that (A) identifies a first storage location of the first file chunk and a second storage location of the second file chunk, (B) includes first encryption information corresponding to the first encryption method and second encryption information corresponding to the second encryption method, and (C) includes first login information to access the first cloud storage service and second login information to access the second cloud storage service; and transmit, via the network interface, the map to a remote device different from the client device. - View Dependent Claims (7, 8, 9, 10)
-
11. A method comprising:
-
generating, with hardware circuitry on a local device, a first file chunk and a second file chunk from a file in response to a request from a client device to store the file remotely from the client device; encrypting, via the hardware circuitry, the first file chunk using a first encryption method; encrypting via the hardware circuitry, the second file chunk using a second encryption method different than the first encryption method; transmitting, from the local device, the first file chunk to a first storage system of a first cloud storage service; transmitting, from the local device, the second file chunk to a second storage system of a second cloud storage service; and generating, at the local device, a map that (A) identifies a first storage location of the first file chunk and a second storage location of the second file chunk, (B) includes first encryption information corresponding to the first encryption method and second encryption information corresponding to the second encryption method, and (C) includes first login information to access the first cloud storage service and second login information to access the second cloud storage service; and transmitting the map to a remote device different from the local device and the client device. - View Dependent Claims (12, 13, 14, 15)
-
Specification