×

Techniques for securing and controlling access to data

  • US 10,348,499 B2
  • Filed: 05/07/2018
  • Issued: 07/09/2019
  • Est. Priority Date: 03/25/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • determining, at a server, whether a request received from a computing device for access to a portion of data stored by the server identifies the portion with an address at which the portion is stored or with a combination of a first pseudo-random number (PRN) of a first leaf node of a first PRN tree and an indication of a location of a second leaf node within a branching structure of a second PRN tree, the request received via a network coupled to the server, and the first and second leaf nodes corresponding to the portion;

    based on the determination, pseudo-randomly generating a second PRN of the second leaf node from a PRN of a top branching node of the second PRN tree and taking a hash of a combination of the first PRN and the second PRN to derive the address; and

    accessing the portion at the address to satisfy the request for access.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×