×

Compromise free cloud data encryption and security

  • US 10,445,524 B2
  • Filed: 02/09/2017
  • Issued: 10/15/2019
  • Est. Priority Date: 05/02/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for registering a pod computing device to a user device using a cloud encryption system, wherein the pod computing device comprises computer-readable storage media comprising volatile memory and non-volatile memory, the method comprising:

  • using a central server to communicate with the user device, comprising;

    receiving a request to register the user device;

    allocating the pod computing device from a plurality of pod computing devices to the user device, wherein the pod computing device comprises hardware that is separate from hardware of each other pod computing device from the plurality of pod computing devices, such that access to data stored on the pod computing device is limited to the user device to which the pod computing device is allocated; and

    providing a unique identification associated with the pod computing device to the user device; and

    using the pod computing device to communicate with the user device, comprising;

    receiving, from the user device, a password and a private key;

    storing the private key in the volatile memory of the pod computing device, such that the private key is erased from the computer-readable storage media when the volatile memory loses power;

    storing encrypted data in the non-volatile memory such that data that is encrypted is not accessible to an operator hosting the pod computing device; and

    decrypting the encrypted data using the private key and store decrypted data in the volatile memory.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×