Compromise free cloud data encryption and security
First Claim
1. A computer-implemented method for registering a pod computing device to a user device using a cloud encryption system, wherein the pod computing device comprises computer-readable storage media comprising volatile memory and non-volatile memory, the method comprising:
- using a central server to communicate with the user device, comprising;
receiving a request to register the user device;
allocating the pod computing device from a plurality of pod computing devices to the user device, wherein the pod computing device comprises hardware that is separate from hardware of each other pod computing device from the plurality of pod computing devices, such that access to data stored on the pod computing device is limited to the user device to which the pod computing device is allocated; and
providing a unique identification associated with the pod computing device to the user device; and
using the pod computing device to communicate with the user device, comprising;
receiving, from the user device, a password and a private key;
storing the private key in the volatile memory of the pod computing device, such that the private key is erased from the computer-readable storage media when the volatile memory loses power;
storing encrypted data in the non-volatile memory such that data that is encrypted is not accessible to an operator hosting the pod computing device; and
decrypting the encrypted data using the private key and store decrypted data in the volatile memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices are pod computing devices physically hosted by an operator. The pod computing devices include a central processing unit and a computer readable storage media in data communication with the central processing unit. Data is encrypted in the computer readable storage media so that the owner can access the data but the operator cannot access the data.
5 Citations
5 Claims
-
1. A computer-implemented method for registering a pod computing device to a user device using a cloud encryption system, wherein the pod computing device comprises computer-readable storage media comprising volatile memory and non-volatile memory, the method comprising:
-
using a central server to communicate with the user device, comprising; receiving a request to register the user device; allocating the pod computing device from a plurality of pod computing devices to the user device, wherein the pod computing device comprises hardware that is separate from hardware of each other pod computing device from the plurality of pod computing devices, such that access to data stored on the pod computing device is limited to the user device to which the pod computing device is allocated; and providing a unique identification associated with the pod computing device to the user device; and using the pod computing device to communicate with the user device, comprising; receiving, from the user device, a password and a private key; storing the private key in the volatile memory of the pod computing device, such that the private key is erased from the computer-readable storage media when the volatile memory loses power; storing encrypted data in the non-volatile memory such that data that is encrypted is not accessible to an operator hosting the pod computing device; and decrypting the encrypted data using the private key and store decrypted data in the volatile memory. - View Dependent Claims (2, 3)
-
-
4. At least one computer-readable storage device storing one or more sets of data instructions which, when executed by at least one processing device, cause the at least one processing device to:
-
use a central server to communicate with a user device, including to; receive a request to register the user device; allocate a pod computing device from a plurality of pod computing devices to the user device, wherein the pod computing device comprises hardware that is separate from hardware of each other pod computing device from the plurality of pod computing devices, such that access to data stored on the pod computing device is limited to the user device to which the pod computing device is allocated; and provide a unique identification associated with the pod computing device to the user device; and use the pod computing device to communicate with the user device, the pod computing device including volatile memory and non-volatile memory, including to; receive, from the user device, a password and a private key; store the private key in the volatile memory of the pod computing device, such that the private key is erased from the pod computing device when the volatile memory loses power; store encrypted data in the non-volatile memory such that data that is encrypted is not accessible to an operator hosting the pod computing device; and decrypt the encrypted data using the private key and store decrypted data in the volatile memory.
-
-
5. A system comprising:
-
a central server device comprising at least one processing device and at least one data storage device storing data instructions that, when executed by at least one processing device of the central server device cause the central server device to; receive a request to register a user device; allocate a pod computing device from a plurality of pod computing devices to the user device, wherein the pod computing device comprises hardware that is separate from hardware of each other pod computing device from the plurality of pod computing devices, such that access to data stored on the pod computing device is limited to the user device to which the pod computing device is allocated; and provide a unique identification associated with the pod computing device to the user device; and the pod computing device comprising at least one processing device and at least one data storage device including volatile memory and non-volatile memory, the at least one data storage device storing data instructions that, when executed by the at least one processing device of the pod computing device cause the pod computing device to; receive, from the user device, a password and a private key; store the private key in the volatile memory of the pod computing device, such that the private key is erased from the at least one data storage device of the pod computing device when the volatile memory loses power; store encrypted data in the non-volatile memory such that data that is encrypted is not accessible to an operator hosting the pod computing device; and decrypt the encrypted data using the private key and store decrypted data in the volatile memory.
-
Specification