Systems and methods for providing file level security
First Claim
1. A computer-implemented method of providing file level security, the method comprising:
- providing a network-based file storage and retrieval system comprising a server computer having at least one processor and memory storing instructions;
providing at said server computer access to a plurality of data storage locations in data communication with said server computer, said data storage locations comprising at least two of cloud data storage, local data storage, network data storage, and removable data storage;
receiving at said server computer as input a user instruction designating a number of file shreds into which a data file is to be shredded, wherein said number of file shreds is selected by said user;
receiving at said server computer as input a user instruction designating a plurality of said data storage locations to which said designated number of shreds are to be copied, wherein said data storage locations are selected by said user;
receiving at said server computer as input a user selection of a target upload file;
causing said processor to shred said target upload file into said user designated number of file shreds;
causing said processor to add non-operational bits of data to each said file shred;
causing said processor to encrypt each said file shred; and
causing said processor to copy said encrypted file shreds from said server computer to said user designated plurality of said data storage locations, and to maintain said encrypted file shreds in said user designated plurality of said data storage locations until receipt at said server computer as input a user instruction to download said encrypted file shreds to reform said data file.
0 Assignments
0 Petitions
Accused Products
Abstract
Storage end points, whether they are local, remote, network, or cloud, such as DROPBOX and APPLE, present security issues for the general public and corporate consumers. These storage end points are not always encrypted. Even when the end user does perform encryption, the drawback to normal implementations is that the entirety of the file, the file key, and the key store are encrypted and stored in a single location. Computers can be hacked and encryption can be broken when given access and time. Disclosed is a system and method that enhances file level security by shredding the file, file pointers, and key store into parts, allowing the parts to be stored in different storage end points specified by the user.
-
Citations
16 Claims
-
1. A computer-implemented method of providing file level security, the method comprising:
-
providing a network-based file storage and retrieval system comprising a server computer having at least one processor and memory storing instructions; providing at said server computer access to a plurality of data storage locations in data communication with said server computer, said data storage locations comprising at least two of cloud data storage, local data storage, network data storage, and removable data storage; receiving at said server computer as input a user instruction designating a number of file shreds into which a data file is to be shredded, wherein said number of file shreds is selected by said user; receiving at said server computer as input a user instruction designating a plurality of said data storage locations to which said designated number of shreds are to be copied, wherein said data storage locations are selected by said user; receiving at said server computer as input a user selection of a target upload file; causing said processor to shred said target upload file into said user designated number of file shreds; causing said processor to add non-operational bits of data to each said file shred; causing said processor to encrypt each said file shred; and causing said processor to copy said encrypted file shreds from said server computer to said user designated plurality of said data storage locations, and to maintain said encrypted file shreds in said user designated plurality of said data storage locations until receipt at said server computer as input a user instruction to download said encrypted file shreds to reform said data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification