Method and systems for virtual file storage and encryption
First Claim
1. A method for managing a non-transitory computer readable document file, the method comprising:
- storing and accessing information relating to a business enterprise'"'"'s operations and structure for an access authorization to the computer readable document file;
saving the computer readable document file on a digital media storage database forming part of a host'"'"'s cloud storage system;
determining at least a first access permission level and a second access permission level for the computer readable document file;
identifying a first type of sensitive information and identifying a second type of sensitive information in the computer readable document file;
matching the first type of sensitive information in the computer readable document file with the first access permission level, and matching the second type of sensitive information in the computer readable document file with the second access permission level;
encrypting the identified first type of sensitive information, and encrypting the identified second type of sensitive information;
determining whether individuals meet a first plurality of threshold requirements for access to the computer readable document file at the first access permission level, and determining whether the individuals meet a second plurality of threshold requirements for access to the computer readable document file at the second access permission level;
if the individuals meet each of the first plurality of threshold requirements, then assigning the individuals the first access permission level to access the computer readable document file, and if the individuals meet each of the second plurality of threshold requirements, then assigning the individuals the second access permission level to access the computer readable document file; and
providing a first access key that is configured to provide the individuals that are assigned the first access permission level access to the first type of sensitive information in the computer readable document file, and providing a second access key that is configured to provide the individuals that are assigned the second access permission level access to the second type of sensitive information in the computer readable document file;
wherein the identifying of the first type of sensitive information or the second type of sensitive information in the computer readable document file is done via pre-programmed key-term identification.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses an intelligent cloud server for cloud storage information management and encryption. In some embodiments, the intelligent cloud server can save and store documents without the need of first saving them in a local drive for upload. Upon storage, the document can be scanned and classified in a security level according to pre-determined settings and parameters. In some embodiments, depending on the classification, the system can encrypt portions of the document in order to facilitate the sharing and access of information in a secure way. Encryption keys and access to the encrypted portions are only provided upon authentication of the user, network, and/or need, according to corresponding protocols for the information.
-
Citations
17 Claims
-
1. A method for managing a non-transitory computer readable document file, the method comprising:
-
storing and accessing information relating to a business enterprise'"'"'s operations and structure for an access authorization to the computer readable document file; saving the computer readable document file on a digital media storage database forming part of a host'"'"'s cloud storage system; determining at least a first access permission level and a second access permission level for the computer readable document file; identifying a first type of sensitive information and identifying a second type of sensitive information in the computer readable document file; matching the first type of sensitive information in the computer readable document file with the first access permission level, and matching the second type of sensitive information in the computer readable document file with the second access permission level; encrypting the identified first type of sensitive information, and encrypting the identified second type of sensitive information; determining whether individuals meet a first plurality of threshold requirements for access to the computer readable document file at the first access permission level, and determining whether the individuals meet a second plurality of threshold requirements for access to the computer readable document file at the second access permission level; if the individuals meet each of the first plurality of threshold requirements, then assigning the individuals the first access permission level to access the computer readable document file, and if the individuals meet each of the second plurality of threshold requirements, then assigning the individuals the second access permission level to access the computer readable document file; and providing a first access key that is configured to provide the individuals that are assigned the first access permission level access to the first type of sensitive information in the computer readable document file, and providing a second access key that is configured to provide the individuals that are assigned the second access permission level access to the second type of sensitive information in the computer readable document file; wherein the identifying of the first type of sensitive information or the second type of sensitive information in the computer readable document file is done via pre-programmed key-term identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A cloud based file management system comprising:
-
an intelligent cloud server including a controller, the controller comprising a computer processor in digital communication with a digital media storage device and wherein the digital media storage device stores software code; a transmitter in logical communication with the intelligent cloud server and also in logical communication with a communication network, wherein the software is executable upon demand and operative with the processor to; store and access information relating to a business enterprise'"'"'s operations and structure for an access authorization to a computer readable document file; determine at least a first access permission level and a second access permission level; identify a first type of sensitive information and a second type of sensitive information in the computer readable document file; match the first type of sensitive information in the computer readable document file with the first access permission level, and match the second type of sensitive information in the computer readable document file with the second access permission level; encrypt the identified first type of sensitive information, and encrypt the identified second type of sensitive information; determine whether individuals meet a first plurality of threshold requirements for access to the computer readable document file at the first access permission level, and determine whether the individuals meet a second plurality of threshold requirements for the computer readable document file at the second access permission level; if the individuals meet each of the first plurality of threshold requirements, then assign the individuals the first access permission level to access the computer readable document file, and if the individuals meet each of the second plurality of threshold requirements, then assign the individuals the second access permission level to access the computer readable document file; and provide a first access key configured to provide the individuals that are assigned the first access permission level access to the first type of sensitive information in the computer readable document file, and provide a second access key that is configured to provide the individuals that are assigned the second access permission level access to the second type of sensitive information in the computer readable document file; wherein the identifying of the first type of sensitive information or the second type of sensitive information in the computer readable document file is done via pre-programmed key-term identification. - View Dependent Claims (14, 15, 16)
-
-
17. A method for managing a non-transitory computer readable document file, the method comprising:
-
storing and accessing operational information relating to a operations and structure of an enterprise; saving the computer readable document file on a digital media storage database forming part of a host'"'"'s cloud storage system; determining, by the host'"'"'s cloud storage system, at least a first access permission level and a second access permission level for the computer readable document file; processing the operational information to assign individuals who have been granted access to the computer readable document file at least one of the first permission level and the second permission level; identifying a first type of sensitive information in the computer readable document file; matching the first type of sensitive information in the file with at least one of the at least first access permission level and the second access permission level; encrypting the identified first type of sensitive information; and transmitting an access key from the host'"'"'s cloud storage system to at least one of the individuals'"'"' computing devices, wherein the access key is configured to provide access to the individuals assigned with the one of the at least first access permission level and the second access permission level corresponding to the first type of sensitive information, wherein the identifying of the first type of sensitive information in the computer readable document file is done via pre-programmed key-term identification, wherein the assignment of the first access permission level or the second access permission level to a select individual is based on the select individual'"'"'s type and history of access to information in the computer readable document file by a group to which the select individual belongs, and wherein the transmission of the access occurs after the host'"'"'s clouds storage system verifies the select individual'"'"'s computing device communication network'"'"'s security upon receiving a request for access to the first type of sensitive information.
-
Specification