Data security for digital data storage
First Claim
Patent Images
1. A method of storing data over a computer network from a client computer system to a remote network server, comprising:
- encrypting data with an encryption key;
storing the encrypted data on a local data storage medium in a client computer system;
copying the encrypted data to a remote network server; and
storing the data on a data storage medium in the remote network server in association with a file attribute that designates the data as encrypted, wherein the file attribute indicates an owner of the encryption key;
wherein when a request for the data is received from a requestor, the owner of the encryption key is compared to the requestor to determine whether the data was encrypted with the requestor'"'"'s encryption key.
10 Assignments
0 Petitions
Accused Products
Abstract
A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data encryption may utilize a key which is derived at least in part from an identification code stored in a non-volatile memory. The key may also be derived at least in part from user input to the computer. In a LAN embodiment, public encryption keys may be automatically transferred to a network server for file encryption prior to file transfer to a client system.
86 Citations
20 Claims
-
1. A method of storing data over a computer network from a client computer system to a remote network server, comprising:
-
encrypting data with an encryption key;
storing the encrypted data on a local data storage medium in a client computer system;
copying the encrypted data to a remote network server; and
storing the data on a data storage medium in the remote network server in association with a file attribute that designates the data as encrypted, wherein the file attribute indicates an owner of the encryption key;
wherein when a request for the data is received from a requestor, the owner of the encryption key is compared to the requestor to determine whether the data was encrypted with the requestor'"'"'s encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer network having one or more servers storing data files created by one or more clients, said computer network comprising:
-
at least one data storage device located on a network server;
at least one data storage device located on a client computer system;
data files encrypted with a public key associated with the client computer system stored on the network server and the client computer system, the data files including a file attribute designating the data files as encrypted and indicating an owner of the public key;
wherein when a request for the data is received from a requestor, the owner of the public key is compared to the requestor to determine whether the data was encrypted with the requestor'"'"'s public key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer network having one or more servers storing data created by one or more clients, said computer network comprising:
-
means for encrypting data with an encryption key;
means for storing the encrypted data on a local data storage medium;
means for copying the encrypted data to a remote network server; and
means for storing the data on a data storage medium in the remote network server in association with a file attribute that designates the data as encrypted and indicates the owner of the encryption key;
wherein when a request for the data is received from a requestor, the owner of the encryption key is compared to the requestor to determine whether the data was encrypted with the requestor'"'"'s encryption key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification