Secure and anonymous storage and accessibility for sensitive data
First Claim
1. A secure and anonymous data interaction system comprising the following computer executable components:
- a transmission component that provides an anonymous identity and a guard to a server; and
a receiver component that receives a data blob from the server, if the provided identity and guard match an identity and guard associated with the blob.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure pertains to secure and anonymous data storage and access. More particularly, encryption methods and mechanisms are provided in conjunction with one or more blobs, identities, and guards to implement one or more layers of indirect encryption. Generation of these components can be accomplished without including or pointing to any personally identifiable information about a user. Accordingly, a user can store sensitive data securely and anonymously on a server or like storage system. Such data can also be roamed, recovered, and synchronized securely from a plurality of computers at least because the data is centrally located.
-
Citations
20 Claims
-
1. A secure and anonymous data interaction system comprising the following computer executable components:
-
a transmission component that provides an anonymous identity and a guard to a server; and
a receiver component that receives a data blob from the server, if the provided identity and guard match an identity and guard associated with the blob. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of data access control comprising the following computer implemented acts:
-
receiving a request for a blob including an identity and guard;
locating the blob associated with the identity; and
transmitting the blob to a requesting entity if the received guard matches the guard associated with the blob. - View Dependent Claims (11, 12, 13)
-
-
14. A secure and anonymous method of interacting with data comprising the following computer implemented acts:
-
transmitting a first identity and guard to a server; and
receiving a first blob if the provided identity and guard match an identity and guard associated with the first blob managed by the server. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification