MSSAN
First Claim
1. A system with granular accessibility to data in distributed network or corporate network that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to access digital resources without involving third party access controls or dedicated servers, the system comprising the following steps:
- providing a perpetual data system to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy;
providing an anonymous authentication system to allow authentication access to a distributed system comprising the steps of;
receiving a user identifier;
retrieving an encrypted validation record identified by the user identifier;
decrypting the encrypted validation record so as to provide decrypted information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; and
providing a n+p key sharing system to allow users to log in with a created base ID, the ID is validated from a supervising node—
a manager, users are provided with a further key (Manager'"'"'s key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all users'"'"' data beneath or equivalent in some cases to the current user level;
wherein the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention allows users to maximise their use of existing storage, processing power and network bandwidth resources. This is achieved through providing an enhanced level of data backup and restore that employs the initial encryption of data and storing one user'"'"'s data on another user'"'"'s hard drives through an anonymsing process. The efficiency of this process is enhanced when this invention is used in conjunction with self authentication which then provides the ability to log into a network anonymously from potentially anywhere.
98 Citations
19 Claims
-
1. A system with granular accessibility to data in distributed network or corporate network that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to access digital resources without involving third party access controls or dedicated servers, the system comprising the following steps:
-
providing a perpetual data system to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy; providing an anonymous authentication system to allow authentication access to a distributed system comprising the steps of;
receiving a user identifier;
retrieving an encrypted validation record identified by the user identifier;
decrypting the encrypted validation record so as to provide decrypted information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; andproviding a n+p key sharing system to allow users to log in with a created base ID, the ID is validated from a supervising node—
a manager, users are provided with a further key (Manager'"'"'s key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all users'"'"' data beneath or equivalent in some cases to the current user level;wherein the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network. - View Dependent Claims (3, 5, 7, 9, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
2. A product with granular accessibility to data in distributed network or corporate network that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rd party access controls or dedicated servers, the product comprising the following steps:
-
providing a perpetual data product to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy, and comprises of synergistic steps of storage &
retrieval, self-healing, security availability and peer ranking;providing an anonymous authentication product to allow authentication access to a distributed system comprising of;
receiving a user identifier;retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; andproviding a n+p key sharing product to allow users to log in with a created base ID, the ID is validated from a supervising node—
a manager, users are provided with a further key (Manager'"'"'s key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all users'"'"' data beneath or equivalent in some cases to the current user level;wherein, the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network. - View Dependent Claims (4, 6, 8, 10)
-
-
19. A computer program product for granular accessibility to data in distributed network or corporate network that allows one to access any computer via the product and have their own data and desktop represented to them as well as the ability to access digital resources without involving a third party access controls or dedicated servers, the product comprising:
-
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit; a perpetual data system, wherein the perpetual data system ensures there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy; an anonymous authentication system, wherein the anonymous authentication system allows authentication access to a distributed system comprising the steps of;
receiving a user identifier, retrieving an encrypted validation record identified by the user identifier, decrypting the encrypted validation record so as to provide decrypted information, and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; andan n+p key sharing system, wherein the n+p sharing system allows users to log in with a created base ID, the ID is validated from a supervising node—
a manager, users are provided with a further key (Manager'"'"'s key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all user'"'"'s data beneath or equivalent in some cases to the current user level;wherein the computer program product provides cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network.
-
Specification