MAIDSAFE.NET
First Claim
1. A distributed network system that allows one to access any computer via the system and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rd party access controls or dedicated servers, this system comprises of following steps:
- a. Perpetual data system;
to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,b. Anonymous authentication system;
which allows authentication access to a distributed system comprising of receiving a user identifier;
retrieving an encrypted validation record identified by the user identifier;
decrypting the encrypted validation record so as to provide decrypted information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Further, this invention comprises a system of self healing data, secure messaging and a voting system to allow users to dictate the direction of development of the network, whereby adoption or denial of proposed add-ons to the network will be decided. System incompatibilities and security breaches on networks and the Internet are addressed by this invention where disparity and tangents of development have had an undue influence. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue.
202 Citations
26 Claims
-
1. A distributed network system that allows one to access any computer via the system and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rd party access controls or dedicated servers, this system comprises of following steps:
-
a. Perpetual data system;
to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,b. Anonymous authentication system;
which allows authentication access to a distributed system comprising of receiving a user identifier;
retrieving an encrypted validation record identified by the user identifier;
decrypting the encrypted validation record so as to provide decrypted information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network. - View Dependent Claims (3, 5, 7, 9, 11, 13, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
2. A distributed network product of that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rd party access controls or dedicated servers, this system comprises of following steps:
-
a. Perpetual data product;
to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy, and comprises of synergistic steps of storage &
retrieval, self-healing, security availability and peer ranking,b. Anonymous authentication product;
which allows authentication access to a distributed system comprising of;
receiving a user identifier;
retrieving an encrypted validation record identified by the user identifier;
decrypting the encrypted validation record so as to provide decrypted Information; and
authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network. - View Dependent Claims (4, 6, 8, 10, 12, 14)
-
-
26. A distributed network computer program product for granular accessibility to data in distributed network or corporate network that allows one to access any computer via the product and have their own data and desktop represented to them as well as the ability to access digital resources without involving a third party access controls or dedicated servers, the product comprising:
-
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit; a perpetual data system, wherein the perpetual data system ensures there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy; an anonymous authentication system, wherein the anonymous authentication system allows authentication access to a distributed system comprising the steps of;
receiving a user identifier, retrieving an encrypted validation record identified by the user identifier, decrypting the encrypted validation record so as to provide decrypted information, and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; andan n+p key sharing system, wherein the n+p sharing system allows users to log in with a created base ID, the ID is validated from a supervising node a manager, users are provided with a further key (Manager'"'"'s key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all user'"'"'s data beneath or equivalent in some cases to the current user level; wherein the computer program product provides cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network.
-
Specification