Secure Data Storage System And Method
First Claim
1. A method for the secure storage of data in a network comprising:
- encrypting the data stored on a primary server connected to the network;
sending the IP address of the primary server to a second server, via the network; and
receiving a communication from the second server indicating pending instructions;
if the instructions indicate that theft of the primary server has occurred, then re-encrypting the data stored on the primary server and sending the IP address of the primary server to the second server; and
if attempted unauthorized access of the primary server is determined, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, then erasing the data stored on the primary server.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address of the primary server is sent to a second server, via the network, and a communication is received from the second server indicating pending instructions. If the instructions indicate that theft of the primary server has occurred, then the data stored on the primary server is re-encrypted and the IP address of the primary server is sent to the second server. if attempted unauthorized access of the primary server is determined, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, then the data stored on the primary server is erased.
14 Citations
25 Claims
-
1. A method for the secure storage of data in a network comprising:
-
encrypting the data stored on a primary server connected to the network; sending the IP address of the primary server to a second server, via the network; and receiving a communication from the second server indicating pending instructions; if the instructions indicate that theft of the primary server has occurred, then re-encrypting the data stored on the primary server and sending the IP address of the primary server to the second server; and if attempted unauthorized access of the primary server is determined, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, then erasing the data stored on the primary server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for the secure storage of data in a network including a server coupled to at least one data storage device, the method comprising:
-
encrypting the data stored on each said data storage device; determining if connectivity is established between the server and a security key device; if no said connectivity is established, then disabling access to each said data storage device; if connectivity is established, then enabling each said data storage device; receiving a password entered into the server; and repeating the receiving step if the password is not accepted; if a predetermined number of passwords are received but not accepted, then disabling each said data storage device and re-encrypting the data stored thereon; and if a predetermined number of additional passwords are received but not accepted, then erasing the data stored on each said data storage device. - View Dependent Claims (7, 8, 9)
-
-
10. A method for the secure storage of data in a network, the method comprising:
-
storing data on a data storage device connected to a computer coupled to the network; encrypting the data stored on the storage device; and determining if connectivity is established between the computer and a security key device coupled to the network; if no connectivity is established, then disabling access to the storage device via the computer; if connectivity is established, then enabling access to the storage device via the computer; and if a predetermined number of consecutive unauthorized attempts to access the computer are made, then re-encrypting the data stored on the storage device, and if a predetermined additional number of consecutive unauthorized attempts to access the computer are made, then erasing the data stored on the storage device. - View Dependent Claims (11)
-
-
12. A system for secure storage of data in a network comprising:
-
a computer coupled to the network and to at least one data storage device; a security key device coupled to the network; wherein; data stored on the storage device is encrypted; if no connectivity is established between the computer and the security key device, then the storage device is disabled; and if a predetermined number of consecutive unauthorized attempts to access the computer are made, then re-encrypting the data stored on the storage device, and if a predetermined additional number of consecutive unauthorized attempts to access the computer are made, then erasing the data stored on the storage device. - View Dependent Claims (13)
-
-
14. A system for secure storage of data in a network comprising:
-
a first computer coupled to the network and to at least one data storage device; a second computer coupled to the network; and a security key device coupled to the network; wherein; data stored on the storage device is encrypted; and if no connectivity is established between the computer and the security key device, then access to the storage device via the first computer is disabled; if connectivity is established, then access to the storage device via the first computer is enabled; and the first computer checks for a communication from the second computer indicating pending special instructions;
whereinif special instructions received in the communication indicate that theft of the first computer has occurred, then the data stored on the storage device is re-encrypted; if no special instructions are received in the communication, then if a predetermined number of consecutive unauthorized attempts to access the first computer are made, then the data stored on the storage device is erased. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A system for secure storage of data in a network comprising:
-
a computer coupled to the network and to at least one data storage device; a server, located off of the premises on which the computer is situated, and coupled to the network; a security key device coupled to the network; and at least one PC coupled to the computer via the network; wherein; data stored on the storage device is encrypted; and if no connectivity is established between the computer and the security key device, then the storage device is disabled; if connectivity is established, then access to the storage device is enabled; and the computer checks for a communication from the second computer indicating pending special instructions;
whereinif special instructions received in the communication indicate that theft of the computer has occurred, then the data stored on the storage device is re-encrypted; if no special instructions are received in the communication, then if a predetermined number of consecutive unauthorized attempts to access the computer are made, then the data stored on the storage device is erased. - View Dependent Claims (22, 23, 24, 25)
-
Specification