Security Management In A Group Based Environment
First Claim
Patent Images
1. A method comprising:
- intercepting, with at least one network device, a data file transmitted to cloud storage from a client in an enterprise computing environment; and
converting, based on security information received from a management server, the data file into an encrypted object configured to remain encrypted while at rest in the cloud storage.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for securely storing data files in, or retrieving data files from, cloud storage. A data file transmitted to cloud storage from a client in an enterprise computing environment is intercepted by at least one network device. Using security information received from a management server, the data file is converted into an encrypted object configured to remain encrypted while at rest in the cloud storage.
-
Citations
29 Claims
-
1. A method comprising:
-
intercepting, with at least one network device, a data file transmitted to cloud storage from a client in an enterprise computing environment; and converting, based on security information received from a management server, the data file into an encrypted object configured to remain encrypted while at rest in the cloud storage. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving a registration request from at least one network device in an enterprise computing environment; authenticating the at least one network device; and providing the at least one network device with security information for use in converting a data file received from a client into an encrypted object configured to remain encrypted while at rest in cloud storage. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
-
at least one management server; and at least one network device configured to intercept a data file transmitted from a client in an enterprise computing environment to cloud storage external to the enterprise computing environment and, using security information received from the management server, convert the data file into an encrypted object configured to remain encrypted while at rest in the cloud storage. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus comprising:
-
a network interface unit configured to communications over a network; memory; a processor coupled to the network interface unit and memory, and configured to intercept, via the network interface unit, a data file transmitted to cloud storage from a client in an enterprise computing environment, and to use security information received from a management server to convert the data file into an encrypted object configured to remain encrypted while at rest in the cloud storage. - View Dependent Claims (22, 23, 24, 25)
-
-
26. One or more computer readable storage media encoded with software comprising computer executable instructions and when the software is executed operable to:
-
receive a registration request from at least one network device in an enterprise computing environment; authenticate the at least one network device; and provide the at least one network device with security information for use in converting a data file received from a client into an encrypted object configured to remain encrypted while at rest in cloud storage. - View Dependent Claims (27, 28, 29)
-
Specification