VIRTUAL STORAGE SYSTEM AND FILE ENCRYPTION METHODS
First Claim
1. A virtual storage system in data communication with a user computing device via a communication network, the virtual storage system comprising:
- at least one processor configured to;
capture a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, andcreate at least one encryption parameter and encrypt the data stream captured using the at least one encryption parameter created; and
a plurality of redundant physical storage devices in data communication with the at least one processor and each configured to store the encrypted data stream corresponding to the electronic document.
2 Assignments
0 Petitions
Accused Products
Abstract
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic documents to be uploaded into a virtual storage system where the virtual storage system includes at least one processor which captures a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, and creates at least one encryption parameter and encrypts the data stream captured using the at least one encryption parameter created. The virtual storage system further includes a plurality of redundant physical storage devices in data communication with the at least one processor and each configured to store the encrypted data stream corresponding to the electronic document.
7 Citations
20 Claims
-
1. A virtual storage system in data communication with a user computing device via a communication network, the virtual storage system comprising:
-
at least one processor configured to; capture a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, and create at least one encryption parameter and encrypt the data stream captured using the at least one encryption parameter created; and a plurality of redundant physical storage devices in data communication with the at least one processor and each configured to store the encrypted data stream corresponding to the electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method implemented by computer system to effect the encryption of electronic documents to be uploaded into a virtual storage system including a plurality of redundant physical storage devices and in data communication via a communication network, with an external system, the method comprising:
-
receiving input data for accessing the virtual storage system directly or indirectly via the external system; selecting an electronic folder of a plurality of folders within the virtual storage system to receive an electronic document to be uploaded from the external system, and selecting the electronic document to be uploaded; initiating an uploading process for uploading the electronic document; capturing a data stream corresponding to the electronic document to be uploaded, while performing the uploading process, and storing the data stream captured within the virtual storage system; determining whether the uploading process is complete; creating at least one encryption parameter, when it is determined that the uploading process is complete; and encrypting the data stream captured using the at least one encryption parameter created, and storing the encrypted data stream captured within the virtual storage system. - View Dependent Claims (12, 13)
-
-
14. A method implemented by computer system to effect the encryption of electronic documents to be uploaded into a virtual storage system including a plurality of redundant physical storage devices and in data communication via a communication network, with external system, the method comprising:
-
receiving input data for accessing the virtual storage system directly or indirectly via the external system; selecting an electronic folder of a plurality of folders within the virtual storage system to receive an electronic document to be uploaded from the external system, and selecting the electronic document to be uploaded; initiating an uploading process for uploading the electronic document; capturing a segment of a data stream corresponding to the electronic document to be uploaded, while performing the uploading process, and storing the segment of the data stream captured within the virtual storage system; creating at least one encryption parameter; and encrypting the segment of the data stream captured using the at least one encryption parameter created, and storing the encrypted segment of the data stream captured within the virtual storage system; determining whether the uploading process is complete; and capturing and encrypting another segment of the data stream when it is determined that the uploading process is not complete. - View Dependent Claims (15, 16, 17)
-
-
18. A computer readable medium storing computer executable instructions that, when executed, cause a computing device to perform a file encryption method for encrypting electronic documents to be uploaded into a virtual storage system including a plurality of redundant physical storage devices and in data communication via a communication network, with an external system, the method comprising:
-
receiving input data for accessing the virtual storage system directly or indirectly via the external system; selecting an electronic folder of a plurality of folders within the virtual storage system to receive an electronic document to be uploaded from the external system, and selecting the electronic document to be uploaded; initiating an uploading process for uploading the electronic document; capturing a data stream corresponding to the electronic document to be uploaded, while performing the uploading process, and storing the data stream captured within the virtual storage system; determining whether the uploading process is complete; creating at least one encryption parameter, when it is determined that the uploading process is complete; and encrypting the data stream captured using the at least one encryption parameter created, and storing the encrypted data stream captured within the virtual storage system. - View Dependent Claims (19, 20)
-
Specification