Method And Apparatus For Applying A Customer Owned Encryption
First Claim
1. A method for applying a customer owned encryption method at a centralized storage server, the method comprising:
- receiving, PA at a processor associated with the centralized storage server, a data file and first instructions for executing the customer owned encryption method from a first customer;
applying, by executing at least some of the first instructions with the processor, the customer owned encryption method to the data file at the centralized storage server to create a customer encrypted data file;
deleting, by executing an instruction with the processor, the customer owned encryption method from the centralized storage server; and
after the applying of the customer owned encryption method to create the customer encrypted data file, applying, by executing an instruction with the processor, a general encryption method, different from the customer owned encryption method, to the customer encrypted data file, the general encryption method applied to a plurality of data files stored in the centralized storage server, the plurality of data files associated with a plurality of different customers including the first customer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer-readable storage device and apparatus for customer owned encryption at a centralized storage server are disclosed. For example, the method receives a data file for storage and a customer owned encryption method from the customer, applies the customer owned encryption method to the data file at the centralized storage server to create a customer encrypted data file, deletes the customer owned encryption method from the centralized storage server and applies a general encryption method to the customer encrypted data file, wherein the general encryption method is applied to all data files stored in the centralized storage server.
-
Citations
20 Claims
-
1. A method for applying a customer owned encryption method at a centralized storage server, the method comprising:
-
receiving, PA at a processor associated with the centralized storage server, a data file and first instructions for executing the customer owned encryption method from a first customer; applying, by executing at least some of the first instructions with the processor, the customer owned encryption method to the data file at the centralized storage server to create a customer encrypted data file; deleting, by executing an instruction with the processor, the customer owned encryption method from the centralized storage server; and after the applying of the customer owned encryption method to create the customer encrypted data file, applying, by executing an instruction with the processor, a general encryption method, different from the customer owned encryption method, to the customer encrypted data file, the general encryption method applied to a plurality of data files stored in the centralized storage server, the plurality of data files associated with a plurality of different customers including the first customer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A tangible computer-readable storage device including a first plurality of computer executable instructions, which when executed by a processor associated with a centralized storage server, causes the processor to perform operations for applying a customer owned encryption method at the centralized storage server, the operations comprising:
-
receiving a data file and second computer executable instructions for executing the customer owned encryption method from a first customer; executing at least some of the second instructions to apply the customer owned encryption method to the data file at the centralized storage server to create a customer encrypted data file; deleting the customer owned encryption method from the centralized storage server; and after the executing of the at least some of the second instructions to apply the customer owned encryption method to create the customer encrypted data file, applying a general encryption method, different from the customer owned encryption method, to the customer encrypted data file, the general encryption method applied to a plurality of data files stored in the centralized storage server, the plurality of data files associated with a plurality of different customers including the first customer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for applying customer owned encryption at a centralized storage server, comprising:
-
a processor associated with the centralized storage server; and a computer-readable storage device including a first plurality of computer executable instructions which, when executed by the processor, causes the processor to perform operations, the operations including; receiving a data file and second computer executable instructions for executing a customer owned encryption method from a first customer; executing at least some of the second instructions to apply the customer owned encryption method to the data file at the centralized storage server to create a customer encrypted data file; deleting the customer owned encryption method from the centralized storage server; and after the executing of the at least some of the second instructions to apply the customer owned encryption method to create the customer encrypted data file, applying a general encryption method, different from the customer owned encryption method, to the customer encrypted data file, the general encryption method applied to a plurality of data files stored in the centralized storage server, the plurality of data files associated with a plurality of different customers including the first customer. - View Dependent Claims (18, 19, 20)
-
Specification