SECURE DOCUMENT STORAGE SYSTEM
First Claim
1. A system for the storage of data, the system comprising:
- An encrypted host platform disposed in a specific territory and upon which export controlled data is stored;
A controller configured to allow a primary user to set permission settings and identify authorized end users and degrees of access granted to each said authorized end user, said authorized end user being pre-cleared for compliance with export controls pertaining to said export controlled data;
said controller configured to permit access to said encrypted host platform only if said host platform is located within a specific territory and if said hosting platform is in compliance with predefined data security protocols said controller configured to allow said authorized end user access to said export controlled data, and said controller configured to exclude access to both a provider of the system for storage and a system host platform provider;
At least one individual computing device accessible by at least one said authorized end user, disposed within an authorized territory, said individual computing device configured to provide authorized end user identification data to said controller and receive permissions from said controller for access to said host platform; and
said host platform only communicates with individual user devices if said devices have received permission from said controller.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for the storage of data, the system having: an encrypted host platform disposed in a specific territory and upon which export controlled data is stored; a controller configured to allow a primary user to set permission settings and identify authorized end users and degrees of access granted to each the authorized end user, the authorized end user being pre-cleared for compliance with export controls pertaining to the export controlled data; the controller configured to permit access to the encrypted host platform only if the host platform is located within a specific territory and if the hosting platform is in compliance with predefined data security protocols the controller configured to allow the authorized end user access to the export controlled data, and the controller configured to exclude access to both a provider of the system for storage and a system host platform provider; at least one individual computing device accessible by at least one the authorized end user, disposed within an authorized territory, the individual computing device configured to provide authorized end user identification data to the controller and receive permissions from the controller for access to the host platform; and the host platform only communicates with individual user devices if the devices have received permission from the controller.
-
Citations
20 Claims
-
1. A system for the storage of data, the system comprising:
-
An encrypted host platform disposed in a specific territory and upon which export controlled data is stored; A controller configured to allow a primary user to set permission settings and identify authorized end users and degrees of access granted to each said authorized end user, said authorized end user being pre-cleared for compliance with export controls pertaining to said export controlled data;
said controller configured to permit access to said encrypted host platform only if said host platform is located within a specific territory and if said hosting platform is in compliance with predefined data security protocols said controller configured to allow said authorized end user access to said export controlled data, and said controller configured to exclude access to both a provider of the system for storage and a system host platform provider;At least one individual computing device accessible by at least one said authorized end user, disposed within an authorized territory, said individual computing device configured to provide authorized end user identification data to said controller and receive permissions from said controller for access to said host platform; and said host platform only communicates with individual user devices if said devices have received permission from said controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification