COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITY
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices are pod computing devices physically hosted by an operator. The pod computing devices include a central processing unit and a computer readable storage media in data communication with the central processing unit. Data is encrypted in the computer readable storage media so that the owner can access the data but the operator cannot access the data.
-
Citations
24 Claims
-
1-21. -21. (canceled)
-
22. A computer-implemented method for registering a pod computing device to a user device using a cloud encryption system, the method comprising:
-
using a central server to communicate with the user device, comprising; receiving a request to register the user device; providing a pod computing device from a plurality of pod computing devices to the user device; and providing a unique identification associated with the provided pod computing device to the user device; and using the pod computing device to communicate with the user device, comprising; receiving, from the user device, a password and a key; and storing the key in a volatile memory component of the pod computing device. - View Dependent Claims (23)
-
-
24-28. -28. (canceled)
Specification