Secure and anonymous storage and accessibility for sensitive data
First Claim
1. A secure and anonymous data interaction system comprising the following computer executable components:
- a transmission component that provides an anonymous identity and a guard to a server; and
a receiver component that receives a data blob from the server, if the provided identity and guard match an identity and guard associated with the data blob, wherein the guard is based at least in part on a data key that is used to decrypt the data blob.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure pertains to secure and anonymous data storage and access. More particularly, encryption methods and mechanisms are provided in conjunction with one or more blobs, identities, and guards to implement one or more layers of indirect encryption. Generation of these components can be accomplished without including or pointing to any personally identifiable information about a user. Accordingly, a user can store sensitive data securely and anonymously on a server or like storage system. Such data can also be roamed, recovered, and synchronized securely from a plurality of computers at least because the data is centrally located.
-
Citations
20 Claims
-
1. A secure and anonymous data interaction system comprising the following computer executable components:
-
a transmission component that provides an anonymous identity and a guard to a server; and a receiver component that receives a data blob from the server, if the provided identity and guard match an identity and guard associated with the data blob, wherein the guard is based at least in part on a data key that is used to decrypt the data blob. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
configuring at least one processor of a server to perform the acts of; receiving a request for a blob including an identity and guard, wherein the guard is based at least in part on a key that is employed to decrypt the blob; locating the blob associated with the identity; and transmitting the blob to a requesting entity if the received guard matches the guard associated with the blob. - View Dependent Claims (11, 12, 13)
-
-
14. A method of interacting with data comprising:
-
configuring at least one processor of at least one client computer to perform the acts of; transmitting a first identity and guard to a server; and receiving a first blob if the provided identity and guard match an identity and guard associated with the first blob managed by the server, wherein the guard is based at least in part on a first key used to decrypt the first blob. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification