×

Method and system for protecting information on a computer system

  • US 8,166,562 B2
  • Filed: 03/28/2008
  • Issued: 04/24/2012
  • Est. Priority Date: 05/31/2002
  • Status: Active Grant
First Claim
Patent Images

1. A communications method, comprising:

  • storing data for a user on a first storage device accessible from a first computing device using a first communication path in an internal network between the first computing device and the first storage device;

    authenticating the user for scheduling a data transfer, wherein authentication is performed using a second communication path through a public network;

    scheduling a data transfer for a user-specified period of time on the first computing device using a second computing device through a third communication path in the internal network, wherein scheduling of data transfers can only be performed via first computing devices in the internal network;

    authenticating the user for access to the data, wherein the authentication is performed using a fourth communication path through the public network between a third computing device and a fourth computing device;

    moving, for the purpose of being available for the user-specified period of time only, at least a subset of the data through a fifth communication path from the first storage device to a second storage device in response to the authentication of the user of the data and the scheduling of the data transfer on the first computer; and

    permitting, on the fourth computing device, access to the user through the third computing device through via the fourth communication path in the public network to the at least a subset of the data on the second storage device for only the user-specified period of time in response to a request from the user and removing the subset of the data from the second storage device thereafter, wherein the fourth computing device is not allowed to schedule data transfers for data stored on the first storage device through the fourth communication path between the third computing device and the fourth computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×