Secure data storage system and method
First Claim
1. A method for the secure storage of information in a network comprising:
- encrypting data stored on a primary server connected to the network;
sending the IP address of the primary server to a second server, via the network; and
receiving a communication from the second server indicating pending instructions;
if the instructions indicate that theft of the primary server has occurred, thenre-encrypting the data stored on the primary server andsending the IP address of the primary server to the second server; and
if attempted unauthorized access of the primary server is determined by the primary server, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, theninitiating, by the primary server, erasing of the data stored on the primary server.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for the secure storage of data in a network. Data stored on a primary server connected to the network is initially encrypted. The IP address of the primary server is sent to a second server, via the network, and a communication is received from the second server indicating pending instructions. If the instructions indicate that theft of the primary server has occurred, then the data stored on the primary server is re-encrypted and the IP address of the primary server is sent to the second server. If attempted unauthorized access of the primary server is determined, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, then the data stored on the primary server is erased.
-
Citations
10 Claims
-
1. A method for the secure storage of information in a network comprising:
-
encrypting data stored on a primary server connected to the network; sending the IP address of the primary server to a second server, via the network; and receiving a communication from the second server indicating pending instructions; if the instructions indicate that theft of the primary server has occurred, then re-encrypting the data stored on the primary server and sending the IP address of the primary server to the second server; and if attempted unauthorized access of the primary server is determined by the primary server, and a predetermined number of consecutive unauthorized attempts to access the primary server are made, then initiating, by the primary server, erasing of the data stored on the primary server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for secure storage of data in a network comprising:
-
a computer coupled to the network and to at least one data storage device; a server, located off of the premises on which the computer is situated, and coupled to the network; a security key device coupled to the network; and a second computer coupled to the computer via the network; wherein; data stored on the storage device is encrypted; and if no connectivity is established between the computer and the security key device, then the storage device is disabled; if connectivity is established, then access to the storage device is enabled; and the computer checks for a communication from the second computer indicating pending special instructions;
whereinif special instructions received in the communication indicate that theft of the computer has occurred, then the data stored on the storage device is re-encrypted; if no special instructions are received in the communication, then if a predetermined number of consecutive unauthorized attempts to access the computer are made, then the data stored on the storage device is erased. - View Dependent Claims (7, 8, 9, 10)
-
Specification