Virtual storage system and file encryption methods
First Claim
1. A virtual storage system in data communication with a user computing device via a communication network, the virtual storage system comprising:
- at least one processor configured to;
capture a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, andencrypt the captured data stream using an encryption parameter; and
a plurality of redundant physical storage devices in data communication with the at least one processor, comprising;
a first data location temporarily storing the captured data stream, anda second data location permanently storing the encrypted data stream.
1 Assignment
0 Petitions
Accused Products
Abstract
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic documents to be uploaded into a virtual storage system where the virtual storage system includes at least one processor which captures a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, and creates at least one encryption parameter and encrypts the data stream captured using the at least one encryption parameter created. The virtual storage system further includes a plurality of redundant physical storage devices in data communication with the at least one processor and each configured to store the encrypted data stream corresponding to the electronic document.
-
Citations
20 Claims
-
1. A virtual storage system in data communication with a user computing device via a communication network, the virtual storage system comprising:
-
at least one processor configured to; capture a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, and encrypt the captured data stream using an encryption parameter; and a plurality of redundant physical storage devices in data communication with the at least one processor, comprising; a first data location temporarily storing the captured data stream, and a second data location permanently storing the encrypted data stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method implemented by a computer system to effect the encryption of electronic documents uploaded into a virtual storage system including a plurality of redundant physical storage devices and in data communication via a communication network, with an external system, the method comprising:
-
capturing a data stream comprising at least one segment of an electronic document to be uploaded; temporarily storing the captured data stream in a first location in the plurality of redundant physical storage devices; encrypting the captured data stream captured using an encryption parameter; and permanently storing the encrypted data stream in a second location in the plurality of redundant physical storage devices. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium storing computer executable instructions that, when executed, cause a computing device to perform a file encryption method for encrypting electronic documents to be uploaded into a virtual storage system including a plurality of redundant physical storage devices and in data communication via a communication network, with an external system, the method comprising:
-
capturing a data stream comprising at least one segment of an electronic document to be uploaded; temporarily storing the captured data stream in a first location in the plurality of redundant physical storage devices; encrypting the captured data stream captured using an encryption parameter; and permanently storing the encrypted data stream in a second location in the plurality of redundant physical storage devices. - View Dependent Claims (19, 20)
-
Specification