Systems and methods for secure data sharing
First Claim
1. A method for securely sharing a data set, comprising:
- distributing, using a hardware processor, the data set into two or more shares;
distributing the two or more shares across at least one consumer storage location and at least one enterprise storage location;
generating permissions associated with the data set;
in response to receiving a request for the data set, generating a computing image that provides one or more pointers to the two or more shares, wherein generating the computing image comprises;
generating a virtual machine that includes a pointer to a storage location of the two or more shares;
retrieving updated stub file information; and
recreating, using the retrieved stub file information, a stub file associated with the computing image;
distributing the computing image to a user associated with the at least one consumer storage location;
executing the virtual machine on the at least one consumer storage location;
using the virtual machine, providing access to the one or more pointers to the two or more shares based on the permissions without replicating the data set at the at least one consumer storage location.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key associated with the data file and unique information associated with the data file. The file-level key may be used to encrypt and split data. Systems and methods are also provided for sharing data without replicating the data on an end user machine. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.
-
Citations
18 Claims
-
1. A method for securely sharing a data set, comprising:
-
distributing, using a hardware processor, the data set into two or more shares; distributing the two or more shares across at least one consumer storage location and at least one enterprise storage location; generating permissions associated with the data set; in response to receiving a request for the data set, generating a computing image that provides one or more pointers to the two or more shares, wherein generating the computing image comprises; generating a virtual machine that includes a pointer to a storage location of the two or more shares; retrieving updated stub file information; and recreating, using the retrieved stub file information, a stub file associated with the computing image; distributing the computing image to a user associated with the at least one consumer storage location; executing the virtual machine on the at least one consumer storage location; using the virtual machine, providing access to the one or more pointers to the two or more shares based on the permissions without replicating the data set at the at least one consumer storage location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for securely sharing a data set, comprising:
-
a hardware processor configured to; distribute, using a hardware processor, the data set into two or more shares; distribute the two or more shares across at least one consumer storage location and at least one enterprise storage location; generate permissions associated with the data set; in response to receiving a request for the data set, generate a computing image that provides one or more pointers to the two or more shares, wherein the generated computing image comprises; generating a virtual machine that includes a pointer to a storage location of the two or more shares; retrieving updated stub file information; and recreating, using the retrieved stub file information, a stub file associated with the computing image; distribute the computing image to a user associated with the at least one consumer storage location; execute the virtual machine on the at least one consumer storage location; use the virtual machine to provide access to the one or more pointers to the two or more shares based on the permissions without replicating the data set at the at least one consumer storage location. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification