Compliance in a network memory architecture
First Claim
1. A network memory system for ensuring compliance, the network memory system comprising:
- a first appliance configured to encrypt first data, store the encrypted first data in a first memory device, determine whether the encrypted first data exists in a second appliance, and transmit a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance; and
the second appliance configured to receive the store instruction from the first appliance, store the encrypted first data in a second memory device, receive a retrieve instruction comprising an index at which encrypted response data is stored, process the retrieve instruction to obtain the encrypted response data, and decrypt the encrypted response data.
5 Assignments
0 Petitions
Accused Products
Abstract
A network memory system for ensuring compliance is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance is configured to receive the store instruction from the first appliance and store the encrypted first data in a second memory device. The second appliance is further configured to receive a retrieve instruction comprising an index at which the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.
171 Citations
24 Claims
-
1. A network memory system for ensuring compliance, the network memory system comprising:
-
a first appliance configured to encrypt first data, store the encrypted first data in a first memory device, determine whether the encrypted first data exists in a second appliance, and transmit a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance; and
the second appliance configured to receive the store instruction from the first appliance, store the encrypted first data in a second memory device, receive a retrieve instruction comprising an index at which encrypted response data is stored, process the retrieve instruction to obtain the encrypted response data, and decrypt the encrypted response data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for ensuring compliance in network memory, the method comprising:
-
in a first appliance, encrypting first data;
storing the encrypted first data in a first memory device;
determining whether the encrypted first data exists in a second appliance;
transmitting a store instruction comprising the encrypted first data from the first appliance based on the determination that the encrypted first data does not exist in the second appliance;
receiving the store instruction into the second appliance;
storing the encrypted first data in a second memory device;
receiving a retrieve instruction into the second appliance, the retrieve instruction comprising an index at which the encrypted first data is stored;
in the second appliance, processing the retrieve instruction to obtain encrypted response data; and
in the second appliance, decrypting the encrypted response data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A software product for ensuring compliance in network memory comprising:
-
software operational when executed by a processor to direct the processor to encrypt first data in a first appliance, store the encrypted first data in a first memory device, determine whether the encrypted first data exists in a second appliance, transmit a store instruction comprising the encrypted first data from the first appliance based on the determination that the encrypted first data does not exist in the second appliance, receive the store instruction into the second appliance, store the encrypted first data in a second memory device, receive a retrieve instruction into the second appliance, the retrieve instruction comprising an index at which the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data in the second appliance, and decrypt the encrypted response data in the second appliance; and
a storage medium configured to store the software. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification