Data encryption in a network memory architecture for providing data based on local accessibility
CAFCFirst Claim
1. A network memory system for ensuring compliance, comprising:
- a source-site appliance comprising a first processor and a first memory device, and configured to be coupled to a source-site computer via a source-site local area network;
a destination-site appliance comprising a second processor and a second memory device, and configured to be coupled to a destination-site computer via a destination-site local area network, the source-site computer in communication with the destination-site computer via a wide area network;
the source-site appliance configured to intercept data sent from the source-site computer to the destination-site computer, encrypt the data, store the data in the first memory device, determine whether the data exists in the second memory device, and transmit a store instruction comprising the data if the data does not exist in the second memory device; and
the destination-site appliance configured to receive the store instruction from the source-site appliance, store the data in the second memory device, subsequently receive a retrieve instruction comprising an index at which the data is stored in the second memory device, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.
5 Assignments
1 Petition
Accused Products
Abstract
A network memory system for ensuring compliance is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance. The second appliance is further configured to receive a retrieve instruction comprising an index at which the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.
234 Citations
24 Claims
-
1. A network memory system for ensuring compliance, comprising:
-
a source-site appliance comprising a first processor and a first memory device, and configured to be coupled to a source-site computer via a source-site local area network; a destination-site appliance comprising a second processor and a second memory device, and configured to be coupled to a destination-site computer via a destination-site local area network, the source-site computer in communication with the destination-site computer via a wide area network; the source-site appliance configured to intercept data sent from the source-site computer to the destination-site computer, encrypt the data, store the data in the first memory device, determine whether the data exists in the second memory device, and transmit a store instruction comprising the data if the data does not exist in the second memory device; and the destination-site appliance configured to receive the store instruction from the source-site appliance, store the data in the second memory device, subsequently receive a retrieve instruction comprising an index at which the data is stored in the second memory device, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 22)
-
-
8. A method for ensuring compliance in network memory, the method comprising:
-
in a source-site appliance, intercepting data sent from a source-site computer to a destination-site computer, the source-site appliance coupled to the source-site computer via a source-site local area network and the source-site computer in communication with the destination-site computer via a wide area network; encrypting the data; storing the data in a first memory device within the source-site appliance; determining whether the data exists in a destination-site appliance appliance, the destination-site appliance coupled to the destination-site computer via a destination-site local area network; transmitting a store instruction comprising the data from the source-site appliance based on the determination that the data does not exist in the destination-site appliance; receiving the store instruction into the destination-site appliance; storing the data in a second memory device within the destination-site appliance; subsequently receiving a retrieve instruction into the destination-site appliance, the retrieve instruction comprising an index at which the data is stored; in the destination-site appliance, processing the retrieve instruction to obtain encrypted response data; and in the destination-site appliance, decrypting the encrypted response data. - View Dependent Claims (9, 10, 11, 12, 13, 14, 23)
-
-
15. A software product for ensuring compliance in network memory comprising:
-
software operational when executed by a processor to direct the processor to intercept data sent from a source-site computer to a destination-site computer, encrypt the data in a source-site appliance, store the data in a first memory device within the source-site appliance, determine whether the data exists in a destination-site appliance, transmit a store instruction comprising the data from the source-site appliance based on the determination that the data does not exist in the destination-site appliance, receive the store instruction into the destination-site appliance, store the data in a second memory device within the destination-site appliance, subsequently receive a retrieve instruction into the destination-site appliance, the retrieve instruction comprising an index at which the data is stored, process the retrieve instruction to obtain encrypted response data in the destination-site appliance, and decrypt the encrypted response data in the destination-site appliance; and a storage medium that stores the software. - View Dependent Claims (16, 17, 18, 19, 20, 21, 24)
-
Specification