Encryption-based data access management
First Claim
1. A method comprising:
- receiving, by a data storage server storing encrypted data, a user authentication request for decrypting the encrypted data from a client device;
transmitting, by the data storage server, a validation token associated with the user authentication request to the client device, wherein the validation token indicates that the client device successfully authenticated;
receiving, by the data storage server, a confirmation request associated with the validation token from a second device that is different from the client device; and
transmitting, by the data storage server, a confirmation to the second device indicating that the client device is authenticated to the data storage server.
7 Assignments
0 Petitions
Accused Products
Abstract
Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage server storing the encrypted data. The computing device may then receive a validation token associated with the user'"'"'s authentication request, the validation token indicating that the user is authenticated to a domain. Subsequently, the computing device may transmit the validation token to a first key server different from the data storage server. Then, in response to transmitting the validation token the computing device may receive, from the first key server, a key required for decrypting the encrypted data. The device may then decrypt at least a portion of the encrypted data using the key.
22 Citations
24 Claims
-
1. A method comprising:
-
receiving, by a data storage server storing encrypted data, a user authentication request for decrypting the encrypted data from a client device; transmitting, by the data storage server, a validation token associated with the user authentication request to the client device, wherein the validation token indicates that the client device successfully authenticated; receiving, by the data storage server, a confirmation request associated with the validation token from a second device that is different from the client device; and transmitting, by the data storage server, a confirmation to the second device indicating that the client device is authenticated to the data storage server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data storage server comprising:
-
at least one processor; and non-transitory memory storing executable instructions configured to, when executed by the at least one processor, cause the data storage server to; receive, from a client device, a user authentication request for decrypting encrypted data; transmit, to the client device, a validation token associated with the user authentication request, the validation token indicating that the client device successfully authenticated; receive, from a second device that is different than the client device, a confirmation request associated with the validation token; and transmit, to the second device, a confirmation indicating that the client device is authenticated. - View Dependent Claims (10, 11, 12, 13, 14, 23, 24)
-
-
15. One or more non-transitory computer-readable media storing computer-readable instructions that, when executed by at least one processor, cause one or more data storage servers to:
-
receive, from a client device, a user authentication request for decrypting encrypted data; transmit, to the client device, a validation token associated with the user authentication request, the validation token indicating that the client device successfully authenticated; receive, from a second device that is different than the client device, a confirmation request associated with the validation token; and transmit, to the second device, a confirmation indicating that the client device is authenticated. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification