Systems and methods for securing data in motion
First Claim
1. A method for retrieving data shares corresponding to a secured file stored on a storage network, the method comprising:
- processing, by a programmed hardware processor communicatively coupled to a storage network, a filename of a file using an authentication algorithm to obtain an authentication value associated with the file, wherein the authentication value obscures the filename and the file corresponds to data shares stored at one or more share locations of the storage network, each data share corresponding to a portion of the file, each data share having a share name that is based on the authentication value associated with the file;
searching the share locations on the storage network for the data shares by comparing share names of the data shares with the authentication value associated with the file; and
retrieving the data shares corresponding to the file based on the comparing.
4 Assignments
0 Petitions
Accused Products
Abstract
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
337 Citations
20 Claims
-
1. A method for retrieving data shares corresponding to a secured file stored on a storage network, the method comprising:
-
processing, by a programmed hardware processor communicatively coupled to a storage network, a filename of a file using an authentication algorithm to obtain an authentication value associated with the file, wherein the authentication value obscures the filename and the file corresponds to data shares stored at one or more share locations of the storage network, each data share corresponding to a portion of the file, each data share having a share name that is based on the authentication value associated with the file; searching the share locations on the storage network for the data shares by comparing share names of the data shares with the authentication value associated with the file; and retrieving the data shares corresponding to the file based on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for retrieving data shares corresponding to a secured file stored on a storage network, the system comprising:
-
at least one non-transitory computer readable medium storing computer executable instructions; and processing circuitry communicatively coupled to the at least one non-transitory computer readable medium and operable to execute the computer-readable instructions stored thereon, the processing circuitry configured to; process a filename of a file using an authentication algorithm to obtain an authentication value associated with the file, wherein the authentication value obscures the filename and the file corresponds to data shares stored at one or more share locations of the storage network, each data share corresponding to a portion of the file, each data share having a share name that is based on the authentication value associated with the file; search the share locations on the storage network for the data shares by comparing share names of the data shares with the authentication value associated with the file; and retrieve the data shares corresponding to the file based on the comparing. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification