CA3046698A1 - Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) - Google Patents
Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) Download PDFInfo
- Publication number
- CA3046698A1 CA3046698A1 CA3046698A CA3046698A CA3046698A1 CA 3046698 A1 CA3046698 A1 CA 3046698A1 CA 3046698 A CA3046698 A CA 3046698A CA 3046698 A CA3046698 A CA 3046698A CA 3046698 A1 CA3046698 A1 CA 3046698A1
- Authority
- CA
- Canada
- Prior art keywords
- encrypted
- shards
- files
- storing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The main purpose of the present patent is to store files via an encrypted (SHA
256 compliant) process in email servers and the retrieval and reconstruction of those files in their initial state. The files are split in encrypted shards, are then sent via standard emailing protocols in email inboxes, and then reassembled in the initial state. The index of the shards is stored in the blockchain or databases (DB).
256 compliant) process in email servers and the retrieval and reconstruction of those files in their initial state. The files are split in encrypted shards, are then sent via standard emailing protocols in email inboxes, and then reassembled in the initial state. The index of the shards is stored in the blockchain or databases (DB).
Description
Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (SMTP/IMAP/POP) with blockchain or database indexing.
Author: Dr.Radu Vestemean Abstract The main purpose of the present patent is to store files via an encrypted (SHA
256 compliant) process in email servers and the retrieval and reconstruction of those files in their initial state. The files are split in encrypted shards, are then sent via standard emailing protocols in email inboxes, and then reassembled in the initial state. The index of the shards is stored in the blockchain or databases (DB).
Description The present patent shows how to store files via an encrypted SHA 256 compliant process in email servers and the retrieval of those files and rebuilding them in their initial state. The process implies the identification of the files for storage, and the splitting the file in small files: shards. The shards are then encrypted via SHA256 encryption, indexed and assigned in a blockchain-type structure, with pointers from one block to another, or by storing the index in a DB-like structure. The shards are pushed from source to destination via a standard email protocol into an email account/server as distinct messages.
The shards can be retrieved via a read process from blockchain or the index DB, they can be deleted on the mail servers and distributed to multiple email servers. The creation of the shards will generate an index stored in blockchain or DB index. The advantages of using this method is storage of secure, SHA256 encrypted information, storage of encrypted and secured information in traditional email servers' inboxes, protected by scanners or Al engines who're analyzing and exposing the content of stored data. This solution will provide a viable alternative to store confidential data in commonly used data storage structures.
Background Of The Invention There are 2.5 quintillion bytes of data created each day at our current pace, but that pace is only accelerating with the growth of the Internet of Things (IoT). Over the last two years alone 90 percent of Page 1 of9 the data in the world was generated [IBM/IDC] and there are untapped capacities for use available in email servers.
In recent years, data center trends, such as big data analytics and cloud storage technologies, have fostered the rapid growth of computer file storage. The number of applications using strictly file-based access, rather than database access, has been another contributing factor.
Summary Of The Invention's Advantages The method will allow file storage outside a network, in email inboxes, saving the data in encrypted shards.
Main advantages of the solution include:
= using additional email inbox capacities for data storage = storing data (sending and receiving data shards) by using standardized protocols ¨ no additional protocols are required, accommodating firewalls rules.
= splitting / restoring data in shards and storing in secured email boxes, adding additional security = encrypting data in email inboxes via SHA256, making it impossible to access the data stored in email inboxes Detailed Description Of The Invention The process is as follows:
I. Files selected for storage are identified in the Hub (Fig. 1)
Author: Dr.Radu Vestemean Abstract The main purpose of the present patent is to store files via an encrypted (SHA
256 compliant) process in email servers and the retrieval and reconstruction of those files in their initial state. The files are split in encrypted shards, are then sent via standard emailing protocols in email inboxes, and then reassembled in the initial state. The index of the shards is stored in the blockchain or databases (DB).
Description The present patent shows how to store files via an encrypted SHA 256 compliant process in email servers and the retrieval of those files and rebuilding them in their initial state. The process implies the identification of the files for storage, and the splitting the file in small files: shards. The shards are then encrypted via SHA256 encryption, indexed and assigned in a blockchain-type structure, with pointers from one block to another, or by storing the index in a DB-like structure. The shards are pushed from source to destination via a standard email protocol into an email account/server as distinct messages.
The shards can be retrieved via a read process from blockchain or the index DB, they can be deleted on the mail servers and distributed to multiple email servers. The creation of the shards will generate an index stored in blockchain or DB index. The advantages of using this method is storage of secure, SHA256 encrypted information, storage of encrypted and secured information in traditional email servers' inboxes, protected by scanners or Al engines who're analyzing and exposing the content of stored data. This solution will provide a viable alternative to store confidential data in commonly used data storage structures.
Background Of The Invention There are 2.5 quintillion bytes of data created each day at our current pace, but that pace is only accelerating with the growth of the Internet of Things (IoT). Over the last two years alone 90 percent of Page 1 of9 the data in the world was generated [IBM/IDC] and there are untapped capacities for use available in email servers.
In recent years, data center trends, such as big data analytics and cloud storage technologies, have fostered the rapid growth of computer file storage. The number of applications using strictly file-based access, rather than database access, has been another contributing factor.
Summary Of The Invention's Advantages The method will allow file storage outside a network, in email inboxes, saving the data in encrypted shards.
Main advantages of the solution include:
= using additional email inbox capacities for data storage = storing data (sending and receiving data shards) by using standardized protocols ¨ no additional protocols are required, accommodating firewalls rules.
= splitting / restoring data in shards and storing in secured email boxes, adding additional security = encrypting data in email inboxes via SHA256, making it impossible to access the data stored in email inboxes Detailed Description Of The Invention The process is as follows:
I. Files selected for storage are identified in the Hub (Fig. 1)
2. After selection, the files are split into small files (for example 5 MB
size), called shards. The file unit is called shard, plural shards. (Fig.2)
size), called shards. The file unit is called shard, plural shards. (Fig.2)
3. The shards are then indexed and assigned in a blockchain-type structure (with pointers from one block to another). (Fig. 3)
4. The result of the above processes (Fig. 4):
a. Original File b. Encrypted Shards c. Index (IDX) Map for the original file Page 2 of9
a. Original File b. Encrypted Shards c. Index (IDX) Map for the original file Page 2 of9
5. The shards are afterwards pushed from source to destination via a standard email protocol into an email account/ server (SMTP /1MAP/POP) as distinct messages (Fig. 4, Fig.
5).
5).
6. The shards can be retrieved via a read process from the Hub (Fig. 6).
7. The shards can be deleted on the mail servers.
8. The shards can be distributed to multiple mail servers (redundancy).
The process can be implemented via a blockchain style framework, as we can simulate the shards as part of ledger entries (Fig. 7).
The implementation of the process (Fig. 8) will be flexible, but due to the requirements of encryption, privacy (HIPPA/GDPR) SHA256 encryption is required on untrusted (email) servers. There will be microservices to split, send, retrieve, and rebuild the files/shards.
The creation of the shards will generate an index. There are two methods to design the index:
= as database records = as ledger entries in a blockchain Claims Full name: Dr.Radu Vestemean Citizenship: Canadian Complete address: 19 Ravel Drive Province or state: Ontario Postal code: L4J 8Z2 Telephone number: 416 902 2924 Fax number: N/A
Country: Canada Page 3 of9
The process can be implemented via a blockchain style framework, as we can simulate the shards as part of ledger entries (Fig. 7).
The implementation of the process (Fig. 8) will be flexible, but due to the requirements of encryption, privacy (HIPPA/GDPR) SHA256 encryption is required on untrusted (email) servers. There will be microservices to split, send, retrieve, and rebuild the files/shards.
The creation of the shards will generate an index. There are two methods to design the index:
= as database records = as ledger entries in a blockchain Claims Full name: Dr.Radu Vestemean Citizenship: Canadian Complete address: 19 Ravel Drive Province or state: Ontario Postal code: L4J 8Z2 Telephone number: 416 902 2924 Fax number: N/A
Country: Canada Page 3 of9
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3046698A CA3046698A1 (en) | 2019-06-17 | 2019-06-17 | Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3046698A CA3046698A1 (en) | 2019-06-17 | 2019-06-17 | Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) |
Publications (1)
Publication Number | Publication Date |
---|---|
CA3046698A1 true CA3046698A1 (en) | 2020-12-17 |
Family
ID=74036603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3046698A Abandoned CA3046698A1 (en) | 2019-06-17 | 2019-06-17 | Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA3046698A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113518113A (en) * | 2021-05-11 | 2021-10-19 | 深圳前海移联科技有限公司 | File storage method and device, computer equipment and storage medium |
-
2019
- 2019-06-17 CA CA3046698A patent/CA3046698A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113518113A (en) * | 2021-05-11 | 2021-10-19 | 深圳前海移联科技有限公司 | File storage method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20020122543A1 (en) | System and method of indexing unique electronic mail messages and uses for the same | |
US9094338B2 (en) | Attributes of captured objects in a capture system | |
US20080033905A1 (en) | System and Method for the Capture and Archival of Electronic Communications | |
US20190384747A1 (en) | System and method for investigating large amounts of data | |
US10275611B1 (en) | Methods and apparatus for sharing and searching encrypted data | |
US8429233B2 (en) | Method and system for journaling electronic messages | |
US7305385B1 (en) | N-gram based text searching | |
US7647380B2 (en) | Datacenter mail routing | |
JP2003524243A (en) | Hash file system and method used in commonality factoring system | |
US20120117341A1 (en) | Method and system for transformation of logical data objects for storage | |
CN106557704B (en) | Information and data framework in content-centric networks | |
CN112272155B (en) | E-mail receiving and sending method based on block chain | |
CN112559463B (en) | Compressed file processing method and device | |
CN113162818A (en) | Method and system for realizing distributed flow acquisition and analysis | |
CA3046698A1 (en) | Encrypted sharding for storing and retrieving digital files in email servers via standard protocols (smtip/imap/pop) | |
US8260861B1 (en) | System and method for an electronic mail attachment proxy | |
CN112272156B (en) | E-mail receiving and sending system based on block chain | |
WO2012145825A1 (en) | System and method for data obfuscation in interception of communication with a cloud | |
US20240064057A1 (en) | Scalable security information and event management (siem) framework | |
US9043408B2 (en) | Apparatuses and methods for identifying email and email servers | |
US20130218851A1 (en) | Storage system, data management device, method and program | |
US11030174B1 (en) | Quantized time range indexing for out of order event collections | |
CN111314505A (en) | Network address translation method and device | |
EP1868351B1 (en) | File distribution system | |
CN110825838A (en) | Object storage aggregation system and aggregation method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |
Effective date: 20210831 |