GB0624057D0 - Shared access to private files - Google Patents

Shared access to private files

Info

Publication number
GB0624057D0
GB0624057D0 GBGB0624057.6A GB0624057A GB0624057D0 GB 0624057 D0 GB0624057 D0 GB 0624057D0 GB 0624057 A GB0624057 A GB 0624057A GB 0624057 D0 GB0624057 D0 GB 0624057D0
Authority
GB
United Kingdom
Prior art keywords
network
data
shared
private
chunks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB0624057.6A
Other versions
GB2446170A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0624057A priority Critical patent/GB2446170A/en
Publication of GB0624057D0 publication Critical patent/GB0624057D0/en
Priority to GB0709754A priority patent/GB2444339A/en
Priority to PCT/GB2007/004425 priority patent/WO2008065343A1/en
Publication of GB2446170A publication Critical patent/GB2446170A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L29/08306
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer

Abstract

A mechanism for secure sharing of data within a distributed or peer-to-peer secure/insecure network environment. It is an object of the present invention to obviate the need for file servers and replace their function with a distributed network of preferably standard processing nodes. This network may be private as in a corporate network or an open network like the Internet and it will preferably not contain any lists of user authentication records. Shared access to private files is provided using decentralized and anonymously authenticated shared data areas, which have a granular access restriction. Preferably the data is stored in chunks which are individually hashed and/or encrypted, and furthermore the location of the chunks is identified by data maps which may be shared among authenticated users.
GB0624057A 2006-12-01 2006-12-01 Shared access to private files in a distributed network Withdrawn GB2446170A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0624057A GB2446170A (en) 2006-12-01 2006-12-01 Shared access to private files in a distributed network
GB0709754A GB2444339A (en) 2006-12-01 2007-05-22 Shared access to private files in a distributed network
PCT/GB2007/004425 WO2008065343A1 (en) 2006-12-01 2007-11-21 Shared access to private files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0624057A GB2446170A (en) 2006-12-01 2006-12-01 Shared access to private files in a distributed network

Publications (2)

Publication Number Publication Date
GB0624057D0 true GB0624057D0 (en) 2007-01-10
GB2446170A GB2446170A (en) 2008-08-06

Family

ID=37671712

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0624057A Withdrawn GB2446170A (en) 2006-12-01 2006-12-01 Shared access to private files in a distributed network
GB0709754A Withdrawn GB2444339A (en) 2006-12-01 2007-05-22 Shared access to private files in a distributed network

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB0709754A Withdrawn GB2444339A (en) 2006-12-01 2007-05-22 Shared access to private files in a distributed network

Country Status (1)

Country Link
GB (2) GB2446170A (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010056208A1 (en) * 2008-11-13 2010-05-20 Twoki Holdings Limited Communication system
GB2469469B (en) 2009-04-14 2015-06-10 Skype Method and system for data transmission
GB2469470B (en) * 2009-04-14 2015-02-25 Skype Transmitting and receiving data
CN101605107B (en) * 2009-07-22 2011-09-21 国家计算机网络与信息安全管理中心 Message hybrid anonymous communication method and device
JP5018919B2 (en) * 2010-03-19 2012-09-05 コニカミノルタビジネステクノロジーズ株式会社 Information processing apparatus, content management method, and content management program
GB2486462B (en) * 2010-12-16 2019-04-24 Maidsafe Found Distributed file system
US9900384B2 (en) * 2013-07-12 2018-02-20 Adobe Systems Incorporated Distributed caching in a communication network

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062490B2 (en) * 2001-03-26 2006-06-13 Microsoft Corporation Serverless distributed file system
AU2002254478A1 (en) * 2001-03-27 2002-10-08 Microsoft Corporation Distributed, scalable cryptographic acces control
US20020188735A1 (en) * 2001-06-06 2002-12-12 Needham Bradford H. Partially replicated, locally searched peer to peer file sharing system
JP2003186777A (en) * 2001-12-17 2003-07-04 Nippon Telegraph & Telephone East Corp Personal portable apparatus, communication method program and recording medium
WO2005119477A2 (en) * 2004-05-19 2005-12-15 Wurld Media, Inc. Object schemas and packet chain protocols for managing digital content routing and distribution in peer-to-peer dynamic connection structures
CA2483760A1 (en) * 2004-10-25 2006-04-25 Thomas E. Chalker System and method for a secure, scalable wide area file system
US20060117247A1 (en) * 2004-11-30 2006-06-01 Fite William R Web based data collaboration tool

Also Published As

Publication number Publication date
GB2444339A (en) 2008-06-04
GB0709754D0 (en) 2007-06-27
GB2446170A (en) 2008-08-06

Similar Documents

Publication Publication Date Title
GB0709754D0 (en) Shared access to private files
Ermoshina et al. End-to-end encrypted messaging protocols: An overview
ATE532144T1 (en) DOCUMENT SECURITY MANAGEMENT SYSTEM
Lincoln et al. Privacy-Preserving Sharing and Correlation of Security Alerts.
GB2444338B (en) Secure anonymous storage of user data on a peer-to-peer network
NZ770092A (en) Methods and systems for virtual file storage and encryption
WO2002078238A3 (en) Distributed, scalable cryptographic acces control
WO2006087604A3 (en) Secure and searchable storage system and method
WO2007084931A3 (en) Locating and sharing geospatial information in a peer-to-peer network
MY166564A (en) A system and method for privacy management for internet of things services
Gaigole et al. The study of network security with its penetrating attacks and possible security mechanisms
MX336545B (en) File sharing via link generation.
GB201105242D0 (en) Managing authentication on a distributed network
WO2005050388A3 (en) Systems and methods for prevention of peer-to-peer file sharing
GB0709764D0 (en) Anonymous Authentication
Lee et al. Secure personal content networking over untrusted devices
GB0624058D0 (en) Self encryption
Eckersley et al. The EFF SSL Observatory
Fan et al. Timed-release predicate encryption and its extensions in cloud computing
Rose Applicability statement: DNS security (DNSSEC) DNSKEY algorithm implementation status
Anitha et al. Metadata driven Efficient CRE based cipher key generation and distribution in cloud security
Krechowicz Scalable distributed two-layer datastore providing data anonymity
Pulls (More) Side Channels in Cloud Storage: Linking Data to Users
WO2015008300A3 (en) A system for instance specific, device-specific, duration-specific, view-specific, time-stamp-specific, and network specific, file/content sharing
Al-Aaridhi et al. Access control for secure distributed data structures in Distributed Hash Tables

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)