GB0624057D0 - Shared access to private files - Google Patents
Shared access to private filesInfo
- Publication number
- GB0624057D0 GB0624057D0 GBGB0624057.6A GB0624057A GB0624057D0 GB 0624057 D0 GB0624057 D0 GB 0624057D0 GB 0624057 A GB0624057 A GB 0624057A GB 0624057 D0 GB0624057 D0 GB 0624057D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- network
- data
- shared
- private
- chunks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H04L29/08306—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1076—Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
Abstract
A mechanism for secure sharing of data within a distributed or peer-to-peer secure/insecure network environment. It is an object of the present invention to obviate the need for file servers and replace their function with a distributed network of preferably standard processing nodes. This network may be private as in a corporate network or an open network like the Internet and it will preferably not contain any lists of user authentication records. Shared access to private files is provided using decentralized and anonymously authenticated shared data areas, which have a granular access restriction. Preferably the data is stored in chunks which are individually hashed and/or encrypted, and furthermore the location of the chunks is identified by data maps which may be shared among authenticated users.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624057A GB2446170A (en) | 2006-12-01 | 2006-12-01 | Shared access to private files in a distributed network |
GB0709754A GB2444339A (en) | 2006-12-01 | 2007-05-22 | Shared access to private files in a distributed network |
PCT/GB2007/004425 WO2008065343A1 (en) | 2006-12-01 | 2007-11-21 | Shared access to private files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624057A GB2446170A (en) | 2006-12-01 | 2006-12-01 | Shared access to private files in a distributed network |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0624057D0 true GB0624057D0 (en) | 2007-01-10 |
GB2446170A GB2446170A (en) | 2008-08-06 |
Family
ID=37671712
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0624057A Withdrawn GB2446170A (en) | 2006-12-01 | 2006-12-01 | Shared access to private files in a distributed network |
GB0709754A Withdrawn GB2444339A (en) | 2006-12-01 | 2007-05-22 | Shared access to private files in a distributed network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0709754A Withdrawn GB2444339A (en) | 2006-12-01 | 2007-05-22 | Shared access to private files in a distributed network |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2446170A (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010056208A1 (en) * | 2008-11-13 | 2010-05-20 | Twoki Holdings Limited | Communication system |
GB2469469B (en) | 2009-04-14 | 2015-06-10 | Skype | Method and system for data transmission |
GB2469470B (en) * | 2009-04-14 | 2015-02-25 | Skype | Transmitting and receiving data |
CN101605107B (en) * | 2009-07-22 | 2011-09-21 | 国家计算机网络与信息安全管理中心 | Message hybrid anonymous communication method and device |
JP5018919B2 (en) * | 2010-03-19 | 2012-09-05 | コニカミノルタビジネステクノロジーズ株式会社 | Information processing apparatus, content management method, and content management program |
GB2486462B (en) * | 2010-12-16 | 2019-04-24 | Maidsafe Found | Distributed file system |
US9900384B2 (en) * | 2013-07-12 | 2018-02-20 | Adobe Systems Incorporated | Distributed caching in a communication network |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7062490B2 (en) * | 2001-03-26 | 2006-06-13 | Microsoft Corporation | Serverless distributed file system |
AU2002254478A1 (en) * | 2001-03-27 | 2002-10-08 | Microsoft Corporation | Distributed, scalable cryptographic acces control |
US20020188735A1 (en) * | 2001-06-06 | 2002-12-12 | Needham Bradford H. | Partially replicated, locally searched peer to peer file sharing system |
JP2003186777A (en) * | 2001-12-17 | 2003-07-04 | Nippon Telegraph & Telephone East Corp | Personal portable apparatus, communication method program and recording medium |
WO2005119477A2 (en) * | 2004-05-19 | 2005-12-15 | Wurld Media, Inc. | Object schemas and packet chain protocols for managing digital content routing and distribution in peer-to-peer dynamic connection structures |
CA2483760A1 (en) * | 2004-10-25 | 2006-04-25 | Thomas E. Chalker | System and method for a secure, scalable wide area file system |
US20060117247A1 (en) * | 2004-11-30 | 2006-06-01 | Fite William R | Web based data collaboration tool |
-
2006
- 2006-12-01 GB GB0624057A patent/GB2446170A/en not_active Withdrawn
-
2007
- 2007-05-22 GB GB0709754A patent/GB2444339A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2444339A (en) | 2008-06-04 |
GB0709754D0 (en) | 2007-06-27 |
GB2446170A (en) | 2008-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB0709754D0 (en) | Shared access to private files | |
Ermoshina et al. | End-to-end encrypted messaging protocols: An overview | |
ATE532144T1 (en) | DOCUMENT SECURITY MANAGEMENT SYSTEM | |
Lincoln et al. | Privacy-Preserving Sharing and Correlation of Security Alerts. | |
GB2444338B (en) | Secure anonymous storage of user data on a peer-to-peer network | |
NZ770092A (en) | Methods and systems for virtual file storage and encryption | |
WO2002078238A3 (en) | Distributed, scalable cryptographic acces control | |
WO2006087604A3 (en) | Secure and searchable storage system and method | |
WO2007084931A3 (en) | Locating and sharing geospatial information in a peer-to-peer network | |
MY166564A (en) | A system and method for privacy management for internet of things services | |
Gaigole et al. | The study of network security with its penetrating attacks and possible security mechanisms | |
MX336545B (en) | File sharing via link generation. | |
GB201105242D0 (en) | Managing authentication on a distributed network | |
WO2005050388A3 (en) | Systems and methods for prevention of peer-to-peer file sharing | |
GB0709764D0 (en) | Anonymous Authentication | |
Lee et al. | Secure personal content networking over untrusted devices | |
GB0624058D0 (en) | Self encryption | |
Eckersley et al. | The EFF SSL Observatory | |
Fan et al. | Timed-release predicate encryption and its extensions in cloud computing | |
Rose | Applicability statement: DNS security (DNSSEC) DNSKEY algorithm implementation status | |
Anitha et al. | Metadata driven Efficient CRE based cipher key generation and distribution in cloud security | |
Krechowicz | Scalable distributed two-layer datastore providing data anonymity | |
Pulls | (More) Side Channels in Cloud Storage: Linking Data to Users | |
WO2015008300A3 (en) | A system for instance specific, device-specific, duration-specific, view-specific, time-stamp-specific, and network specific, file/content sharing | |
Al-Aaridhi et al. | Access control for secure distributed data structures in Distributed Hash Tables |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |