WO2001086396A2 - Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys - Google Patents
Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys Download PDFInfo
- Publication number
- WO2001086396A2 WO2001086396A2 PCT/US2001/040462 US0140462W WO0186396A2 WO 2001086396 A2 WO2001086396 A2 WO 2001086396A2 US 0140462 W US0140462 W US 0140462W WO 0186396 A2 WO0186396 A2 WO 0186396A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encrypted
- representation
- objects
- cipher
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 126
- 238000000605 extraction Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 11
- 230000015654 memory Effects 0.000 description 11
- 230000003287 optical effect Effects 0.000 description 6
- 230000011218 segmentation Effects 0.000 description 5
- 230000001010 compromised effect Effects 0.000 description 4
- 230000006855 networking Effects 0.000 description 3
- 230000005055 memory storage Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000013329 compounding Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99953—Recoverability
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99955—Archiving or backup
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT01975827T ATE487297T1 (de) | 2000-05-05 | 2001-04-05 | Verschlüsselungsvorrichtung und verfahren zum identifizieren und zusammenfügen identischer objekte, die mit unterschiedlichen schlüsseln verschlüsselt wurden |
DE60143395T DE60143395D1 (de) | 2000-05-05 | 2001-04-05 | Verschlüsselungsvorrichtung und verfahren zum identifizieren und zusammenfügen identischer objekte, die mit unterschiedlichen schlüsseln verschlüsselt wurden |
AU2001295208A AU2001295208A1 (en) | 2000-05-05 | 2001-04-05 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys |
EP01975827A EP1299971B1 (en) | 2000-05-05 | 2001-04-05 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/565,821 US6983365B1 (en) | 2000-05-05 | 2000-05-05 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys |
US09/565,821 | 2000-05-05 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001086396A2 true WO2001086396A2 (en) | 2001-11-15 |
WO2001086396A3 WO2001086396A3 (en) | 2003-01-30 |
Family
ID=24260237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/040462 WO2001086396A2 (en) | 2000-05-05 | 2001-04-05 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys |
Country Status (6)
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707114B2 (en) | 2003-06-25 | 2010-04-27 | Nokia Corporation | Enabling modification of control information, which controls the rights to content, where access to a key for decrypting the content requires a particular value that becomes modified when the control information is modified |
US8281143B1 (en) * | 2008-09-29 | 2012-10-02 | Symantec Operating Corporation | Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
US8479304B1 (en) | 2009-03-31 | 2013-07-02 | Symantec Corporation | Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
EP2830282A1 (en) * | 2012-03-19 | 2015-01-28 | Tianjin Sursen Investment Corp Ltd. | Storage method, system and device |
US9792063B2 (en) | 2014-01-15 | 2017-10-17 | Intel Corporation | Deduplication-based data security |
Families Citing this family (113)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7770230B2 (en) * | 2002-04-22 | 2010-08-03 | Arvato Digital Services Canada, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US6418478B1 (en) * | 1997-10-30 | 2002-07-09 | Commvault Systems, Inc. | Pipelined high speed data transfer mechanism |
US7581077B2 (en) | 1997-10-30 | 2009-08-25 | Commvault Systems, Inc. | Method and system for transferring data in a storage operation |
EP1466250A2 (en) * | 2001-10-12 | 2004-10-13 | Koninklijke Philips Electronics N.V. | Apparatus and method for reading or writing user data |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7783765B2 (en) | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
GB2410106B (en) | 2002-09-09 | 2006-09-13 | Commvault Systems Inc | Dynamic storage device pooling in a computer system |
US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
GB2409553B (en) | 2002-09-16 | 2007-04-04 | Commvault Systems Inc | System and method for optimizing storage operations |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
CA2520498C (en) | 2003-04-03 | 2012-09-25 | Commvault Systems, Inc. | System and method for dynamically performing storage operations in a computer network |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
GB0315154D0 (en) * | 2003-06-28 | 2003-08-06 | Ibm | Improvements to hypertext integrity |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
CA2544063C (en) * | 2003-11-13 | 2013-09-10 | Commvault Systems, Inc. | System and method for combining data streams in pilelined storage operations in a storage network |
US7395437B2 (en) * | 2004-01-05 | 2008-07-01 | International Business Machines Corporation | System and method for fast querying of encrypted databases |
US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US9535624B1 (en) * | 2004-09-13 | 2017-01-03 | EMC IP Holding Company LLC | Duplicate management |
JP4541811B2 (ja) * | 2004-09-13 | 2010-09-08 | キヤノン株式会社 | 画像処理装置、画像処理方法およびプログラム |
US7814317B1 (en) * | 2004-10-19 | 2010-10-12 | Cisco Technology, Inc. | Multiple password documents |
US7802096B1 (en) * | 2004-10-19 | 2010-09-21 | Cisco Technology, Inc. | Fallback key retrieval |
US7975061B1 (en) | 2004-11-05 | 2011-07-05 | Commvault Systems, Inc. | System and method for performing multistream storage operations |
US7536291B1 (en) | 2004-11-08 | 2009-05-19 | Commvault Systems, Inc. | System and method to support simulated storage operations |
US20070174362A1 (en) * | 2006-01-18 | 2007-07-26 | Duc Pham | System and methods for secure digital data archiving and access auditing |
US8667273B1 (en) | 2006-05-30 | 2014-03-04 | Leif Olov Billstrom | Intelligent file encryption and secure backup system |
US8099605B1 (en) | 2006-06-05 | 2012-01-17 | InventSec AB | Intelligent storage device for backup system |
US7624117B2 (en) * | 2006-06-12 | 2009-11-24 | Sap Ag | Complex data assembly identifier thesaurus |
US7801308B1 (en) | 2006-07-17 | 2010-09-21 | Integrated Device Technology, Inc. | Secure key encoding for content protection |
US8023646B2 (en) * | 2006-11-08 | 2011-09-20 | Voltage Security, Inc. | Identity-based-encryption extensions formed using multiple instances of an identity based encryption scheme |
US8312323B2 (en) | 2006-12-22 | 2012-11-13 | Commvault Systems, Inc. | Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved |
US7730106B2 (en) * | 2006-12-28 | 2010-06-01 | Teradata Us, Inc. | Compression of encrypted data in database management systems |
US8352692B1 (en) | 2007-03-30 | 2013-01-08 | Symantec Corporation | Utilizing peer-to-peer services with single instance storage techniques |
US8209540B2 (en) * | 2007-06-28 | 2012-06-26 | Apple Inc. | Incremental secure backup and restore of user settings and data |
US8199911B1 (en) | 2008-03-31 | 2012-06-12 | Symantec Operating Corporation | Secure encryption algorithm for data deduplication on untrusted storage |
US9395929B2 (en) * | 2008-04-25 | 2016-07-19 | Netapp, Inc. | Network storage server with integrated encryption, compression and deduplication capability |
US20090319772A1 (en) * | 2008-04-25 | 2009-12-24 | Netapp, Inc. | In-line content based security for data at rest in a network storage system |
US8589697B2 (en) * | 2008-04-30 | 2013-11-19 | Netapp, Inc. | Discarding sensitive data from persistent point-in-time image |
US8117464B1 (en) * | 2008-04-30 | 2012-02-14 | Netapp, Inc. | Sub-volume level security for deduplicated data |
US8397084B2 (en) * | 2008-06-12 | 2013-03-12 | Microsoft Corporation | Single instance storage of encrypted data |
US9454444B1 (en) | 2009-03-19 | 2016-09-27 | Veritas Technologies Llc | Using location tracking of cluster nodes to avoid single points of failure |
US8438630B1 (en) | 2009-03-30 | 2013-05-07 | Symantec Corporation | Data loss prevention system employing encryption detection |
US8572758B1 (en) | 2009-03-30 | 2013-10-29 | Symantec Corporation | DLP-enforced loss scanning, sequestering, and content indexing |
US8812874B1 (en) | 2009-03-31 | 2014-08-19 | Symantec Corporation | Content deduplication in enterprise rights management |
US10148433B1 (en) | 2009-10-14 | 2018-12-04 | Digitalpersona, Inc. | Private key/public key resource protection scheme |
US8311964B1 (en) | 2009-11-12 | 2012-11-13 | Symantec Corporation | Progressive sampling for deduplication indexing |
US8458515B1 (en) | 2009-11-16 | 2013-06-04 | Symantec Corporation | Raid5 recovery in a high availability object based file system |
US8401185B1 (en) * | 2010-02-01 | 2013-03-19 | Symantec Corporation | Systems and methods for securely deduplicating data owned by multiple entities |
US8898482B2 (en) * | 2010-02-22 | 2014-11-25 | Lockify, Inc. | Encryption system using clients and untrusted servers |
US8473463B1 (en) | 2010-03-02 | 2013-06-25 | Symantec Corporation | Method of avoiding duplicate backups in a computing system |
US8370315B1 (en) | 2010-05-28 | 2013-02-05 | Symantec Corporation | System and method for high performance deduplication indexing |
US8983952B1 (en) | 2010-07-29 | 2015-03-17 | Symantec Corporation | System and method for partitioning backup data streams in a deduplication based storage system |
US8756197B1 (en) | 2010-08-13 | 2014-06-17 | Symantec Corporation | Generating data set views for backup restoration |
US8291170B1 (en) | 2010-08-19 | 2012-10-16 | Symantec Corporation | System and method for event driven backup data storage |
US8495392B1 (en) | 2010-09-02 | 2013-07-23 | Symantec Corporation | Systems and methods for securely deduplicating data owned by multiple entities |
US8392376B2 (en) | 2010-09-03 | 2013-03-05 | Symantec Corporation | System and method for scalable reference management in a deduplication based storage system |
US8862876B2 (en) * | 2010-11-09 | 2014-10-14 | International Business Machines Corporation | Method and system for deleting data |
US8396841B1 (en) | 2010-11-30 | 2013-03-12 | Symantec Corporation | Method and system of multi-level and multi-mode cloud-based deduplication |
US8495323B1 (en) | 2010-12-07 | 2013-07-23 | Symantec Corporation | Method and system of providing exclusive and secure access to virtual storage objects in a virtual machine cluster |
US8392384B1 (en) | 2010-12-10 | 2013-03-05 | Symantec Corporation | Method and system of deduplication-based fingerprint index caching |
WO2012093216A1 (fr) * | 2011-01-07 | 2012-07-12 | Thomson Licensing | Dispositif et procède de stockage en ligne, dispositif et procède d'émission, dispositif et procède de réception |
US8527472B2 (en) | 2011-03-29 | 2013-09-03 | Kaseya International Limited | Method and apparatus of securely processing data for file backup, de-duplication, and restoration |
US9054864B2 (en) | 2011-03-29 | 2015-06-09 | Kaseya Limited | Method and apparatus of securely processing data for file backup, de-duplication, and restoration |
US9064133B2 (en) * | 2011-03-29 | 2015-06-23 | Kaseya Limited | Method and apparatus of securely processing data for file backup, de-duplication, and restoration |
EP2710510A4 (en) * | 2011-05-14 | 2015-05-06 | Bitcasa Inc | CLOUD FILE SYSTEM WITH SERVER DEPLOYMENT OF USER UNKNOWN ENCRYPTED FILES |
US8930307B2 (en) | 2011-09-30 | 2015-01-06 | Pure Storage, Inc. | Method for removing duplicate data from a storage array |
US8589640B2 (en) | 2011-10-14 | 2013-11-19 | Pure Storage, Inc. | Method for maintaining multiple fingerprint tables in a deduplicating storage system |
CN104335219B (zh) * | 2012-03-30 | 2018-06-05 | 爱迪德技术有限公司 | 使用变量相关编码来保护可访问的系统 |
US10379988B2 (en) | 2012-12-21 | 2019-08-13 | Commvault Systems, Inc. | Systems and methods for performance monitoring |
US10275397B2 (en) | 2013-02-22 | 2019-04-30 | Veritas Technologies Llc | Deduplication storage system with efficient reference updating and space reclamation |
RU2580036C2 (ru) | 2013-06-28 | 2016-04-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ создания гибкой свертки для обнаружения вредоносных программ |
US9575680B1 (en) | 2014-08-22 | 2017-02-21 | Veritas Technologies Llc | Deduplication rehydration |
US10423495B1 (en) | 2014-09-08 | 2019-09-24 | Veritas Technologies Llc | Deduplication grouping |
US9904481B2 (en) | 2015-01-23 | 2018-02-27 | Commvault Systems, Inc. | Scalable auxiliary copy processing in a storage management system using media agent resources |
US9898213B2 (en) | 2015-01-23 | 2018-02-20 | Commvault Systems, Inc. | Scalable auxiliary copy processing using media agent resources |
US20160292447A1 (en) * | 2015-04-06 | 2016-10-06 | Lawlitt Life Solutions, LLC | Multi-layered encryption |
IL248306B (en) * | 2016-10-10 | 2019-12-31 | Verint Systems Ltd | System and method for creating data sets for learning to recognize user actions |
US11010261B2 (en) | 2017-03-31 | 2021-05-18 | Commvault Systems, Inc. | Dynamically allocating streams during restoration of data |
US11507612B2 (en) * | 2017-09-15 | 2022-11-22 | Dg Ip Llc | Document elimination for compact and secure storage and management thereof |
US11314692B1 (en) | 2017-10-18 | 2022-04-26 | Comake, Inc. | Workflow relationship management and contextualization |
US11409820B1 (en) | 2017-10-18 | 2022-08-09 | Comake, Inc. | Workflow relationship management and contextualization |
US10762060B1 (en) | 2017-10-18 | 2020-09-01 | Comake, Inc. | Electronic file management |
US10970349B1 (en) | 2017-10-18 | 2021-04-06 | Comake, Inc. | Workflow relationship management and contextualization |
US11157505B2 (en) | 2017-10-18 | 2021-10-26 | Comake, Inc. | Dynamic presentation of searchable contextual actions and data |
US10536276B2 (en) * | 2017-10-30 | 2020-01-14 | International Business Machines Corporation | Associating identical fields encrypted with different keys |
US11206128B2 (en) | 2019-03-08 | 2021-12-21 | International Business Machines Corporation | Secure paging with page change detection |
US11347869B2 (en) | 2019-03-08 | 2022-05-31 | International Business Machines Corporation | Secure interface control high-level page management |
US11403409B2 (en) | 2019-03-08 | 2022-08-02 | International Business Machines Corporation | Program interruptions for page importing/exporting |
US10999295B2 (en) | 2019-03-20 | 2021-05-04 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US11693841B2 (en) | 2020-01-03 | 2023-07-04 | International Business Machines Corporation | Hash for structural data with same data meaning |
US11917072B2 (en) | 2020-12-03 | 2024-02-27 | International Business Machines Corporation | Implementing opportunistic authentication of encrypted data |
US11695541B2 (en) | 2020-12-07 | 2023-07-04 | International Business Machines Corporation | Implementing resilient deterministic encryption |
US11271716B1 (en) * | 2021-01-28 | 2022-03-08 | Emtruth, Inc. | Blockchain-based data management of distributed binary objects |
CN113438210B (zh) * | 2021-06-04 | 2023-04-07 | 上海焜耀网络科技有限公司 | 一种数据传输处理方法、装置和电子设备 |
US11593223B1 (en) | 2021-09-02 | 2023-02-28 | Commvault Systems, Inc. | Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5073935A (en) * | 1990-12-17 | 1991-12-17 | Jose Pastor | Method for secure communication |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5008936A (en) * | 1988-12-09 | 1991-04-16 | The Exchange System Limited Partnership | Backup/restore technique in a microcomputer-based encryption system |
US5778395A (en) * | 1995-10-23 | 1998-07-07 | Stac, Inc. | System for backing up files from disk volumes on multiple nodes of a computer network |
US5794254A (en) * | 1996-12-03 | 1998-08-11 | Fairbanks Systems Group | Incremental computer file backup using a two-step comparison of first two characters in the block and a signature with pre-stored character and signature sets |
US5940507A (en) * | 1997-02-11 | 1999-08-17 | Connected Corporation | Secure file archive through encryption key management |
US6366988B1 (en) * | 1997-07-18 | 2002-04-02 | Storactive, Inc. | Systems and methods for electronic data storage management |
US6405315B1 (en) * | 1997-09-11 | 2002-06-11 | International Business Machines Corporation | Decentralized remotely encrypted file system |
US6574657B1 (en) * | 1999-05-03 | 2003-06-03 | Symantec Corporation | Methods and apparatuses for file synchronization and updating using a signature list |
-
2000
- 2000-05-05 US US09/565,821 patent/US6983365B1/en not_active Expired - Fee Related
-
2001
- 2001-04-05 AT AT01975827T patent/ATE487297T1/de not_active IP Right Cessation
- 2001-04-05 DE DE60143395T patent/DE60143395D1/de not_active Expired - Lifetime
- 2001-04-05 EP EP01975827A patent/EP1299971B1/en not_active Expired - Lifetime
- 2001-04-05 AU AU2001295208A patent/AU2001295208A1/en not_active Abandoned
- 2001-04-05 WO PCT/US2001/040462 patent/WO2001086396A2/en active Application Filing
-
2004
- 2004-05-26 US US10/855,109 patent/US7266689B2/en not_active Expired - Fee Related
- 2004-05-26 US US10/855,110 patent/US7437555B2/en not_active Expired - Fee Related
- 2004-05-26 US US10/855,112 patent/US7779253B2/en not_active Expired - Fee Related
-
2005
- 2005-06-10 US US11/149,637 patent/US7159110B2/en not_active Expired - Fee Related
- 2005-06-10 US US11/150,801 patent/US7574598B2/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5073935A (en) * | 1990-12-17 | 1991-12-17 | Jose Pastor | Method for secure communication |
Non-Patent Citations (1)
Title |
---|
A. RAHN: "(OFFTOPIC) Microsoft: Single Instance Store and Symbolic Links Explained" INTERNET DOCUMENT, [Online] 4 March 2000 (2000-03-04), XP002215495 Retrieved from the Internet: <URL:http://www.linux.org.ve/archivo/l-linux-2000-march/014215.html> [retrieved on 2002-10-02] * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707114B2 (en) | 2003-06-25 | 2010-04-27 | Nokia Corporation | Enabling modification of control information, which controls the rights to content, where access to a key for decrypting the content requires a particular value that becomes modified when the control information is modified |
US8281143B1 (en) * | 2008-09-29 | 2012-10-02 | Symantec Operating Corporation | Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
US8479304B1 (en) | 2009-03-31 | 2013-07-02 | Symantec Corporation | Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
EP2830282A1 (en) * | 2012-03-19 | 2015-01-28 | Tianjin Sursen Investment Corp Ltd. | Storage method, system and device |
EP2830282A4 (en) * | 2012-03-19 | 2015-04-08 | Surdoc Corp | STORAGE PROCESS, SYSTEM AND DEVICE |
US9792063B2 (en) | 2014-01-15 | 2017-10-17 | Intel Corporation | Deduplication-based data security |
US10558377B2 (en) | 2014-01-15 | 2020-02-11 | Intel Corporation | Deduplication-based data security |
Also Published As
Publication number | Publication date |
---|---|
DE60143395D1 (de) | 2010-12-16 |
EP1299971A2 (en) | 2003-04-09 |
US20040221159A1 (en) | 2004-11-04 |
US7159110B2 (en) | 2007-01-02 |
WO2001086396A3 (en) | 2003-01-30 |
US6983365B1 (en) | 2006-01-03 |
US7779253B2 (en) | 2010-08-17 |
ATE487297T1 (de) | 2010-11-15 |
US20040215962A1 (en) | 2004-10-28 |
US7266689B2 (en) | 2007-09-04 |
US20050229012A1 (en) | 2005-10-13 |
EP1299971B1 (en) | 2010-11-03 |
US20040221160A1 (en) | 2004-11-04 |
US20050235146A1 (en) | 2005-10-20 |
AU2001295208A1 (en) | 2001-11-20 |
US7574598B2 (en) | 2009-08-11 |
US7437555B2 (en) | 2008-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1299971B1 (en) | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |
US5694569A (en) | Method for protecting a volatile file using a single hash | |
US6976165B1 (en) | System and method for secure storage, transfer and retrieval of content addressable information | |
US8572409B2 (en) | Method and apparatus for non-redundant encrypted storage | |
US7571327B2 (en) | Exclusive encryption | |
US7480796B2 (en) | System and method for authenticating data using incompatible digest functions | |
US8966261B2 (en) | Method for secure remote backup | |
US6567914B1 (en) | Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system | |
TWI384830B (zh) | 竄改檢測用之資料生成方法、以及竄改檢測方法與裝置 | |
US8195947B2 (en) | Method and system for conveying alternate acceptable canonicalizations of a digitally signed piece of electronic mail | |
US20220147508A1 (en) | Method of ensuring confidentiality and integrity of stored data and metadata in an untrusted environment | |
KR20170011754A (ko) | 전자 문서 관리 시스템 | |
AU720583B2 (en) | A method for protecting data | |
CN111914280B (zh) | 一种文件自加密解密方法 | |
CN117235767A (zh) | 一种文档管理方法、装置、电子设备及可读存储介质 | |
CN118013572A (en) | Sensitive medical document searching and verifying method based on verifiable dynamic symmetrical searchable encryption | |
CN111914280A (zh) | 一种文件自加密解密方法 | |
Raj et al. | Literature Survey on Obliterate of Secure Data using Universal Validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2001975827 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001975827 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |