WO2017106938A1 - Improved storage system - Google Patents
Improved storage system Download PDFInfo
- Publication number
- WO2017106938A1 WO2017106938A1 PCT/AU2017/000002 AU2017000002W WO2017106938A1 WO 2017106938 A1 WO2017106938 A1 WO 2017106938A1 AU 2017000002 W AU2017000002 W AU 2017000002W WO 2017106938 A1 WO2017106938 A1 WO 2017106938A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- location
- server
- key
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Definitions
- the present invention relates to the storage of data on electronic networks and, more particularly although not exclusively, to the secure storage of data which is accessible across an electronic network.
- a common practice is to secure sensitive or secure data on a centralised server is a common practice in the art. In the past this was an efficient way of storing data in that the security resources of a server were considered more secure and efficient than trying to store the same data on the client side device.
- encryption and decryption including shielding the end user from the need to be aware of any encryption or decryption keys.
- encryption and decryption and the securing of a file are carried out on a server (in preferred forms by a methodology requiring data transfer between
- Embodiments of the disclosed invention are designed to address these issues.
- Client server environment an arrangement of computing resources having a topology wherein client devices communicate over a network with at least logically and in most instances usually physically separate server devices.
- the server devices will usually have greater resources than the client devices and the client devices rely, at least in part, on communication with one or more of the server devices to carry out tasks on the client device.
- Encryption/decryption in relation to a file containing data a methodology involving applying an algorithm such that the data is reformatted in a way which renders it substantially indecipherable unless a reverse algorithm is then applied to the data so as to return it to its unencrypted form.
- a "key" is used as a reference element in the algorithm.
- the same key is used to encrypt the data as to decrypt the data.
- the key used for encryption is different to the key used for decryption.
- Encryption is to be distinguished from simple password protection where access to the data within a file requires a password but the data itself within the file is not reformatted.
- Authentication authentication in this specification is a methodology whereby the identity of an entity is
- authentication is often carried out by a combination of a username and a password-that is the provision of a given username with a corresponding password pair comprises authentication.
- the entity may be an individual operating software on a particular platform or the entity may be the platform itself.
- client devices such as a smart phone may qualify as an entity.
- a given user of the smart phone may also qualify as an entity as an alternative to or as well as the smart phone.
- a decryption key for the encrypted data element is stored at the first location.
- the second location is a client device.
- the client device is programmed to execute a Web enabled application which has a storage
- the encrypted data element is stored on the client device utilising the storage capability of the Web enabled application.
- the Web enabled application is a Web browser .
- the web browser executes HTML 5 including the HTML 5 local storage function.
- a method for storing data securely comprising encrypting the data at a first location using a processor located at the first
- the data thus encrypted comprising encrypted data which requires a key to decrypt the encrypted data; the key stored at the first location; the encrypted data transmitted to a second location remote from the first location and stored at the second location until further processing is required to be done on the data at which time the encrypted data is transmitted to the first location and unencrypted by applying the key to a decryption algorithm executed by the processor.
- an apparatus for secure storage of data comprising a first processor at a first location which encrypts data utilising a key; set apparatus further comprising a second processor located at a second location remote from the first location; the data, after encryption, moved over a network to the second processor and stored in association with the second processor until the data is required for execution of an application on the first processor at which time the data is moved back from the second processor to the first processor and the first processor applies the key to a decryption algorithm to decrypt the data for use by the application executing on the first processor .
- login/username account decrypting the encrypted data using the decryption key.
- the separate device is a Web server.
- the user login is a username and
- the decryption key is stored on the server .
- the encryption/decryption is not done on the client.
- the encryption/decryption is done on the server .
- the decryption key is released for use if and only if authentication of a client/service session is validated .
- the environment requires authentication at the user level.
- decryption key is referenced against the authentication .
- authentication is at the user device level.
- the data is a small data quantum.
- the data quantum is 100 MB.
- the data quantum is 50 MB.
- the data quantum is 10 MB.
- the data quantum is 1 MB.
- the data quantum is 0.5 MB.
- the data quantum is 0.1 MB.
- the data is only changed incrementally, if at all, each user session.
- Preferably only some elements of the data are changed, if at all, each user session.
- a method of securely storing data comprising generating a data element at a first location encrypting the data element at the first location thereby to form an encrypted data element transmitting the encrypted data element to a second location remote from the first location storing the encrypted data element at the second location.
- a decryption key for the encrypted data element is stored at the first location.
- the second location is a client device.
- the client device is programmed to execute a Web enabled application which has a storage
- the web enabled application executes HTML 5 including the HTML 5 local storage function.
- the encrypted data element is stored on the client device utilising the storage capability of the Web enabled application.
- the Web enabled application is a Web browser .
- a method for storing data securely comprising encrypting the data at a first location using a processor located at the first location; the data thus encrypted comprising encrypted data which requires a key to decrypt the encrypted data; the key stored at the first location; the encrypted data transmitted to a second location remote from the first location and stored at the second location until further processing is required to be done on the data at which time the encrypted data is transmitted to the first location and unencrypted by applying the key to a decryption algorithm executed by the processor.
- apparatus comprising a first processor at a first location which encrypts data utilising a key; set apparatus further comprising a second processor located at a second location remote from the first location; the data, after encryption, moved over a network to the second processor and stored in association with the second processor until the data is required for execution of an application on the first
- the processor at which time the data is moved back from the second processor to the first processor and the first processor applies the key to a decryption algorithm to decrypt the data for use by the application executing on the first processor.
- Figure 2 Control process for initial storage of data in accordance with an embodiment of the invention.
- Figure 3 Control process for subsequent use of encrypted data in accordance with an embodiment of the invention .
- Figures 4A, B, C describe in diagrammatic form one form of execution of an example embodiment of the invention.
- Figure 5 illustrates in block diagram form a client/server environment suitable for use with any of the described embodiments.
- Figures 6A-P illustrates steps in execution of an example of an embodiment of the invention, and use.
- Figure 1 describes the main components of an example embodiment.
- the client device 10 stores an encrypted version of the data being stored 11.
- the key to decrypt the data 18 is not stored on the client 10 but is stored on a server 14 that is usually
- a network 15 such as the Internet.
- the key 18 to decrypt the data 11 is stored on the server 14 in association with a specific user account 17 in a database of users 16 that have secure access to the server 14.
- the encrypted data 11 is stored in the domain related Local Storagel area 13 of a browser 12 or web enabled application 12 running on the client device 10.
- the server 14 is used for various processes associated with and involving the encryption2, collection and processing of the data which is subsequently stored on the client 10 as an encrypted data file 11.
- Figure 2 discloses the control process for the initial storage and encryption of data.
- the user 40 initiates a secure connection 30 to the server 41 and the client device is logged onto a secure user account 31.
- the server 40 supplies a form for use by the user to format the data to be secured 32 and the user fills out the form with some or all of the data to be secured 33.
- the user then opts to store the data securely on their client device 34.
- the server then retrieves the entered data and processes it 35. Processing may or may not include data verification and integrity checking. Subsequently an
- encryption key is generated by the server 36 and the key is linked to the current user's account 37.
- the key is then used to encrypt the data to be protected 38 and the resulting encrypted data file or files is stored on the client device in the browser or web enabled applications Local Storage for future retrieval 39.
- Figure 3 shows a control process for the subsequent use of encrypted data. Initially the user starts a secure connection 50 and the server then establishes a secure
- the server may present the user with a form to collect information that the user has
- the server retrieves the encrypted data from the client Local Storage 54.
- the server then retrieves the decryption key from the associated username account 55 and the data is decrypted on the server to memory 56 and the data is processed as needed 57.
- the server generates a new encryption key which is used to re-encrypt the data 59 so that it can be safely stored again on the client device Local Storage 60.
- the new encryption key is then stored with the user account in the anticipation of future decryption and use 61.
- Figures 4A, B, C illustrate in diagrammatic form one form of topology and execution of an example embodiment of the invention .
- a storage system 80 relies on a server 81 in communication with client device 82 in this instance over network 83.
- network 83 includes the internet which itself comprises an interconnected network of computers adapted for transmission of packet data 84 to destinations identified in header 85.
- client device 82 will be in electronic communication with network 83 by way of initial link 86 which may comprise a mobile telephone network or other radio communication network such as wifi or the like.
- client device 82 includes a client device memory 87 and client devicse processor 88 whereby code 89 stored in memory can be executed by processor 88.
- the code 89 includes an application adapted to receive commands 90 and data 91 from server 81.
- the commands 90 and data 91 permit creation of form fields Fl - F7 in a form structure 92.
- the form structure 92 is determined on server 81 and forms part of the commands 90 and data 91 transmitted to client device 82 during the unsecured window period.
- Each form field can receive respective data Dl - D7 which may be received from the server 81 as data 91 or may be inserted by a local user of the client device 82.
- the form structure 92 and data 91 is
- Server 81 typically located at a location physically remote from client device 82, received data Dl - D7 over either a secured or unsecured data channel and saves data Dl - D7 in server memory 93 referenced against an entity account 94.
- a secured window period commences when server 81 encrypts data Dl - D7 with reference to at least one key 95 so as to form encrypted data 96 which is then transmitted by server 81 to client device 82 which is to say the client device 82 which formulated data Dl - D7 and from which the data was transmitted to server 81 referenced against entity account 94.
- entity account may be owned by the client device 82 itself.
- entity account may be owned by a user of the code 89 executed on the client device 82 from which the data Dl - D7
- the server 81 references the data both before encryption and after encryption against the entity account 94.
- the server 81 is a web server. In an alternative preferred form the server may serve
- the server 81 deletes all instances of data Dl - D7 from its storage - whether in an encrypted or unencrypted form leaving the only key 95 stored against the entity account 94.
- the client device 82 stores the encrypted data 96 locally in client device memory 87. It is to be noted that the key 95 is not provided to the client device 82.
- a user of client device 82 may be given the option as to whether to invoke the procedure described above.
- FIG. 5 there is illustrated in block diagram form the topology of a typical client/server environment 70 which, in this instance, comprises at least one client device 71 and at least one server 72.
- the client device 71 is in data communication with the server 72 via a data communication channel 73.
- this channel 73 may be unidirectional. In other instances the channel 73 will be bidirectional.
- channel 73 or at least part of it is implemented over the Internet whereby data is
- each packet comprising at least a header containing target address information and a data portion containing a data "payload".
- data for of a webpage on the client 71 resides on server 72 and is delivered from the server 72 to the client 71 on request made by the client to the server.
- the data comprises a series of commands which, upon execution on the client 71, result in communication of data on the client device 71-usually by way of a visual interface, often display of a webpage 74.
- the webpage 74 itself typically is comprised of a multitude of data portions-some of which are constructed by the client 71 executing the commands received from the web server 72 whilst other portions may be comprised of data entered into the client by way of local input output operated by a user of the client device 71.
- HTML HyperText Markup Language
- Figures 6A-P disclose in block diagram format an example application of the system.
- an application 101 runs on the user device 100-in this instance a smart phone.
- user 102 fills out, in this example, their flight details and payment details in fields 105 on a form 103 displayed on touch enabled display 104 of the user device 100.
- the user device 100 is in first data communication with a Web server 106 whereby data
- server 106 may itself be in separate second data communication with server 107.
- Server 107 may for example utilised by financial intermediaries for the purpose of facilitating funds transfer including, for example, payment authorisation as between the parties involved in the transaction 108.
- server 106 constituting the data necessary to trigger transaction 108 whereby the data is communicated electronically to server 106.
- server 106 communicates with server 107 for the purpose of payment authorisation of the transaction 108.
- the example embodiment re-encrypts the data with a new key every time the data is used.
- An alternative embodiment could see the data re-encrypted every time or at a multiple of times that the client and server connect irrespective of whether the data is processed and or used in a form or not.
- another embodiment could see the encrypted data using the same encryption key for an unlimited amount of time.
- the example embodiment uses HTML5 Local Storage to store the encrypted data on the client.
- HTML5 Local Storage to store the encrypted data on the client.
- embodiment could use any storage means available on the client and accessible to a server on a web enabled application or browser .
- the example embodiment is used in the context of data stored and linked to a single domain.
- An alternative embodiment could allow the encrypted data to be accessed across multiple domains using a technique known in the art.
- An example of this is where an iFrame allowing access to local storage for a secure domain area where encrypted data is stored, can be embedded within a web page that accesses and references a different secure domain space on the client, but where data from the iFrame secure area can be passed to and used by the parent or other related pages.
- the example embodiment shows the user being able to optionally encrypt and store the data for future use.
- An alternative embodiment could see this function being an automatic process without the need for the user to opt for the data to be encrypted and stored locally.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (11)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2018533811A JP6854529B2 (ja) | 2015-12-24 | 2017-01-03 | 改良型ストレージシステム |
| EP17732010.8A EP3394787B1 (en) | 2015-12-24 | 2017-01-03 | Improved storage system |
| CN202311217934.6A CN117494151A (zh) | 2015-12-24 | 2017-01-03 | 改善的存储系统 |
| CA3009229A CA3009229C (en) | 2015-12-24 | 2017-01-03 | Method for storing data |
| US16/066,029 US11314873B2 (en) | 2015-12-24 | 2017-01-03 | Storage system |
| SG11201806423QA SG11201806423QA (en) | 2015-12-24 | 2017-01-03 | Improved storage system |
| CN201780013304.3A CN108701200B (zh) | 2015-12-24 | 2017-01-03 | 改善的存储系统 |
| AU2017204537A AU2017204537A1 (en) | 2015-12-24 | 2017-01-03 | Improved storage system |
| AU2020239610A AU2020239610A1 (en) | 2015-12-24 | 2020-09-21 | Improved Storage System |
| AU2021266356A AU2021266356A1 (en) | 2015-12-24 | 2021-11-12 | Improved Storage System |
| AU2024200080A AU2024200080A1 (en) | 2015-12-24 | 2024-01-05 | Improved Storage System |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2015905400 | 2015-12-24 | ||
| AU2015905400A AU2015905400A0 (en) | 2015-12-24 | Improved Payment System |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017106938A1 true WO2017106938A1 (en) | 2017-06-29 |
Family
ID=59088769
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2017/000002 Ceased WO2017106938A1 (en) | 2015-12-24 | 2017-01-03 | Improved storage system |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US11314873B2 (enExample) |
| EP (1) | EP3394787B1 (enExample) |
| JP (1) | JP6854529B2 (enExample) |
| CN (2) | CN108701200B (enExample) |
| AU (4) | AU2017204537A1 (enExample) |
| CA (1) | CA3009229C (enExample) |
| SG (1) | SG11201806423QA (enExample) |
| WO (1) | WO2017106938A1 (enExample) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10546145B2 (en) | 2017-02-17 | 2020-01-28 | International Business Machines Corporation | Storing data from a sensor device into a neighboring device |
| US10831935B2 (en) * | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
| WO2019169506A1 (en) * | 2018-03-08 | 2019-09-12 | Secure Exchanges Inc. | System and method for securely exchanging messages |
| CN109815711B (zh) * | 2018-12-21 | 2020-12-25 | 航天信息股份有限公司 | 一种存储设备、数据存储方法和数据读取方法 |
| US12301550B2 (en) * | 2021-06-01 | 2025-05-13 | Apple Inc. | End-to-end encryption for location sharing |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6601170B1 (en) | 1999-12-30 | 2003-07-29 | Clyde Riley Wallace, Jr. | Secure internet user state creation method and system with user supplied key and seeding |
| US20070198823A1 (en) * | 1999-06-30 | 2007-08-23 | Blew Edwin O | Methods for conducting server-side encryption/decryption-on-demand |
| US20110307383A1 (en) * | 2010-06-11 | 2011-12-15 | Cardinalcommerce Corporation | Method and system for secure order management system data encryption, decryption, and segmentation |
| US20120017095A1 (en) | 2010-07-19 | 2012-01-19 | Coreguard | Software Service for Encrypting and Decrypting Data |
| WO2013020178A1 (en) * | 2011-08-11 | 2013-02-14 | Cocoon Data Holdings Limited | A system and method for distributing secured data |
| WO2013020177A1 (en) * | 2011-08-11 | 2013-02-14 | Cocoon Data Holdings Limited | System and method for accessing securely stored data |
| US20150006890A1 (en) * | 2012-06-07 | 2015-01-01 | Amazon Technologies, Inc. | Virtual service provider zones |
Family Cites Families (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
| AU2001251404A1 (en) | 2000-04-06 | 2001-10-23 | Freerun Technologies, Inc. | Systems and methods for securing a web transaction between a client and a merchant using encrypted keys and cookies |
| US20020178366A1 (en) * | 2001-05-24 | 2002-11-28 | Amiran Ofir | Method for performing on behalf of a registered user an operation on data stored on a publicly accessible data access server |
| CN1310464C (zh) | 2002-09-24 | 2007-04-11 | 黎明网络有限公司 | 一种基于公开密钥体系的数据安全传输的方法及其装置 |
| US7698549B2 (en) * | 2003-08-15 | 2010-04-13 | Venafi, Inc. | Program product for unified certificate requests from certificate authorities |
| US7346773B2 (en) | 2004-01-12 | 2008-03-18 | Cisco Technology, Inc. | Enabling stateless server-based pre-shared secrets |
| JP4832744B2 (ja) * | 2004-09-29 | 2011-12-07 | コニカミノルタビジネステクノロジーズ株式会社 | 文書管理システム |
| WO2008036919A2 (en) * | 2006-09-22 | 2008-03-27 | Paymetric, Inc. | System and method for rotating data in a crypto system |
| JP2009164996A (ja) * | 2008-01-09 | 2009-07-23 | Kyocera Mita Corp | 情報処理装置 |
| JP4897782B2 (ja) * | 2008-12-27 | 2012-03-14 | キヤノンマーケティングジャパン株式会社 | 文書管理システム、文書管理方法、及びそのプログラム |
| US8335933B2 (en) | 2009-02-13 | 2012-12-18 | Microsoft Corporation | Two-party storage of encrypted sensitive information |
| JP2011027917A (ja) * | 2009-07-23 | 2011-02-10 | Lemuria Holdings Ltd | デジタル貸金庫システム及びサーバ |
| US9355389B2 (en) | 2010-12-06 | 2016-05-31 | Voltage Security, Inc. | Purchase transaction system with encrypted payment card data |
| EP2602955B1 (en) * | 2011-12-05 | 2016-03-09 | Certicom Corp. | System and Method for Mounting Encrypted Data Based on Availability of a Key on a Network |
| CN102629940A (zh) * | 2012-03-19 | 2012-08-08 | 天津书生投资有限公司 | 一种存储方法、系统和装置 |
| US8458494B1 (en) * | 2012-03-26 | 2013-06-04 | Symantec Corporation | Systems and methods for secure third-party data storage |
| US9590959B2 (en) * | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
| US10277867B2 (en) * | 2012-07-12 | 2019-04-30 | Elwha Llc | Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box |
| KR102013841B1 (ko) * | 2012-08-06 | 2019-08-23 | 삼성전자주식회사 | 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치 |
| US9137222B2 (en) | 2012-10-31 | 2015-09-15 | Vmware, Inc. | Crypto proxy for cloud storage services |
| US8997197B2 (en) * | 2012-12-12 | 2015-03-31 | Citrix Systems, Inc. | Encryption-based data access management |
| CN104239820B (zh) * | 2013-06-13 | 2017-11-03 | 普天信息技术研究院有限公司 | 一种安全存储设备 |
| US9355271B2 (en) | 2013-10-18 | 2016-05-31 | Robert Bosch Gmbh | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption |
| CN103763315B (zh) * | 2014-01-14 | 2016-12-07 | 北京航空航天大学 | 一种应用于移动设备云存储的可信数据存取控制方法 |
| US9560023B2 (en) * | 2014-08-13 | 2017-01-31 | AOL, Inc. | Systems and methods for protecting internet advertising data |
| CN104182691B (zh) * | 2014-08-22 | 2017-07-21 | 国家电网公司 | 数据保密方法及装置 |
| AU2015201536A1 (en) * | 2015-03-25 | 2016-10-13 | Cocoon Data Holdings Limited | Browser system and method |
-
2017
- 2017-01-03 EP EP17732010.8A patent/EP3394787B1/en active Active
- 2017-01-03 WO PCT/AU2017/000002 patent/WO2017106938A1/en not_active Ceased
- 2017-01-03 SG SG11201806423QA patent/SG11201806423QA/en unknown
- 2017-01-03 CN CN201780013304.3A patent/CN108701200B/zh active Active
- 2017-01-03 CN CN202311217934.6A patent/CN117494151A/zh active Pending
- 2017-01-03 CA CA3009229A patent/CA3009229C/en active Active
- 2017-01-03 US US16/066,029 patent/US11314873B2/en active Active
- 2017-01-03 AU AU2017204537A patent/AU2017204537A1/en not_active Abandoned
- 2017-01-03 JP JP2018533811A patent/JP6854529B2/ja active Active
-
2020
- 2020-09-21 AU AU2020239610A patent/AU2020239610A1/en not_active Abandoned
-
2021
- 2021-11-12 AU AU2021266356A patent/AU2021266356A1/en not_active Abandoned
-
2024
- 2024-01-05 AU AU2024200080A patent/AU2024200080A1/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070198823A1 (en) * | 1999-06-30 | 2007-08-23 | Blew Edwin O | Methods for conducting server-side encryption/decryption-on-demand |
| US6601170B1 (en) | 1999-12-30 | 2003-07-29 | Clyde Riley Wallace, Jr. | Secure internet user state creation method and system with user supplied key and seeding |
| US20110307383A1 (en) * | 2010-06-11 | 2011-12-15 | Cardinalcommerce Corporation | Method and system for secure order management system data encryption, decryption, and segmentation |
| US20120017095A1 (en) | 2010-07-19 | 2012-01-19 | Coreguard | Software Service for Encrypting and Decrypting Data |
| WO2013020178A1 (en) * | 2011-08-11 | 2013-02-14 | Cocoon Data Holdings Limited | A system and method for distributing secured data |
| WO2013020177A1 (en) * | 2011-08-11 | 2013-02-14 | Cocoon Data Holdings Limited | System and method for accessing securely stored data |
| US20150006890A1 (en) * | 2012-06-07 | 2015-01-01 | Amazon Technologies, Inc. | Virtual service provider zones |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108701200B (zh) | 2023-08-22 |
| AU2020239610A1 (en) | 2020-10-15 |
| CA3009229A1 (en) | 2017-06-29 |
| AU2021266356A1 (en) | 2021-12-09 |
| CA3009229C (en) | 2024-09-17 |
| CN108701200A (zh) | 2018-10-23 |
| CN117494151A (zh) | 2024-02-02 |
| EP3394787B1 (en) | 2025-08-27 |
| JP2019501592A (ja) | 2019-01-17 |
| EP3394787C0 (en) | 2025-08-27 |
| AU2024200080A1 (en) | 2024-01-25 |
| JP6854529B2 (ja) | 2021-04-07 |
| SG11201806423QA (en) | 2018-08-30 |
| EP3394787A1 (en) | 2018-10-31 |
| EP3394787A4 (en) | 2019-06-05 |
| AU2017204537A1 (en) | 2018-07-26 |
| US11314873B2 (en) | 2022-04-26 |
| US20190012467A1 (en) | 2019-01-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7581013B2 (ja) | 要求によって供給される鍵を用いたデータセキュリティ | |
| US20250286869A1 (en) | Systems and methods for third party data protection | |
| JP7007985B2 (ja) | 鍵を有するリソースロケーター | |
| AU2021266356A1 (en) | Improved Storage System | |
| EP2831803B1 (en) | Systems and methods for secure third-party data storage | |
| US9213853B2 (en) | Password-less login | |
| US9686251B2 (en) | Devices and techniques for controlling disclosure of sensitive information | |
| US20210167955A1 (en) | Data transmission | |
| EP2913775B1 (en) | Password recovery for mobile applications | |
| US10623400B2 (en) | Method and device for credential and data protection | |
| US10417448B2 (en) | Management of sensitive information access and use | |
| CN110022207B (zh) | 密钥管理及处理数据的方法、装置、设备和计算机可读介质 | |
| CN106411893A (zh) | 一种https服务的部署方法 | |
| WO2009002183A1 (en) | System for migrating user generated content between online communities | |
| Sanyal et al. | A multifactor secure authentication system for wireless payment | |
| WO2024026428A1 (en) | Digital identity allocation, assignment, and management | |
| HK1262670A1 (en) | Improved storage system | |
| US12341884B1 (en) | Dynamic, control-sensitive data management platform | |
| HK1262670B (zh) | 改善的存储系统 | |
| US11178115B2 (en) | System and methods for point to point encryption and tokenization | |
| CN117557260A (zh) | 虚拟货币钱包实现方法、系统和电子设备 | |
| Jerlin et al. | Secure and Efficient Data Outsourcing Protocol in Un-Trusted Cloud Environments | |
| Aboelfotoh | An ecosystem for improving the quality of personal health records |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17732010 Country of ref document: EP Kind code of ref document: A1 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| ENP | Entry into the national phase |
Ref document number: 3009229 Country of ref document: CA |
|
| ENP | Entry into the national phase |
Ref document number: 2018533811 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2017732010 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2017204537 Country of ref document: AU Date of ref document: 20170103 Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2017732010 Country of ref document: EP Effective date: 20180724 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11201806423Q Country of ref document: SG |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 201780013304.3 Country of ref document: CN |
|
| WWG | Wipo information: grant in national office |
Ref document number: 2017732010 Country of ref document: EP |