[go: up one dir, main page]

AU2001295208A1 - Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys - Google Patents

Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys

Info

Publication number
AU2001295208A1
AU2001295208A1 AU2001295208A AU9520801A AU2001295208A1 AU 2001295208 A1 AU2001295208 A1 AU 2001295208A1 AU 2001295208 A AU2001295208 A AU 2001295208A AU 9520801 A AU9520801 A AU 9520801A AU 2001295208 A1 AU2001295208 A1 AU 2001295208A1
Authority
AU
Australia
Prior art keywords
encryption
methods
keys
encryptable
objects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001295208A
Inventor
William J. Bolosky
John R. Douceur
Marvin M. Theimer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of AU2001295208A1 publication Critical patent/AU2001295208A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99955Archiving or backup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
AU2001295208A 2000-05-05 2001-04-05 Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys Abandoned AU2001295208A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/565,821 US6983365B1 (en) 2000-05-05 2000-05-05 Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
US09/565,821 2000-05-05
PCT/US2001/040462 WO2001086396A2 (en) 2000-05-05 2001-04-05 Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys

Publications (1)

Publication Number Publication Date
AU2001295208A1 true AU2001295208A1 (en) 2001-11-20

Family

ID=24260237

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001295208A Abandoned AU2001295208A1 (en) 2000-05-05 2001-04-05 Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys

Country Status (6)

Country Link
US (6) US6983365B1 (en)
EP (1) EP1299971B1 (en)
AT (1) ATE487297T1 (en)
AU (1) AU2001295208A1 (en)
DE (1) DE60143395D1 (en)
WO (1) WO2001086396A2 (en)

Families Citing this family (128)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7770230B2 (en) * 2002-04-22 2010-08-03 Arvato Digital Services Canada, Inc. System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
US7581077B2 (en) 1997-10-30 2009-08-25 Commvault Systems, Inc. Method and system for transferring data in a storage operation
US6418478B1 (en) * 1997-10-30 2002-07-09 Commvault Systems, Inc. Pipelined high speed data transfer mechanism
EP1466250A2 (en) * 2001-10-12 2004-10-13 Koninklijke Philips Electronics N.V. Apparatus and method for reading or writing user data
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US7562232B2 (en) 2001-12-12 2009-07-14 Patrick Zuili System and method for providing manageability to security information for secured items
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7783765B2 (en) 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7478418B2 (en) 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7130970B2 (en) 2002-09-09 2006-10-31 Commvault Systems, Inc. Dynamic storage device pooling in a computer system
US7512810B1 (en) 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
GB2409553B (en) 2002-09-16 2007-04-04 Commvault Systems Inc System and method for optimizing storage operations
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7577838B1 (en) 2002-12-20 2009-08-18 Alain Rossmann Hybrid systems for securing digital assets
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
WO2004090788A2 (en) * 2003-04-03 2004-10-21 Commvault Systems, Inc. System and method for dynamically performing storage operations in a computer network
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
WO2004114099A1 (en) 2003-06-25 2004-12-29 Nokia Corporation Digital rights management
GB0315154D0 (en) * 2003-06-28 2003-08-06 Ibm Improvements to hypertext integrity
US7555558B1 (en) 2003-08-15 2009-06-30 Michael Frederick Kenrich Method and system for fault-tolerant transfer of files across a network
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US7315923B2 (en) * 2003-11-13 2008-01-01 Commvault Systems, Inc. System and method for combining data streams in pipelined storage operations in a storage network
US7395437B2 (en) * 2004-01-05 2008-07-01 International Business Machines Corporation System and method for fast querying of encrypted databases
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US9535624B1 (en) * 2004-09-13 2017-01-03 EMC IP Holding Company LLC Duplicate management
JP4541811B2 (en) * 2004-09-13 2010-09-08 キヤノン株式会社 Image processing apparatus, image processing method, and program
US7802096B1 (en) * 2004-10-19 2010-09-21 Cisco Technology, Inc. Fallback key retrieval
US7814317B1 (en) * 2004-10-19 2010-10-12 Cisco Technology, Inc. Multiple password documents
US20060224846A1 (en) 2004-11-05 2006-10-05 Amarendran Arun P System and method to support single instance storage operations
US7490207B2 (en) * 2004-11-08 2009-02-10 Commvault Systems, Inc. System and method for performing auxillary storage operations
US20070174362A1 (en) * 2006-01-18 2007-07-26 Duc Pham System and methods for secure digital data archiving and access auditing
US8667273B1 (en) 2006-05-30 2014-03-04 Leif Olov Billstrom Intelligent file encryption and secure backup system
US8099605B1 (en) 2006-06-05 2012-01-17 InventSec AB Intelligent storage device for backup system
US7624117B2 (en) * 2006-06-12 2009-11-24 Sap Ag Complex data assembly identifier thesaurus
US7801308B1 (en) 2006-07-17 2010-09-21 Integrated Device Technology, Inc. Secure key encoding for content protection
US8023646B2 (en) * 2006-11-08 2011-09-20 Voltage Security, Inc. Identity-based-encryption extensions formed using multiple instances of an identity based encryption scheme
US8312323B2 (en) * 2006-12-22 2012-11-13 Commvault Systems, Inc. Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved
US7730106B2 (en) * 2006-12-28 2010-06-01 Teradata Us, Inc. Compression of encrypted data in database management systems
US8352692B1 (en) 2007-03-30 2013-01-08 Symantec Corporation Utilizing peer-to-peer services with single instance storage techniques
US8209540B2 (en) * 2007-06-28 2012-06-26 Apple Inc. Incremental secure backup and restore of user settings and data
US8199911B1 (en) 2008-03-31 2012-06-12 Symantec Operating Corporation Secure encryption algorithm for data deduplication on untrusted storage
US9395929B2 (en) * 2008-04-25 2016-07-19 Netapp, Inc. Network storage server with integrated encryption, compression and deduplication capability
US20090319772A1 (en) * 2008-04-25 2009-12-24 Netapp, Inc. In-line content based security for data at rest in a network storage system
US8117464B1 (en) * 2008-04-30 2012-02-14 Netapp, Inc. Sub-volume level security for deduplicated data
US8589697B2 (en) 2008-04-30 2013-11-19 Netapp, Inc. Discarding sensitive data from persistent point-in-time image
US8397084B2 (en) * 2008-06-12 2013-03-12 Microsoft Corporation Single instance storage of encrypted data
US8281143B1 (en) 2008-09-29 2012-10-02 Symantec Operating Corporation Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US9454444B1 (en) 2009-03-19 2016-09-27 Veritas Technologies Llc Using location tracking of cluster nodes to avoid single points of failure
US8572758B1 (en) 2009-03-30 2013-10-29 Symantec Corporation DLP-enforced loss scanning, sequestering, and content indexing
US8438630B1 (en) 2009-03-30 2013-05-07 Symantec Corporation Data loss prevention system employing encryption detection
US8479304B1 (en) 2009-03-31 2013-07-02 Symantec Corporation Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US8812874B1 (en) 2009-03-31 2014-08-19 Symantec Corporation Content deduplication in enterprise rights management
US10148433B1 (en) 2009-10-14 2018-12-04 Digitalpersona, Inc. Private key/public key resource protection scheme
US8311964B1 (en) 2009-11-12 2012-11-13 Symantec Corporation Progressive sampling for deduplication indexing
US8458515B1 (en) 2009-11-16 2013-06-04 Symantec Corporation Raid5 recovery in a high availability object based file system
US8401185B1 (en) * 2010-02-01 2013-03-19 Symantec Corporation Systems and methods for securely deduplicating data owned by multiple entities
WO2011103561A2 (en) * 2010-02-22 2011-08-25 Lockify, Inc. Encryption system using web browsers and untrusted web servers
US8473463B1 (en) 2010-03-02 2013-06-25 Symantec Corporation Method of avoiding duplicate backups in a computing system
US8370315B1 (en) 2010-05-28 2013-02-05 Symantec Corporation System and method for high performance deduplication indexing
US8983952B1 (en) 2010-07-29 2015-03-17 Symantec Corporation System and method for partitioning backup data streams in a deduplication based storage system
US8756197B1 (en) 2010-08-13 2014-06-17 Symantec Corporation Generating data set views for backup restoration
US8291170B1 (en) 2010-08-19 2012-10-16 Symantec Corporation System and method for event driven backup data storage
US8495392B1 (en) 2010-09-02 2013-07-23 Symantec Corporation Systems and methods for securely deduplicating data owned by multiple entities
US8392376B2 (en) 2010-09-03 2013-03-05 Symantec Corporation System and method for scalable reference management in a deduplication based storage system
US8862876B2 (en) * 2010-11-09 2014-10-14 International Business Machines Corporation Method and system for deleting data
US8396841B1 (en) 2010-11-30 2013-03-12 Symantec Corporation Method and system of multi-level and multi-mode cloud-based deduplication
US8495323B1 (en) 2010-12-07 2013-07-23 Symantec Corporation Method and system of providing exclusive and secure access to virtual storage objects in a virtual machine cluster
US8392384B1 (en) 2010-12-10 2013-03-05 Symantec Corporation Method and system of deduplication-based fingerprint index caching
WO2012093216A1 (en) * 2011-01-07 2012-07-12 Thomson Licensing Device and method for online storage, transmission device and method, and receiving device and method
US9064133B2 (en) * 2011-03-29 2015-06-23 Kaseya Limited Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9054864B2 (en) 2011-03-29 2015-06-09 Kaseya Limited Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US8527472B2 (en) 2011-03-29 2013-09-03 Kaseya International Limited Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9253166B2 (en) 2011-05-14 2016-02-02 Bitcasa, Inc. Cloud file system
US20120303533A1 (en) 2011-05-26 2012-11-29 Michael Collins Pinkus System and method for securing, distributing and enforcing for-hire vehicle operating parameters
US8930307B2 (en) 2011-09-30 2015-01-06 Pure Storage, Inc. Method for removing duplicate data from a storage array
US8589640B2 (en) 2011-10-14 2013-11-19 Pure Storage, Inc. Method for maintaining multiple fingerprint tables in a deduplicating storage system
CN102629940A (en) * 2012-03-19 2012-08-08 天津书生投资有限公司 Storage method, system and device
US20130253999A1 (en) 2012-03-22 2013-09-26 Frias Transportation Infrastructure Llc Transaction and communication system and method for vendors and promoters
CN104335219B (en) * 2012-03-30 2018-06-05 爱迪德技术有限公司 Use variable-dependent coding to protect accessible systems
US10379988B2 (en) 2012-12-21 2019-08-13 Commvault Systems, Inc. Systems and methods for performance monitoring
US10275397B2 (en) 2013-02-22 2019-04-30 Veritas Technologies Llc Deduplication storage system with efficient reference updating and space reclamation
RU2580036C2 (en) 2013-06-28 2016-04-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of making flexible convolution for malware detection
US9792063B2 (en) 2014-01-15 2017-10-17 Intel Corporation Deduplication-based data security
US9575680B1 (en) 2014-08-22 2017-02-21 Veritas Technologies Llc Deduplication rehydration
US10423495B1 (en) 2014-09-08 2019-09-24 Veritas Technologies Llc Deduplication grouping
US9904481B2 (en) 2015-01-23 2018-02-27 Commvault Systems, Inc. Scalable auxiliary copy processing in a storage management system using media agent resources
US9898213B2 (en) 2015-01-23 2018-02-20 Commvault Systems, Inc. Scalable auxiliary copy processing using media agent resources
US20160292447A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Multi-layered encryption
IL248306B (en) * 2016-10-10 2019-12-31 Verint Systems Ltd System and method for generating data sets for learning to identify user actions
US11010261B2 (en) 2017-03-31 2021-05-18 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US11507612B2 (en) * 2017-09-15 2022-11-22 Dg Ip Llc Document elimination for compact and secure storage and management thereof
US11314692B1 (en) 2017-10-18 2022-04-26 Comake, Inc. Workflow relationship management and contextualization
US11409820B1 (en) 2017-10-18 2022-08-09 Comake, Inc. Workflow relationship management and contextualization
US11157505B2 (en) 2017-10-18 2021-10-26 Comake, Inc. Dynamic presentation of searchable contextual actions and data
US10970349B1 (en) 2017-10-18 2021-04-06 Comake, Inc. Workflow relationship management and contextualization
US10762060B1 (en) * 2017-10-18 2020-09-01 Comake, Inc. Electronic file management
US10536276B2 (en) * 2017-10-30 2020-01-14 International Business Machines Corporation Associating identical fields encrypted with different keys
US11206128B2 (en) 2019-03-08 2021-12-21 International Business Machines Corporation Secure paging with page change detection
US11403409B2 (en) 2019-03-08 2022-08-02 International Business Machines Corporation Program interruptions for page importing/exporting
US11347869B2 (en) 2019-03-08 2022-05-31 International Business Machines Corporation Secure interface control high-level page management
EP3942740A1 (en) 2019-03-20 2022-01-26 Verint Systems Ltd. System and method for de-anonymizing actions and messages on networks
US11693841B2 (en) 2020-01-03 2023-07-04 International Business Machines Corporation Hash for structural data with same data meaning
JP6865899B1 (en) * 2020-02-05 2021-04-28 三菱電機株式会社 Cryptographic system, encrypted data conversion device and conversion program
US11329803B2 (en) * 2020-09-29 2022-05-10 Amazon Technologies, Inc. Redundancy controls in convergent encryption using dynamic salt values
US11917072B2 (en) 2020-12-03 2024-02-27 International Business Machines Corporation Implementing opportunistic authentication of encrypted data
US11695541B2 (en) 2020-12-07 2023-07-04 International Business Machines Corporation Implementing resilient deterministic encryption
CN112685753B (en) * 2020-12-25 2023-11-28 上海焜耀网络科技有限公司 Method and equipment for storing encrypted data
US11271716B1 (en) 2021-01-28 2022-03-08 Emtruth, Inc. Blockchain-based data management of distributed binary objects
CN113438210B (en) * 2021-06-04 2023-04-07 上海焜耀网络科技有限公司 Data transmission processing method and device and electronic equipment
US11593223B1 (en) 2021-09-02 2023-02-28 Commvault Systems, Inc. Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants
US12277097B2 (en) 2023-07-20 2025-04-15 International Business Machines Corporation Using ciphertext to deduplicate data using wide-block encryption

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5008936A (en) * 1988-12-09 1991-04-16 The Exchange System Limited Partnership Backup/restore technique in a microcomputer-based encryption system
US5073935A (en) 1990-12-17 1991-12-17 Jose Pastor Method for secure communication
US5778395A (en) * 1995-10-23 1998-07-07 Stac, Inc. System for backing up files from disk volumes on multiple nodes of a computer network
US5794254A (en) * 1996-12-03 1998-08-11 Fairbanks Systems Group Incremental computer file backup using a two-step comparison of first two characters in the block and a signature with pre-stored character and signature sets
US5940507A (en) * 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
US6366988B1 (en) * 1997-07-18 2002-04-02 Storactive, Inc. Systems and methods for electronic data storage management
US6405315B1 (en) * 1997-09-11 2002-06-11 International Business Machines Corporation Decentralized remotely encrypted file system
US6574657B1 (en) * 1999-05-03 2003-06-03 Symantec Corporation Methods and apparatuses for file synchronization and updating using a signature list

Also Published As

Publication number Publication date
US20040221160A1 (en) 2004-11-04
DE60143395D1 (en) 2010-12-16
EP1299971B1 (en) 2010-11-03
US20040215962A1 (en) 2004-10-28
WO2001086396A3 (en) 2003-01-30
US7266689B2 (en) 2007-09-04
ATE487297T1 (en) 2010-11-15
US20040221159A1 (en) 2004-11-04
US20050235146A1 (en) 2005-10-20
WO2001086396A2 (en) 2001-11-15
US7574598B2 (en) 2009-08-11
US7437555B2 (en) 2008-10-14
US7159110B2 (en) 2007-01-02
US20050229012A1 (en) 2005-10-13
US6983365B1 (en) 2006-01-03
US7779253B2 (en) 2010-08-17
EP1299971A2 (en) 2003-04-09

Similar Documents

Publication Publication Date Title
AU2001295208A1 (en) Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
WO2001078298A8 (en) Information processing system and method
MXPA02011091A (en) Receiving device for securely storing a content item, and playback device.
WO2001056221A3 (en) Block encryption method and schemes for data confidentiality and integrity protection
AU2696497A (en) Ciphering and deciphering of multimedia data
CA2241745A1 (en) Method and apparatus for controlling access to encrypted data files in a computer system
GB2369469B (en) Secure file transfer method and system
WO1998047259A3 (en) File encryption method and system
EP1251423A3 (en) Access control system
WO2002035314A3 (en) Method and system for sharing anonymous user information
EP0695997A3 (en) Methods for providing secure access to shared information
WO2001076130A3 (en) Authentication method and schemes for data integrity protection
CA2360785A1 (en) Multiple level public key hierarchy for performance and high security
NO914815D0 (en) PROCEDURE FOR TRANSFER OF DATA, AN ELECTRONIC DOCUMENT OR LIKE, A SYSTEM FOR TRANSMISSION OF DATA, AN ELECTRONIC DOCUMENT OR SIMILAR AND A CARD FOR USE IN ACCORDANCE WITH THE PROCEDURE
MXPA02009771A (en) Authentication of data transmitted in a digital transmission system.
MX2008001850A (en) Protecting digital media of various content types.
WO2007142615A3 (en) System and method for intelligence based security
IL164071A0 (en) Use of isogenies for design of cryptosystems
TNSN07055A1 (en) Permutation data transform to enhance security
WO1997005720A3 (en) Cryptographic system with concealed work factor
WO2001046782A3 (en) Method of pre-releasing encrypted digital data
TW358190B (en) Files management system
EP1600869A4 (en) Content processing terminal, copy right management system, and method thereof
EP1223496A3 (en) Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content
AU3771900A (en) Associating content with households using smart cards