WO2023052845A3 - Protecting data using controlled corruption in computer networks - Google Patents
Protecting data using controlled corruption in computer networks Download PDFInfo
- Publication number
- WO2023052845A3 WO2023052845A3 PCT/IB2022/000567 IB2022000567W WO2023052845A3 WO 2023052845 A3 WO2023052845 A3 WO 2023052845A3 IB 2022000567 W IB2022000567 W IB 2022000567W WO 2023052845 A3 WO2023052845 A3 WO 2023052845A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- file
- corruption
- controlled
- executing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Retry When Errors Occur (AREA)
Abstract
The present disclosure, in some embodiments, relates to a data protection method comprising: determining a file comprising content data on a computing system; generating index information for the file; transmitting the index information to a cloud system; executing a corruption operation on the file comprising: dividing the content data of the file into a plurality of data chunks; executing a first encryption operation based on an encryption protocol, on the first data chunk; executing a second encryption operation based on the encryption protocol, on the second data chunk; generating or assigning a first name for the first data and a second name for the second data chunk; and generating a key associated with an order of the first data chunk and the second data chunk.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/492,477 US11329817B2 (en) | 2017-10-19 | 2021-10-01 | Protecting data using controlled corruption in computer networks |
US17/492,477 | 2021-10-01 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2023052845A2 WO2023052845A2 (en) | 2023-04-06 |
WO2023052845A3 true WO2023052845A3 (en) | 2023-06-01 |
Family
ID=85781417
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2022/000567 WO2023052845A2 (en) | 2021-10-01 | 2022-09-30 | Protecting data using controlled corruption in computer networks |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023052845A2 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170005788A1 (en) * | 2006-12-01 | 2017-01-05 | David Irvine | Communication system and method |
US20180060612A1 (en) * | 2010-01-28 | 2018-03-01 | International Business Machines Corporation | Distributed storage with data obfuscation and method for use therewith |
WO2019123346A1 (en) * | 2017-12-22 | 2019-06-27 | Auckland Uniservices Limited | A method and system for storing data and accessing data |
US10903997B2 (en) * | 2017-10-19 | 2021-01-26 | Autnhive Corporation | Generating keys using controlled corruption in computer networks |
-
2022
- 2022-09-30 WO PCT/IB2022/000567 patent/WO2023052845A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170005788A1 (en) * | 2006-12-01 | 2017-01-05 | David Irvine | Communication system and method |
US20180060612A1 (en) * | 2010-01-28 | 2018-03-01 | International Business Machines Corporation | Distributed storage with data obfuscation and method for use therewith |
US10903997B2 (en) * | 2017-10-19 | 2021-01-26 | Autnhive Corporation | Generating keys using controlled corruption in computer networks |
WO2019123346A1 (en) * | 2017-12-22 | 2019-06-27 | Auckland Uniservices Limited | A method and system for storing data and accessing data |
Also Published As
Publication number | Publication date |
---|---|
WO2023052845A2 (en) | 2023-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11153094B2 (en) | Secure data deduplication with smaller hash values | |
US10140370B1 (en) | Systems and methods for maintaining encrypted search indexes on third-party storage systems | |
US8762743B2 (en) | Encrypting data objects to back-up | |
US9697228B2 (en) | Secure relational file system with version control, deduplication, and error correction | |
US10374807B2 (en) | Storing and retrieving ciphertext in data storage | |
EP3062261B1 (en) | Community-based de-duplication for encrypted data | |
US8671449B1 (en) | Systems and methods for identifying potential malware | |
CN102664928A (en) | Data secure access method used for cloud storage and user terminal system | |
CN106131048B (en) | Non-trust remote transaction file safe storage system for block chain | |
US8495392B1 (en) | Systems and methods for securely deduplicating data owned by multiple entities | |
CN103530201A (en) | Safety data repetition removing method and system applicable to backup system | |
US9749132B1 (en) | System and method for secure deletion of data | |
CN106095525A (en) | Virtual machine dynamic migration safety protection method | |
US7962765B2 (en) | Methods and systems for tamper resistant files | |
CN105590064A (en) | File processing method, file processing device and file server | |
CN103885830A (en) | Data processing method used in cross-data-center live migration process of virtual machine | |
US9477677B1 (en) | Systems and methods for parallel content-defined data chunking | |
Jayapandian et al. | Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space | |
CN108304733A (en) | Encryption data searching method and the data-storage system that search can be encrypted | |
KR20140011534A (en) | Generating and verifying the alternative data in a specified format | |
GB2602216A (en) | Opaque encryption for data deduplication | |
CN119109624A (en) | Data transmission method, device, electronic device and storage medium | |
CN111914265A (en) | Lightweight data security and confidentiality method for high-performance computing virtual data space | |
US12381575B2 (en) | System and method for multilayer security using multiple codebooks | |
CN104283930B (en) | Keyword search system for security index and method for establishing the system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22875250 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22875250 Country of ref document: EP Kind code of ref document: A2 |