[go: up one dir, main page]

WO2023052845A3 - Protecting data using controlled corruption in computer networks - Google Patents

Protecting data using controlled corruption in computer networks Download PDF

Info

Publication number
WO2023052845A3
WO2023052845A3 PCT/IB2022/000567 IB2022000567W WO2023052845A3 WO 2023052845 A3 WO2023052845 A3 WO 2023052845A3 IB 2022000567 W IB2022000567 W IB 2022000567W WO 2023052845 A3 WO2023052845 A3 WO 2023052845A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
file
corruption
controlled
executing
Prior art date
Application number
PCT/IB2022/000567
Other languages
French (fr)
Other versions
WO2023052845A2 (en
Inventor
Devi Selva Kumar VIJAYANARAYANAN
Original Assignee
Autnhive Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/492,477 external-priority patent/US11329817B2/en
Application filed by Autnhive Corporation filed Critical Autnhive Corporation
Publication of WO2023052845A2 publication Critical patent/WO2023052845A2/en
Publication of WO2023052845A3 publication Critical patent/WO2023052845A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Retry When Errors Occur (AREA)

Abstract

The present disclosure, in some embodiments, relates to a data protection method comprising: determining a file comprising content data on a computing system; generating index information for the file; transmitting the index information to a cloud system; executing a corruption operation on the file comprising: dividing the content data of the file into a plurality of data chunks; executing a first encryption operation based on an encryption protocol, on the first data chunk; executing a second encryption operation based on the encryption protocol, on the second data chunk; generating or assigning a first name for the first data and a second name for the second data chunk; and generating a key associated with an order of the first data chunk and the second data chunk.
PCT/IB2022/000567 2021-10-01 2022-09-30 Protecting data using controlled corruption in computer networks WO2023052845A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17/492,477 US11329817B2 (en) 2017-10-19 2021-10-01 Protecting data using controlled corruption in computer networks
US17/492,477 2021-10-01

Publications (2)

Publication Number Publication Date
WO2023052845A2 WO2023052845A2 (en) 2023-04-06
WO2023052845A3 true WO2023052845A3 (en) 2023-06-01

Family

ID=85781417

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2022/000567 WO2023052845A2 (en) 2021-10-01 2022-09-30 Protecting data using controlled corruption in computer networks

Country Status (1)

Country Link
WO (1) WO2023052845A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170005788A1 (en) * 2006-12-01 2017-01-05 David Irvine Communication system and method
US20180060612A1 (en) * 2010-01-28 2018-03-01 International Business Machines Corporation Distributed storage with data obfuscation and method for use therewith
WO2019123346A1 (en) * 2017-12-22 2019-06-27 Auckland Uniservices Limited A method and system for storing data and accessing data
US10903997B2 (en) * 2017-10-19 2021-01-26 Autnhive Corporation Generating keys using controlled corruption in computer networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170005788A1 (en) * 2006-12-01 2017-01-05 David Irvine Communication system and method
US20180060612A1 (en) * 2010-01-28 2018-03-01 International Business Machines Corporation Distributed storage with data obfuscation and method for use therewith
US10903997B2 (en) * 2017-10-19 2021-01-26 Autnhive Corporation Generating keys using controlled corruption in computer networks
WO2019123346A1 (en) * 2017-12-22 2019-06-27 Auckland Uniservices Limited A method and system for storing data and accessing data

Also Published As

Publication number Publication date
WO2023052845A2 (en) 2023-04-06

Similar Documents

Publication Publication Date Title
US11153094B2 (en) Secure data deduplication with smaller hash values
US10140370B1 (en) Systems and methods for maintaining encrypted search indexes on third-party storage systems
US8762743B2 (en) Encrypting data objects to back-up
US9697228B2 (en) Secure relational file system with version control, deduplication, and error correction
US10374807B2 (en) Storing and retrieving ciphertext in data storage
EP3062261B1 (en) Community-based de-duplication for encrypted data
US8671449B1 (en) Systems and methods for identifying potential malware
CN102664928A (en) Data secure access method used for cloud storage and user terminal system
CN106131048B (en) Non-trust remote transaction file safe storage system for block chain
US8495392B1 (en) Systems and methods for securely deduplicating data owned by multiple entities
CN103530201A (en) Safety data repetition removing method and system applicable to backup system
US9749132B1 (en) System and method for secure deletion of data
CN106095525A (en) Virtual machine dynamic migration safety protection method
US7962765B2 (en) Methods and systems for tamper resistant files
CN105590064A (en) File processing method, file processing device and file server
CN103885830A (en) Data processing method used in cross-data-center live migration process of virtual machine
US9477677B1 (en) Systems and methods for parallel content-defined data chunking
Jayapandian et al. Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space
CN108304733A (en) Encryption data searching method and the data-storage system that search can be encrypted
KR20140011534A (en) Generating and verifying the alternative data in a specified format
GB2602216A (en) Opaque encryption for data deduplication
CN119109624A (en) Data transmission method, device, electronic device and storage medium
CN111914265A (en) Lightweight data security and confidentiality method for high-performance computing virtual data space
US12381575B2 (en) System and method for multilayer security using multiple codebooks
CN104283930B (en) Keyword search system for security index and method for establishing the system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22875250

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22875250

Country of ref document: EP

Kind code of ref document: A2