[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

IN2013CH05992A - - Google Patents

Download PDF

Info

Publication number
IN2013CH05992A
IN2013CH05992A IN5992CH2013A IN2013CH05992A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A IN 5992CH2013 A IN5992CH2013 A IN 5992CH2013A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A
Authority
IN
India
Prior art keywords
data
unconnected
sentinel
trusted device
terminal
Prior art date
Application number
Inventor
Saxena Ashutosh
Singh Chauhan Nitin
R Sravan
Original Assignee
Infosys Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infosys Ltd filed Critical Infosys Ltd
Priority to IN5992CH2013 priority Critical patent/IN2013CH05992A/en
Priority to US14/561,992 priority patent/US9641617B2/en
Publication of IN2013CH05992A publication Critical patent/IN2013CH05992A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results. REF FIG: 1
IN5992CH2013 2013-12-20 2013-12-20 IN2013CH05992A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20
US14/561,992 US9641617B2 (en) 2013-12-20 2014-12-05 System and method for verifying integrity of cloud data using unconnected trusted device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20

Publications (1)

Publication Number Publication Date
IN2013CH05992A true IN2013CH05992A (en) 2015-06-26

Family

ID=53401384

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20

Country Status (2)

Country Link
US (1) US9641617B2 (en)
IN (1) IN2013CH05992A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234504A (en) * 2018-01-12 2018-06-29 安徽大学 Identity-based proxy data integrity detection method in cloud storage
GB2574458A (en) * 2018-06-07 2019-12-11 Gbr14 Ltd Methods and Systems For Secure Data Transmission
CN113472547B (en) * 2021-09-06 2021-11-16 湖南和信安华区块链科技有限公司 Safety monitoring system based on block chain

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2998100A (en) 1999-02-18 2000-09-04 Sun Microsystems, Inc. Data authentication system employing encrypted integrity blocks
AU6104800A (en) * 1999-07-16 2001-02-05 Intertrust Technologies Corp. Trusted storage systems and methods
US8943551B2 (en) 2008-08-14 2015-01-27 Microsoft Corporation Cloud-based device information storage
US9165154B2 (en) 2009-02-16 2015-10-20 Microsoft Technology Licensing, Llc Trusted cloud computing and services framework
US8601259B2 (en) 2009-04-20 2013-12-03 Cleversafe, Inc. Securing data in a dispersed storage network using security sentinel value
US10104045B2 (en) * 2009-04-20 2018-10-16 International Business Machines Corporation Verifying data security in a dispersed storage network
US20100306076A1 (en) 2009-05-29 2010-12-02 Ebay Inc. Trusted Integrity Manager (TIM)
US20100333116A1 (en) 2009-06-30 2010-12-30 Anand Prahlad Cloud gateway system for managing data storage to cloud storage sites
KR101263217B1 (en) 2009-10-15 2013-05-10 한국전자통신연구원 Mobile terminal for providing mobile cloud service and operating method of the same
US9537650B2 (en) 2009-12-15 2017-01-03 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition
US8843614B2 (en) 2009-12-21 2014-09-23 Electronics And Telecommunications Research Institute Apparatus and method for distributing cloud computing resources using mobile devices
US8452932B2 (en) 2010-01-06 2013-05-28 Storsimple, Inc. System and method for efficiently creating off-site data volume back-ups
US8683119B2 (en) 2010-03-15 2014-03-25 Cleversafe, Inc. Access control in a dispersed storage network
US8694467B2 (en) 2010-03-31 2014-04-08 Xerox Corporation Random number based data integrity verification method and system for distributed cloud storage
US8452957B2 (en) 2010-04-27 2013-05-28 Telefonaktiebolaget L M Ericsson (Publ) Method and nodes for providing secure access to cloud computing for mobile users
CA2808124A1 (en) 2010-08-12 2012-02-16 Don Martin Systems and methods for secure remote storage of data
US9171162B2 (en) * 2011-03-29 2015-10-27 Microsoft Technology Licensing, Llc Random file request for software attestation
US8595818B2 (en) * 2011-06-01 2013-11-26 Raytheon Bbn Technologies Corp. Systems and methods for decoy routing and covert channel bonding
JP5853507B2 (en) * 2011-09-05 2016-02-09 ソニー株式会社 Information processing apparatus, information processing system, information processing method, and program
US9588756B2 (en) * 2012-03-22 2017-03-07 Irdeto B.V. Updating software components in a program
US20150288703A1 (en) * 2012-10-31 2015-10-08 Hitachi, Ltd. Data possession verification system and method
GB2505533B (en) * 2012-12-14 2014-07-09 F Secure Corp Security method and apparatus
US9253171B2 (en) * 2013-06-20 2016-02-02 Raytheon Cyber Products, Llc Distributed network encryption key generation

Also Published As

Publication number Publication date
US9641617B2 (en) 2017-05-02
US20150180835A1 (en) 2015-06-25

Similar Documents

Publication Publication Date Title
ZA201904157B (en) Certificate verifying method, device, computer device and storage medium
TW201614501A (en) Systems and methods for segmenting data structures in a memory system
SG2013042429A (en) Method for receiving an electronic receipt of an electronic payment transaction into a mobile device
EP3460793A4 (en) ELECTRONIC DEVICE, IDENTITY VERIFICATION METHOD AND SYSTEM, AND COMPUTER READABLE STORAGE MEDIUM
GB2556850A (en) Sequentially overlaying media content
SG10201709367UA (en) System of enclaves
EP2598996A4 (en) DEVICE, SYSTEM AND METHOD FOR CONDITIONAL STORAGE OPERATIONS ON NON-VOLATILE STORAGE
MX2016000883A (en) Media distribution system with manifest-based entitlement enforcement.
EP4270273A3 (en) Geo-location based event gallery
MX2016011979A (en) Media clip creation and distribution systems, apparatus, and methods.
MX2018009876A (en) Media encapsulating and decapsulating.
MX2015009172A (en) Systems and methods for identifying and reporting application and file vulnerabilities.
WO2014105357A3 (en) Systems and methods for data entry in a non-destructive testing system
SG10201810140QA (en) Remote server encrypted data provisioning system and methods
MY177409A (en) Method and system for verifying an account operation
MX353611B (en) Systems and methods to initiate a verification test within a flow meter via a flow computer.
MX2017003731A (en) Systems and methods for identifying mobile devices.
EP3722973A4 (en) DATA PROCESSING METHOD AND DEVICE FOR DISTRIBUTED DATABASE, STORAGE MEDIUM AND ELECTRONIC DEVICE
WO2014120410A3 (en) Landmark based positioning with verbal input
EP3200484A4 (en) Indication information determining and processing methods and devices, request message processing method and device, and computer storage medium
MY176870A (en) Process system management system, server apparatus, management program, and management method
MX360345B (en) Systems and methods for determining amount of liquid and gaseous fuel.
BR112016015416A2 (en) DEVICE, METHOD, AND SYSTEM FOR GENERATION OF A DIGITAL SIGNATURE
MX2016016009A (en) Systems and methods for a credential including multiple access privileges.
GB2534732A (en) Multivariate testing of mobile applications