IN2013CH05992A - - Google Patents
Download PDFInfo
- Publication number
- IN2013CH05992A IN2013CH05992A IN5992CH2013A IN2013CH05992A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A IN 5992CH2013 A IN5992CH2013 A IN 5992CH2013A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A
- Authority
- IN
- India
- Prior art keywords
- data
- unconnected
- sentinel
- trusted device
- terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results. REF FIG: 1
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN5992CH2013 IN2013CH05992A (en) | 2013-12-20 | 2013-12-20 | |
US14/561,992 US9641617B2 (en) | 2013-12-20 | 2014-12-05 | System and method for verifying integrity of cloud data using unconnected trusted device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN5992CH2013 IN2013CH05992A (en) | 2013-12-20 | 2013-12-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2013CH05992A true IN2013CH05992A (en) | 2015-06-26 |
Family
ID=53401384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN5992CH2013 IN2013CH05992A (en) | 2013-12-20 | 2013-12-20 |
Country Status (2)
Country | Link |
---|---|
US (1) | US9641617B2 (en) |
IN (1) | IN2013CH05992A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234504A (en) * | 2018-01-12 | 2018-06-29 | 安徽大学 | Identity-based proxy data integrity detection method in cloud storage |
GB2574458A (en) * | 2018-06-07 | 2019-12-11 | Gbr14 Ltd | Methods and Systems For Secure Data Transmission |
CN113472547B (en) * | 2021-09-06 | 2021-11-16 | 湖南和信安华区块链科技有限公司 | Safety monitoring system based on block chain |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2998100A (en) | 1999-02-18 | 2000-09-04 | Sun Microsystems, Inc. | Data authentication system employing encrypted integrity blocks |
AU6104800A (en) * | 1999-07-16 | 2001-02-05 | Intertrust Technologies Corp. | Trusted storage systems and methods |
US8943551B2 (en) | 2008-08-14 | 2015-01-27 | Microsoft Corporation | Cloud-based device information storage |
US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
US8601259B2 (en) | 2009-04-20 | 2013-12-03 | Cleversafe, Inc. | Securing data in a dispersed storage network using security sentinel value |
US10104045B2 (en) * | 2009-04-20 | 2018-10-16 | International Business Machines Corporation | Verifying data security in a dispersed storage network |
US20100306076A1 (en) | 2009-05-29 | 2010-12-02 | Ebay Inc. | Trusted Integrity Manager (TIM) |
US20100333116A1 (en) | 2009-06-30 | 2010-12-30 | Anand Prahlad | Cloud gateway system for managing data storage to cloud storage sites |
KR101263217B1 (en) | 2009-10-15 | 2013-05-10 | 한국전자통신연구원 | Mobile terminal for providing mobile cloud service and operating method of the same |
US9537650B2 (en) | 2009-12-15 | 2017-01-03 | Microsoft Technology Licensing, Llc | Verifiable trust for data through wrapper composition |
US8843614B2 (en) | 2009-12-21 | 2014-09-23 | Electronics And Telecommunications Research Institute | Apparatus and method for distributing cloud computing resources using mobile devices |
US8452932B2 (en) | 2010-01-06 | 2013-05-28 | Storsimple, Inc. | System and method for efficiently creating off-site data volume back-ups |
US8683119B2 (en) | 2010-03-15 | 2014-03-25 | Cleversafe, Inc. | Access control in a dispersed storage network |
US8694467B2 (en) | 2010-03-31 | 2014-04-08 | Xerox Corporation | Random number based data integrity verification method and system for distributed cloud storage |
US8452957B2 (en) | 2010-04-27 | 2013-05-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and nodes for providing secure access to cloud computing for mobile users |
CA2808124A1 (en) | 2010-08-12 | 2012-02-16 | Don Martin | Systems and methods for secure remote storage of data |
US9171162B2 (en) * | 2011-03-29 | 2015-10-27 | Microsoft Technology Licensing, Llc | Random file request for software attestation |
US8595818B2 (en) * | 2011-06-01 | 2013-11-26 | Raytheon Bbn Technologies Corp. | Systems and methods for decoy routing and covert channel bonding |
JP5853507B2 (en) * | 2011-09-05 | 2016-02-09 | ソニー株式会社 | Information processing apparatus, information processing system, information processing method, and program |
US9588756B2 (en) * | 2012-03-22 | 2017-03-07 | Irdeto B.V. | Updating software components in a program |
US20150288703A1 (en) * | 2012-10-31 | 2015-10-08 | Hitachi, Ltd. | Data possession verification system and method |
GB2505533B (en) * | 2012-12-14 | 2014-07-09 | F Secure Corp | Security method and apparatus |
US9253171B2 (en) * | 2013-06-20 | 2016-02-02 | Raytheon Cyber Products, Llc | Distributed network encryption key generation |
-
2013
- 2013-12-20 IN IN5992CH2013 patent/IN2013CH05992A/en unknown
-
2014
- 2014-12-05 US US14/561,992 patent/US9641617B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9641617B2 (en) | 2017-05-02 |
US20150180835A1 (en) | 2015-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA201904157B (en) | Certificate verifying method, device, computer device and storage medium | |
TW201614501A (en) | Systems and methods for segmenting data structures in a memory system | |
SG2013042429A (en) | Method for receiving an electronic receipt of an electronic payment transaction into a mobile device | |
EP3460793A4 (en) | ELECTRONIC DEVICE, IDENTITY VERIFICATION METHOD AND SYSTEM, AND COMPUTER READABLE STORAGE MEDIUM | |
GB2556850A (en) | Sequentially overlaying media content | |
SG10201709367UA (en) | System of enclaves | |
EP2598996A4 (en) | DEVICE, SYSTEM AND METHOD FOR CONDITIONAL STORAGE OPERATIONS ON NON-VOLATILE STORAGE | |
MX2016000883A (en) | Media distribution system with manifest-based entitlement enforcement. | |
EP4270273A3 (en) | Geo-location based event gallery | |
MX2016011979A (en) | Media clip creation and distribution systems, apparatus, and methods. | |
MX2018009876A (en) | Media encapsulating and decapsulating. | |
MX2015009172A (en) | Systems and methods for identifying and reporting application and file vulnerabilities. | |
WO2014105357A3 (en) | Systems and methods for data entry in a non-destructive testing system | |
SG10201810140QA (en) | Remote server encrypted data provisioning system and methods | |
MY177409A (en) | Method and system for verifying an account operation | |
MX353611B (en) | Systems and methods to initiate a verification test within a flow meter via a flow computer. | |
MX2017003731A (en) | Systems and methods for identifying mobile devices. | |
EP3722973A4 (en) | DATA PROCESSING METHOD AND DEVICE FOR DISTRIBUTED DATABASE, STORAGE MEDIUM AND ELECTRONIC DEVICE | |
WO2014120410A3 (en) | Landmark based positioning with verbal input | |
EP3200484A4 (en) | Indication information determining and processing methods and devices, request message processing method and device, and computer storage medium | |
MY176870A (en) | Process system management system, server apparatus, management program, and management method | |
MX360345B (en) | Systems and methods for determining amount of liquid and gaseous fuel. | |
BR112016015416A2 (en) | DEVICE, METHOD, AND SYSTEM FOR GENERATION OF A DIGITAL SIGNATURE | |
MX2016016009A (en) | Systems and methods for a credential including multiple access privileges. | |
GB2534732A (en) | Multivariate testing of mobile applications |