SECURE AND PRIVATE BACKUP STORAGE AND PROCESSING FOR TRUSTED COMPUTING AND DATA SERVICES Russian patent published in 2014 - IPC G06F21/62 

Abstract RU 2531569 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to secure and private backup storage and processing. The method includes receiving, by at least one computing device in a first region of control from at least one computing device in a second region of control, encrypted data formed from encryption of full backup data for a defined data set of the at least one computing device in the second region of control according to at least one search encryption algorithm based on cryptographic key information; receiving, by the at least one computing device in the first region of control from the at least one computing device in the second region of control, encrypted metadata formed from analysis of the full backup data and encryption of an output of the analysis based on the cryptographic key information; receiving trapdoor data enabling visible access to the encrypted data as defined by at least one cryptographic trapdoor of the trapdoor data; and maintaining synthetic full data for the defined data set based on the encrypted data, encrypted metadata and trapdoor data.

EFFECT: safer data storage.

15 cl, 42 dwg

Similar patents RU2531569C2

Title Year Author Number
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE 2016
  • Radajkin Aleksej Gennadevich
  • Sachkov Evgenij Anatolevich
RU2635269C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
METHOD AND SYSTEM FOR INTERACTION OF DEVICES OF THE INTERNET OF THINGS (IOT) 2018
  • Gurin Oleg Dmitrievich
RU2695487C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
MULTI-FACTOR CONTENT PROTECTION 2008
  • Malaviarachchi Rushmi U.
  • Kamat Mehjer
  • Kross Dehvid B.
RU2501081C2
METHOD OF PROVIDING CRYPTOGRAPHIC PROTECTION OF INFORMATION IN A NETWORK INFORMATION SYSTEM 2019
  • Erygin Aleksandr Vitalevich
RU2706176C1
AGENT FOR SAFE CLOUD SERVICE PROVISION AND DEVICE OF SECURITY MARKERS FOR SAFE CLOUD SERVICE 2015
  • Jae Sik Choi
  • Won-Jang Son
  • Changhoon Kwon
RU2660604C2
METHOD OF ORGANIZING VOICE COMMUNICATION WITH END-TO-END ENCRYPTION AND USER AUTHENTICATION 2023
  • Shakirov Rinat Faritovich
  • Koreneva Alisa Mikhailovna
  • Zadorozhnyi Dmitrii Igorevich
  • Zatonskaia Anastasiia Alekseevna
  • Buchneva Anna Olegovna
  • Dednev Maksim Aleksandrovich
RU2819563C1
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2

RU 2 531 569 C2

Authors

Auradkar Rakhul V.

D`Suza Roj Piter

Dates

2014-10-20Published

2010-06-10Filed