Systems and methods of secure data exchange

A secure exchange server is hosted by an intermediate business entity. A user login data authentication procedure allows users to access the secure exchange server through a client computing device. Communications between the secure exchange server and the users is through a communications network,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Peter Wenzel, Clement Cazalot, Kevin L. McCarthy, John William Giudice, Jonathan Gorin, Salil J. Darji, Christopher Todd Ford, Cole Parker Mercer, Mayank Choudhary, Paul Tearnen, Kiran Kumar Tadakamalla, Anupam Miharia
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Peter Wenzel
Clement Cazalot
Kevin L. McCarthy
John William Giudice
Jonathan Gorin
Salil J. Darji
Christopher Todd Ford
Cole Parker Mercer
Mayank Choudhary
Paul Tearnen
Kiran Kumar Tadakamalla
Anupam Miharia
description A secure exchange server is hosted by an intermediate business entity. A user login data authentication procedure allows users to access the secure exchange server through a client computing device. Communications between the secure exchange server and the users is through a communications network, wherein the users comprises a user of a second business entity. The secure exchange server provides a data chunking facility to receive and segment computer data content transmitted from a client computing device. The received computer data content is stored as a plurality of encrypted computer data content segments. Computer data content is received from the user of the second business entity and the data content is segmented and each computer data content segment is separately encrypted to form a plurality of encrypted computer data content segments. The secure exchange server may preferably store the segments using a mapping facility to store the memory location for each segment. The aim is to allow secure collaborative working between users that may be from different business entities.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2570600A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2570600A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2570600A3</originalsourceid><addsrcrecordid>eNrjZNAOriwuSc0tVkjMS1HITS3JyE8pVshPUyhOTS4tSlVISSxJVEitSM5IzEtP5WFgTUvMKU7lhdLcDPJuriHOHrqpBfnxqcUFicmpeakl8e5ORqbmBmYGBo7GhFUAAKoLKD4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Systems and methods of secure data exchange</title><source>esp@cenet</source><creator>Peter Wenzel ; Clement Cazalot ; Kevin L. McCarthy ; John William Giudice ; Jonathan Gorin ; Salil J. Darji ; Christopher Todd Ford ; Cole Parker Mercer ; Mayank Choudhary ; Paul Tearnen ; Kiran Kumar Tadakamalla ; Anupam Miharia</creator><creatorcontrib>Peter Wenzel ; Clement Cazalot ; Kevin L. McCarthy ; John William Giudice ; Jonathan Gorin ; Salil J. Darji ; Christopher Todd Ford ; Cole Parker Mercer ; Mayank Choudhary ; Paul Tearnen ; Kiran Kumar Tadakamalla ; Anupam Miharia</creatorcontrib><description>A secure exchange server is hosted by an intermediate business entity. A user login data authentication procedure allows users to access the secure exchange server through a client computing device. Communications between the secure exchange server and the users is through a communications network, wherein the users comprises a user of a second business entity. The secure exchange server provides a data chunking facility to receive and segment computer data content transmitted from a client computing device. The received computer data content is stored as a plurality of encrypted computer data content segments. Computer data content is received from the user of the second business entity and the data content is segmented and each computer data content segment is separately encrypted to form a plurality of encrypted computer data content segments. The secure exchange server may preferably store the segments using a mapping facility to store the memory location for each segment. The aim is to allow secure collaborative working between users that may be from different business entities.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190731&amp;DB=EPODOC&amp;CC=GB&amp;NR=2570600A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190731&amp;DB=EPODOC&amp;CC=GB&amp;NR=2570600A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Peter Wenzel</creatorcontrib><creatorcontrib>Clement Cazalot</creatorcontrib><creatorcontrib>Kevin L. McCarthy</creatorcontrib><creatorcontrib>John William Giudice</creatorcontrib><creatorcontrib>Jonathan Gorin</creatorcontrib><creatorcontrib>Salil J. Darji</creatorcontrib><creatorcontrib>Christopher Todd Ford</creatorcontrib><creatorcontrib>Cole Parker Mercer</creatorcontrib><creatorcontrib>Mayank Choudhary</creatorcontrib><creatorcontrib>Paul Tearnen</creatorcontrib><creatorcontrib>Kiran Kumar Tadakamalla</creatorcontrib><creatorcontrib>Anupam Miharia</creatorcontrib><title>Systems and methods of secure data exchange</title><description>A secure exchange server is hosted by an intermediate business entity. A user login data authentication procedure allows users to access the secure exchange server through a client computing device. Communications between the secure exchange server and the users is through a communications network, wherein the users comprises a user of a second business entity. The secure exchange server provides a data chunking facility to receive and segment computer data content transmitted from a client computing device. The received computer data content is stored as a plurality of encrypted computer data content segments. Computer data content is received from the user of the second business entity and the data content is segmented and each computer data content segment is separately encrypted to form a plurality of encrypted computer data content segments. The secure exchange server may preferably store the segments using a mapping facility to store the memory location for each segment. The aim is to allow secure collaborative working between users that may be from different business entities.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAOriwuSc0tVkjMS1HITS3JyE8pVshPUyhOTS4tSlVISSxJVEitSM5IzEtP5WFgTUvMKU7lhdLcDPJuriHOHrqpBfnxqcUFicmpeakl8e5ORqbmBmYGBo7GhFUAAKoLKD4</recordid><startdate>20190731</startdate><enddate>20190731</enddate><creator>Peter Wenzel</creator><creator>Clement Cazalot</creator><creator>Kevin L. McCarthy</creator><creator>John William Giudice</creator><creator>Jonathan Gorin</creator><creator>Salil J. Darji</creator><creator>Christopher Todd Ford</creator><creator>Cole Parker Mercer</creator><creator>Mayank Choudhary</creator><creator>Paul Tearnen</creator><creator>Kiran Kumar Tadakamalla</creator><creator>Anupam Miharia</creator><scope>EVB</scope></search><sort><creationdate>20190731</creationdate><title>Systems and methods of secure data exchange</title><author>Peter Wenzel ; Clement Cazalot ; Kevin L. McCarthy ; John William Giudice ; Jonathan Gorin ; Salil J. Darji ; Christopher Todd Ford ; Cole Parker Mercer ; Mayank Choudhary ; Paul Tearnen ; Kiran Kumar Tadakamalla ; Anupam Miharia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2570600A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Peter Wenzel</creatorcontrib><creatorcontrib>Clement Cazalot</creatorcontrib><creatorcontrib>Kevin L. McCarthy</creatorcontrib><creatorcontrib>John William Giudice</creatorcontrib><creatorcontrib>Jonathan Gorin</creatorcontrib><creatorcontrib>Salil J. Darji</creatorcontrib><creatorcontrib>Christopher Todd Ford</creatorcontrib><creatorcontrib>Cole Parker Mercer</creatorcontrib><creatorcontrib>Mayank Choudhary</creatorcontrib><creatorcontrib>Paul Tearnen</creatorcontrib><creatorcontrib>Kiran Kumar Tadakamalla</creatorcontrib><creatorcontrib>Anupam Miharia</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Peter Wenzel</au><au>Clement Cazalot</au><au>Kevin L. McCarthy</au><au>John William Giudice</au><au>Jonathan Gorin</au><au>Salil J. Darji</au><au>Christopher Todd Ford</au><au>Cole Parker Mercer</au><au>Mayank Choudhary</au><au>Paul Tearnen</au><au>Kiran Kumar Tadakamalla</au><au>Anupam Miharia</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Systems and methods of secure data exchange</title><date>2019-07-31</date><risdate>2019</risdate><abstract>A secure exchange server is hosted by an intermediate business entity. A user login data authentication procedure allows users to access the secure exchange server through a client computing device. Communications between the secure exchange server and the users is through a communications network, wherein the users comprises a user of a second business entity. The secure exchange server provides a data chunking facility to receive and segment computer data content transmitted from a client computing device. The received computer data content is stored as a plurality of encrypted computer data content segments. Computer data content is received from the user of the second business entity and the data content is segmented and each computer data content segment is separately encrypted to form a plurality of encrypted computer data content segments. The secure exchange server may preferably store the segments using a mapping facility to store the memory location for each segment. The aim is to allow secure collaborative working between users that may be from different business entities.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_GB2570600A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Systems and methods of secure data exchange
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T17%3A18%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Peter%20Wenzel&rft.date=2019-07-31&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2570600A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true