COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE

Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huang Xeudong, Myhrvold Nathan P, Lu Qi, Hyde Roderick A, Nadelia Satya, Dyor Matthew G, Reed Danny Allen, Gates William, Lord Robert W, Davis Marc E, Tegreene Clarence T, Lord Richard T, Kare Jordin T, Shum Harry, Jung Edward K.Y, Wood, JR. Lowell L, Levien Royce A, Malamud Mark A
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Huang Xeudong
Myhrvold Nathan P
Lu Qi
Hyde Roderick A
Nadelia Satya
Dyor Matthew G
Reed Danny Allen
Gates William
Lord Robert W
Davis Marc E
Tegreene Clarence T
Lord Richard T
Kare Jordin T
Shum Harry
Jung Edward K.Y
Wood, JR. Lowell L
Levien Royce A
Malamud Mark A
description Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2017302632A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2017302632A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2017302632A13</originalsourceid><addsrcrecordid>eNrjZPB29vcNCA1xDPH093P0UQiODA5x9Q1WcPRzUfB1DfHwdwlWcPMPUnD1cw6KDAjx9HNXcHEMcQSLOfr5-0X6-ocGKwSH-Ac5urvyMLCmJeYUp_JCaW4GZTfXEGcP3dSC_PjU4oLE5NS81JL40GAjA0NzYwMjM2MjR0Nj4lQBAIDYLwI</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE</title><source>esp@cenet</source><creator>Huang Xeudong ; Myhrvold Nathan P ; Lu Qi ; Hyde Roderick A ; Nadelia Satya ; Dyor Matthew G ; Reed Danny Allen ; Gates William ; Lord Robert W ; Davis Marc E ; Tegreene Clarence T ; Lord Richard T ; Kare Jordin T ; Shum Harry ; Jung Edward K.Y ; Wood, JR. Lowell L ; Levien Royce A ; Malamud Mark A</creator><creatorcontrib>Huang Xeudong ; Myhrvold Nathan P ; Lu Qi ; Hyde Roderick A ; Nadelia Satya ; Dyor Matthew G ; Reed Danny Allen ; Gates William ; Lord Robert W ; Davis Marc E ; Tegreene Clarence T ; Lord Richard T ; Kare Jordin T ; Shum Harry ; Jung Edward K.Y ; Wood, JR. Lowell L ; Levien Royce A ; Malamud Mark A</creatorcontrib><description>Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171019&amp;DB=EPODOC&amp;CC=US&amp;NR=2017302632A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171019&amp;DB=EPODOC&amp;CC=US&amp;NR=2017302632A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Huang Xeudong</creatorcontrib><creatorcontrib>Myhrvold Nathan P</creatorcontrib><creatorcontrib>Lu Qi</creatorcontrib><creatorcontrib>Hyde Roderick A</creatorcontrib><creatorcontrib>Nadelia Satya</creatorcontrib><creatorcontrib>Dyor Matthew G</creatorcontrib><creatorcontrib>Reed Danny Allen</creatorcontrib><creatorcontrib>Gates William</creatorcontrib><creatorcontrib>Lord Robert W</creatorcontrib><creatorcontrib>Davis Marc E</creatorcontrib><creatorcontrib>Tegreene Clarence T</creatorcontrib><creatorcontrib>Lord Richard T</creatorcontrib><creatorcontrib>Kare Jordin T</creatorcontrib><creatorcontrib>Shum Harry</creatorcontrib><creatorcontrib>Jung Edward K.Y</creatorcontrib><creatorcontrib>Wood, JR. Lowell L</creatorcontrib><creatorcontrib>Levien Royce A</creatorcontrib><creatorcontrib>Malamud Mark A</creatorcontrib><title>COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE</title><description>Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPB29vcNCA1xDPH093P0UQiODA5x9Q1WcPRzUfB1DfHwdwlWcPMPUnD1cw6KDAjx9HNXcHEMcQSLOfr5-0X6-ocGKwSH-Ac5urvyMLCmJeYUp_JCaW4GZTfXEGcP3dSC_PjU4oLE5NS81JL40GAjA0NzYwMjM2MjR0Nj4lQBAIDYLwI</recordid><startdate>20171019</startdate><enddate>20171019</enddate><creator>Huang Xeudong</creator><creator>Myhrvold Nathan P</creator><creator>Lu Qi</creator><creator>Hyde Roderick A</creator><creator>Nadelia Satya</creator><creator>Dyor Matthew G</creator><creator>Reed Danny Allen</creator><creator>Gates William</creator><creator>Lord Robert W</creator><creator>Davis Marc E</creator><creator>Tegreene Clarence T</creator><creator>Lord Richard T</creator><creator>Kare Jordin T</creator><creator>Shum Harry</creator><creator>Jung Edward K.Y</creator><creator>Wood, JR. Lowell L</creator><creator>Levien Royce A</creator><creator>Malamud Mark A</creator><scope>EVB</scope></search><sort><creationdate>20171019</creationdate><title>COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE</title><author>Huang Xeudong ; Myhrvold Nathan P ; Lu Qi ; Hyde Roderick A ; Nadelia Satya ; Dyor Matthew G ; Reed Danny Allen ; Gates William ; Lord Robert W ; Davis Marc E ; Tegreene Clarence T ; Lord Richard T ; Kare Jordin T ; Shum Harry ; Jung Edward K.Y ; Wood, JR. Lowell L ; Levien Royce A ; Malamud Mark A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2017302632A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Huang Xeudong</creatorcontrib><creatorcontrib>Myhrvold Nathan P</creatorcontrib><creatorcontrib>Lu Qi</creatorcontrib><creatorcontrib>Hyde Roderick A</creatorcontrib><creatorcontrib>Nadelia Satya</creatorcontrib><creatorcontrib>Dyor Matthew G</creatorcontrib><creatorcontrib>Reed Danny Allen</creatorcontrib><creatorcontrib>Gates William</creatorcontrib><creatorcontrib>Lord Robert W</creatorcontrib><creatorcontrib>Davis Marc E</creatorcontrib><creatorcontrib>Tegreene Clarence T</creatorcontrib><creatorcontrib>Lord Richard T</creatorcontrib><creatorcontrib>Kare Jordin T</creatorcontrib><creatorcontrib>Shum Harry</creatorcontrib><creatorcontrib>Jung Edward K.Y</creatorcontrib><creatorcontrib>Wood, JR. Lowell L</creatorcontrib><creatorcontrib>Levien Royce A</creatorcontrib><creatorcontrib>Malamud Mark A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huang Xeudong</au><au>Myhrvold Nathan P</au><au>Lu Qi</au><au>Hyde Roderick A</au><au>Nadelia Satya</au><au>Dyor Matthew G</au><au>Reed Danny Allen</au><au>Gates William</au><au>Lord Robert W</au><au>Davis Marc E</au><au>Tegreene Clarence T</au><au>Lord Richard T</au><au>Kare Jordin T</au><au>Shum Harry</au><au>Jung Edward K.Y</au><au>Wood, JR. Lowell L</au><au>Levien Royce A</au><au>Malamud Mark A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE</title><date>2017-10-19</date><risdate>2017</risdate><abstract>Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2017302632A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T15%3A00%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Huang%20Xeudong&rft.date=2017-10-19&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2017302632A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true