Movatterモバイル変換


[0]ホーム

URL:


US20100064354A1 - Maidsafe.net - Google Patents

Maidsafe.net
Download PDF

Info

Publication number
US20100064354A1
US20100064354A1US12/476,229US47622909AUS2010064354A1US 20100064354 A1US20100064354 A1US 20100064354A1US 47622909 AUS47622909 AUS 47622909AUS 2010064354 A1US2010064354 A1US 2010064354A1
Authority
US
United States
Prior art keywords
data
access
product
allows
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/476,229
Inventor
David Irvine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Publication of US20100064354A1publicationCriticalpatent/US20100064354A1/en
Priority to US13/362,384priorityCriticalpatent/US8788803B2/en
Priority to US13/656,826prioritypatent/US20130061049A1/en
Priority to US14/260,432prioritypatent/US9411976B2/en
Priority to US14/304,354prioritypatent/US20150006895A1/en
Priority to US15/231,574prioritypatent/US20170005788A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Further, this invention comprises a system of self healing data, secure messaging and a voting system to allow users to dictate the direction of development of the network, whereby adoption or denial of proposed add-ons to the network will be decided. System incompatibilities and security breaches on networks and the Internet are addressed by this invention where disparity and tangents of development have had an undue influence. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue.

Description

Claims (26)

1. A distributed network system that allows one to access any computer via the system and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Anonymous authentication system: which allows authentication access to a distributed system comprising of receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
2. A distributed network product of that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to access digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy, and comprises of synergistic steps of storage & retrieval, self-healing, security availability and peer ranking,
b. Anonymous authentication product: which allows authentication access to a distributed system comprising of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted Information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
3. The distributed network system ofclaim 1 which is coupled with self-encryption system that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to secure digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication, the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
4. The distributed network product ofclaim 2 which is coupled with self-encryption product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to secure digital resources without involving 3rdparty access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithm which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
5. The distributed network system ofclaim 1 which is coupled with data maps system that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to secure digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps system: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
6. The distributed network product ofclaim 2 which is coupled with data maps product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to secure digital resources without involving 3rdparty access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps product: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
7. The distributed network system ofclaim 1 which is coupled with shared access to private files system that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to securely share digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps system: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files system: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data, share private files & secure data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
8. The distributed network product ofclaim 2 which is coupled with shared access to private files product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to securely share digital resources without involving 3rdparty access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps product: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files product: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and securely store data, share private files & secure data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
9. The distributed network system ofclaim 1 which is coupled with ms messenger system that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to communicate securely and share digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps system: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files system: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
f. ms messenger system: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
10. The distributed network product ofclaim 2 which is coupled with ms messenger product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to communicate securely and share digital resources without involving 3rdparty access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps product: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files product: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
f. ms messenger product: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network.
11. The distributed network system ofclaim 1 which is coupled with cyber cash system with that allows one to access any computer via this system and have communicate securely and share digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps system: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files system: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file, and comprises of synergistic steps of provision of public ID, encrypted communication,
f. Cyber cash system: to allow the ability to digitally trade resources anonymously on a network, by provision of a system of credits within a global network, which can be passed or transacted anonymously with users having a valid identity that constantly changes but which may be re-validated at any stage and allows purchasing from sources that have a known and public ID of credits and almost instantly transacting these to a private and ever changing private ID, assuring and protecting the identity of users,
g. ms messenger system: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, approve transaction based on digital currency, with an assurity of a self healing, fault resistant, and duplicate removal network.
12. The distributed network product ofclaim 2 which is coupled with cyber cash product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to communicate securely and share digital resources without involving 3rdparty access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps product: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files product: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file, and comprises of synergistic steps of provision of public ID, encrypted communication,
f. Cyber cash product: to allow the ability to digitally trade resources anonymously on a network, by provision of a system of credits within a global network, which can be passed or transacted anonymously with users re-validated at any stage and allows purchasing from sources that have a known and public ID of credits and almost instantly transacting these to a private and ever changing private ID, assuring and protecting the identity of users,
g. ms messenger product: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, approve transaction based on digital currency, with an assurity of a self healing, fault resistant, and duplicate removal network.
13. The distributed network system ofclaims 1 which is coupled with worldwide voting system that allows one to access any computer via this system and have their own data and desktop represented to them as well as the ability to communicate securely and share digital resources without involving 3rdparty access controls or dedicated servers, this system comprises of combination of following steps:
a. Perpetual data system: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption system: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps system: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication system: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files system: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
f. Cyber cash system: to allow the ability to digitally trade resources anonymously on a network, by provision of a system of credits within a global network, which can be passed or transacted anonymously with users having a valid identity that constantly changes but which may be re-validated at any stage and allows purchasing from sources that have a known and public ID of credits and almost instantly transacting these to a private and ever changing private ID, assuring and protecting the identity of users,
g. ms messenger system: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
h. World-wide voting system: provides a system of authentication of unique people or accounts in a network by allowing a system of displaying or otherwise making available the ability to be presented with options or choices from which a user or account owner can choose their favoured option and by the ability to receive votes using anonymous ID's or to demand certain aspects are met such as proven individual, geographic location or other parameters, the above combination provides a unique system with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, approve transaction based on digital currency, CPU sharing via anonymous voting system, with an assurity of a self healing, fault resistant, and duplicate removal network.
14. The distributed network product ofclaim 2 which is coupled with worldwide voting product that allows one to access any computer via this product and have their own data and desktop represented to them as well as the ability to communicate securely and share digital resources without involving 3rd party access controls or dedicated servers, this product comprises of following steps:
a. Perpetual data product: to ensure there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy,
b. Self encryption product: which allows the data to be chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements derived from the data itself so that data holds the key to reversing the processes used and these are recorded for later use and aids security and duplicate removal on a network wide basis,
c. Data maps product: which allows creation of a database or ‘map’ of associated file chunks and their identifiers and provides a mechanism that allows data that has preferably been split into chunks, to be stored, managed and accessed in a way that guarantees its convenient and secure availability to its owner(s),
d. Anonymous authentication product: which allows authentication access to a distributed system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication,
e. Shared access to private files product: to allow users to share concatenated data maps in a shared environment without requiring any additional physical resources such as servers, discs etc. by steps of, provision of public ID, encrypted communication and identifying data with very small file,
f. Cyber cash product: to allow the ability to digitally trade resources anonymously on a network, by provision of a system of credits within a global network, which can be passed or transacted anonymously with users having a valid identity that constantly changes but which may be re-validated at any stage and allows purchasing from sources that have a known and public ID of credits and almost instantly transacting these to a private and ever changing private ID, assuring and protecting the identity of users,
g. ms messenger product: to allow synchronisation of system and user messages in an irrefutable manner, by allowing messaging where identity is validated to prevent spam and further uses this identity to allow digitally validated document signing and accounts are created from a very good known source of personal account information which need not be a public account and can be a private account as in a maidsafe.net account and communications are via a digital contract which is digitally signed and the conversation is subject to the contract terms,
h. World-wide voting product: provides a system of authentication of unique people or accounts in a network by allowing a system of displaying or otherwise making available the ability to be presented with options or choices from which a user or account owner can choose their favoured option and by the ability to receive votes using anonymous ID's or to demand certain aspects are met such as proven individual, geographic location or other parameters,
the above combination provides a unique product with cumulative and synergistic benefits to allow people to effectively control access to their own digital resources and secure communications, store data & share resources, share private files & secure data without using servers, anonymous authentication of users, approve transaction based on digital currency, CPU sharing via anonymous voting system, with an assurity of a self healing, fault resistant, and duplicate removal network.
26. A distributed network computer program product for granular accessibility to data in distributed network or corporate network that allows one to access any computer via the product and have their own data and desktop represented to them as well as the ability to access digital resources without involving a third party access controls or dedicated servers, the product comprising:
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit;
a perpetual data system, wherein the perpetual data system ensures there are several copies of each piece of data at several geographic locations generated by algorithms which monitor each other and create further copies on any type of failure or corruption of a single copy;
an anonymous authentication system, wherein the anonymous authentication system allows authentication access to a distributed system comprising the steps of: receiving a user identifier, retrieving an encrypted validation record identified by the user identifier, decrypting the encrypted validation record so as to provide decrypted information, and authenticating access to data in the distributed file system using the decrypted information to provide anonymous authentication; and
an n+p key sharing system, wherein the n+p sharing system allows users to log in with a created base ID, the ID is validated from a supervising node a manager, users are provided with a further key (Manager's key) to allow access by manager and the corporate structure decided upon can be viewed as a tree and accessed as such to provide access to all user's data beneath or equivalent in some cases to the current user level;
wherein the computer program product provides cumulative and synergistic benefits to allow people to effectively control access to their own digital resources without using servers, anonymous authentication of users, with an assurity of a self healing, fault resistant, and duplicate removal network and corporate tree network.
US12/476,2292006-12-012009-06-01Maidsafe.netAbandonedUS20100064354A1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US13/362,384US8788803B2 (en)2006-12-012012-01-31Self-encryption process
US13/656,826US20130061049A1 (en)2006-12-012012-10-22Distributed network system
US14/260,432US9411976B2 (en)2006-12-012014-04-24Communication system and method
US14/304,354US20150006895A1 (en)2009-06-012014-06-13Distributed network system
US15/231,574US20170005788A1 (en)2006-12-012016-08-08Communication system and method

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
GB0624053.52006-12-01
GB0624053AGB2446199A (en)2006-12-012006-12-01Secure, decentralised and anonymous peer-to-peer network
GB0709759.52007-05-22
GB0709759AGB2444342A (en)2006-12-012007-05-22A distributed system with anonymity and perpetual data
PCT/GB2007/004421WO2008065341A2 (en)2006-12-012007-11-21Distributed network system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/GB2007/004421ContinuationWO2008065341A2 (en)2006-12-012007-11-21Distributed network system

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/362,384ContinuationUS8788803B2 (en)2006-12-012012-01-31Self-encryption process

Publications (1)

Publication NumberPublication Date
US20100064354A1true US20100064354A1 (en)2010-03-11

Family

ID=37671708

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US12/476,229AbandonedUS20100064354A1 (en)2006-12-012009-06-01Maidsafe.net
US13/362,384ActiveUS8788803B2 (en)2006-12-012012-01-31Self-encryption process
US13/656,826AbandonedUS20130061049A1 (en)2006-12-012012-10-22Distributed network system

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US13/362,384ActiveUS8788803B2 (en)2006-12-012012-01-31Self-encryption process
US13/656,826AbandonedUS20130061049A1 (en)2006-12-012012-10-22Distributed network system

Country Status (8)

CountryLink
US (3)US20100064354A1 (en)
EP (2)EP2118808A2 (en)
CN (2)CN101627395A (en)
AU (1)AU2007327389A1 (en)
CA (2)CA2768014A1 (en)
GB (2)GB2446199A (en)
IN (1)IN2009KN02415A (en)
WO (1)WO2008065341A2 (en)

Cited By (78)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060059224A1 (en)*2004-09-132006-03-16Oki Electric Industry Co., Ltd.Message reception confirmation method, communications terminal and message reception confirmation system
US20090011740A1 (en)*2007-07-072009-01-08Qualcomm IncorporatedMethod and system for providing targeted information based on a user profile in a mobile environment
US20090048977A1 (en)*2007-07-072009-02-19Qualcomm IncorporatedUser profile generation architecture for targeted content distribution using external processes
US20090125517A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethod and system for keyword correlation in a mobile environment
US20090125321A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethods and systems for determining a geographic user profile to determine suitability of targeted content messages based on the profile
US20090157834A1 (en)*2007-12-142009-06-18Qualcomm IncorporatedMethod and system for multi-level distribution information cache management in a mobile environment
US20090319329A1 (en)*2007-07-072009-12-24Qualcomm IncorporatedUser profile generation architecture for mobile content-message targeting
US20100228737A1 (en)*2009-02-262010-09-09Red Hat, Inc.HTTP Range Checksum
US20110078779A1 (en)*2009-09-252011-03-31Song LiuAnonymous Preservation of a Relationship and Its Application in Account System Management
US20120284794A1 (en)*2011-05-022012-11-08Architecture Technology CorporationPeer integrity checking system
US20130133050A1 (en)*2010-08-062013-05-23Panasonic CorporationDevice for sharing anonymized information, and method for sharing anonymized information
US20130198462A1 (en)*2012-01-262013-08-01Bertrand SerletReusable content addressable stores as building blocks for creating large scale storage infrastructures
WO2013163625A1 (en)2012-04-272013-10-31Intralinks, Inc.Computerized method and system for managing networked secure collaborative exchange
WO2014035585A1 (en)*2012-08-292014-03-06Bank Of America CorporationRemote safe locking and control
US8776190B1 (en)*2010-11-292014-07-08Amazon Technologies, Inc.Multifactor authentication for programmatic interfaces
US20140282846A1 (en)*2013-03-152014-09-18SkySocket, LLCSecondary device as key for authorizing access to resources
US20140365542A1 (en)*2013-06-062014-12-11Hon Hai Precision Industry Co., Ltd.Data processing system and method
US9043613B2 (en)2013-06-282015-05-26International Business Machines CorporationMultiple volume encryption of storage devices using self encrypting drive (SED)
US20150150101A1 (en)*2013-11-252015-05-28At&T Intellectual Property I, L.P.Networked device access control
US9052824B2 (en)2012-01-262015-06-09Upthere, Inc.Content addressable stores based on sibling groups
US20150170120A1 (en)*2013-12-162015-06-18Samsung Electronics Co., Ltd.Method of providing payment services and messenger server using the method
US9075834B2 (en)2012-01-262015-07-07Upthere, Inc.Detecting deviation between replicas using bloom filters
US20150256515A1 (en)*2014-03-062015-09-10Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US9147195B2 (en)*2011-06-142015-09-29Microsoft Technology Licensing, LlcData custodian and curation system
US9183212B2 (en)2012-01-262015-11-10Upthere, Inc.Representing directory structure in content-addressable storage systems
US20150350278A1 (en)*2013-01-192015-12-03Trondert OüSecure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system
WO2016033208A1 (en)*2014-08-262016-03-03Hoyos Labs Ip Ltd.System and methods for secure file sharing and access management
US9280794B2 (en)2012-03-192016-03-08David W. VictorProviding access to documents in an online document sharing community
US9355384B2 (en)2012-03-192016-05-31David W. VictorProviding access to documents requiring a non-disclosure agreement (NDA) in an online document sharing community
US9367631B2 (en)2014-04-182016-06-14Revolution Technologies, Inc.Dynamic directory and content communication
US20160197906A1 (en)*2013-08-222016-07-07Nippon Telegraph And Telephone CorporationMulti-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
US9397998B2 (en)2012-04-272016-07-19Intralinks, Inc.Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys
US20160275294A1 (en)*2015-03-162016-09-22The MaidSafe FoundationData system and method
US20160299815A1 (en)*2013-12-052016-10-13Google Inc.Distributing Data on Distributed Storage Systems
US9514327B2 (en)2013-11-142016-12-06Intralinks, Inc.Litigation support in cloud-hosted file sharing and collaboration
US9547770B2 (en)2012-03-142017-01-17Intralinks, Inc.System and method for managing collaboration in a networked secure exchange environment
US9553860B2 (en)2012-04-272017-01-24Intralinks, Inc.Email effectivity facility in a networked secure collaborative exchange environment
US9594767B2 (en)2012-03-192017-03-14David W. VictorProviding access to documents of friends in an online document sharing community based on whether the friends' documents are public or private
US20170091750A1 (en)*2014-03-122017-03-30Enrico MaimTransactional system with peer-to-peer distributed architecture for exchanging units of account
US9613190B2 (en)2014-04-232017-04-04Intralinks, Inc.Systems and methods of secure data exchange
US9628471B1 (en)*2011-05-032017-04-18Symantec CorporationProtecting user identity at a cloud using a distributed user identity system
US9811671B1 (en)2000-05-242017-11-07Copilot Ventures Fund Iii LlcAuthentication method and system
US9813247B2 (en)2014-12-232017-11-07Airwatch LlcAuthenticator device facilitating file security
US9818249B1 (en)2002-09-042017-11-14Copilot Ventures Fund Iii LlcAuthentication method and system
US9846814B1 (en)2008-04-232017-12-19Copilot Ventures Fund Iii LlcAuthentication method and system
US9853979B1 (en)*2013-03-112017-12-26Amazon Technologies, Inc.Immediate policy effectiveness in eventually consistent systems
US9875239B2 (en)2012-03-192018-01-23David W. VictorProviding different access to documents in an online document sharing community depending on whether the document is public or private
US20180083772A1 (en)*2016-09-202018-03-22Daniel Patrick MullarkeyPerpetual encryption system, method, and software program product
US9973489B2 (en)2012-10-152018-05-15Citrix Systems, Inc.Providing virtualized private network tunnels
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
US9998435B1 (en)*2011-03-082018-06-12Ciphercloud, Inc.System and method to anonymize data transmitted to a destination computing device
US10021397B2 (en)*2015-09-282018-07-10Renesas Electronics CorporationSemiconductor device
US10033702B2 (en)2015-08-052018-07-24Intralinks, Inc.Systems and methods of secure data exchange
US10044757B2 (en)2011-10-112018-08-07Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US10097584B2 (en)2013-03-292018-10-09Citrix Systems, Inc.Providing a managed browser
US10194266B2 (en)2014-12-222019-01-29Airwatch LlcEnforcement of proximity based policies
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US10476885B2 (en)2013-03-292019-11-12Citrix Systems, Inc.Application with multiple operation modes
US10491570B2 (en)*2015-12-242019-11-26Ingenico GroupMethod for transmitting data, method for receiving data, corresponding devices and programs
US10540349B2 (en)2011-06-142020-01-21Microsoft Technology Licensing, LlcRecommending data enrichments
CN111338574A (en)*2020-02-202020-06-26平安科技(深圳)有限公司Block chain-based data self-repairing method, device, medium and electronic equipment
CN111414415A (en)*2020-02-262020-07-14北斗(天津)科学技术应用研究院(有限合伙)Decentralized information storage node communication network system and method
CN111817914A (en)*2020-06-302020-10-23晨边高地(无锡)科技有限公司Medium-high frequency algorithm transaction interface intelligent system
US10908896B2 (en)2012-10-162021-02-02Citrix Systems, Inc.Application wrapping for application management framework
US10951541B2 (en)2012-02-142021-03-16Airwatch, LlcControlling distribution of resources on a network
RU2748966C1 (en)*2020-02-262021-06-02Акционерное общество "Лаборатория Касперского"Method for synchronisation of anonymous identifiers
US11082355B2 (en)2012-02-142021-08-03Airwatch, LlcControllng distribution of resources in a network
US11108857B2 (en)*2018-02-272021-08-31Elasticsearch B.V.Self-replicating management services for distributed computing architectures
CN113644915A (en)*2021-07-012021-11-12中国科学院空天信息创新研究院 A data compression method, a data compression device, and an electronic device
US11297060B1 (en)*2016-12-302022-04-05Charles Schwab & Co., IncSystem and method for handling user requests for web services
US11636220B2 (en)*2019-02-012023-04-25Intertrust Technologies CorporationData management systems and methods
US20230334482A1 (en)*2022-04-152023-10-19Bank Of America CorporationDynamic Quantum Enabled Method for Large Currency Transaction Exemption using Distributed Hash Chain
US20230334489A1 (en)*2022-04-152023-10-19Bank Of America CorporationDynamic Quantum Enabled Method for Large Currency Transaction Exemption Using Distributed Hash Chain
US11824644B2 (en)2013-03-142023-11-21Airwatch, LlcControlling electronically communicated resources
CN117473483A (en)*2023-12-272024-01-30四川省数字证书认证管理中心有限公司Electronic seal and off-line authorization method thereof
US20240056291A1 (en)*2020-12-242024-02-15Klarytee LtdData security methods
US12069146B2 (en)2018-02-272024-08-20Elasticsearch B.V.Management services for distributed computing architectures using rolling changes

Families Citing this family (127)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102609640B (en)*2004-10-252015-07-15安全第一公司Secure data parser method and system
EP1952575B1 (en)2005-11-182017-12-27Security First Corp.Secure data parser method and system
US8175265B2 (en)*2008-09-022012-05-08Apple Inc.Systems and methods for implementing block cipher algorithms on attacker-controlled systems
JP4835886B2 (en)*2009-12-222011-12-14クオード株式会社 Electronic voting system
US8983074B2 (en)*2009-12-222015-03-17Quad, Inc.Input content data managing system and method of managing input content data
CN101834853B (en)*2010-04-022012-11-21中国科学院软件研究所Method and system for sharing anonymous resource
IL210169A0 (en)2010-12-222011-03-31Yehuda BinderSystem and method for routing-based internet security
US8938534B2 (en)2010-12-302015-01-20Ss8 Networks, Inc.Automatic provisioning of new users of interest for capture on a communication network
US9058323B2 (en)2010-12-302015-06-16Ss8 Networks, Inc.System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data
GB2489676A (en)*2011-03-292012-10-10Sigmoid Solutions LtdOverlay network comprising management node controlling access of subordinate nodes
US8972612B2 (en)2011-04-052015-03-03SSB Networks, Inc.Collecting asymmetric data and proxy data on a communication network
CN102866995B (en)*2011-07-052017-05-24中兴通讯股份有限公司File access method for PPN (Peer-to-Peer Network), management method and distributed file system
US9483657B2 (en)*2013-01-142016-11-01Accenture Global Services LimitedSecure online distributed data storage services
US9881177B2 (en)2013-02-132018-01-30Security First Corp.Systems and methods for a cryptographic file system layer
US9304815B1 (en)*2013-06-132016-04-05Amazon Technologies, Inc.Dynamic replica failure detection and healing
US9886585B2 (en)2013-06-142018-02-06Sap SeMulti-layer data security
US10269009B1 (en)2013-06-282019-04-23Winklevoss Ip, LlcSystems, methods, and program products for a digital math-based asset exchange
US10354325B1 (en)2013-06-282019-07-16Winklevoss Ip, LlcComputer-generated graphical user interface
US11282139B1 (en)2013-06-282022-03-22Gemini Ip, LlcSystems, methods, and program products for verifying digital assets held in a custodial digital asset wallet
US10068228B1 (en)2013-06-282018-09-04Winklevoss Ip, LlcSystems and methods for storing digital math-based assets using a secure portal
US9898782B1 (en)2013-06-282018-02-20Winklevoss Ip, LlcSystems, methods, and program products for operating exchange traded products holding digital math-based assets
US9369289B1 (en)2013-07-172016-06-14Google Inc.Methods and systems for performing secure authenticated updates of authentication credentials
WO2015020575A1 (en)*2013-08-092015-02-12Telefonaktiebolaget L M Ericsson (Publ)Communication network node
US20160267065A1 (en)*2013-10-252016-09-15Leonard L. DreyMethod of Governing Content Presentation of Multi-Page Electronic Documents
WO2015094278A1 (en)*2013-12-192015-06-25Empire Technology Development, LlcPeer-to-peer (p2p) code exchange facilitation in centrally managed online service
EP3123423A4 (en)*2014-03-272017-08-30Nokia Technologies OyMethod and apparatus for automatic inter-device authorisation
US9830593B2 (en)2014-04-262017-11-28Ss8 Networks, Inc.Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping
US8978153B1 (en)2014-08-012015-03-10Datalogix, Inc.Apparatus and method for data matching and anonymization
WO2016022864A2 (en)*2014-08-062016-02-11Blockchain Technologies CorporationSystem and method for securely receiving and counting votes in an election
US10031679B2 (en)2014-11-212018-07-24Security First Corp.Gateway for cloud-based secure storage
US9853977B1 (en)2015-01-262017-12-26Winklevoss Ip, LlcSystem, method, and program product for processing secure transactions within a cloud computing system
US10333908B2 (en)2015-02-032019-06-25SecuritiNet Inc.Transaction-based secure information delivery and assessment
GB2534913B (en)*2015-02-052021-08-11Fujitsu LtdSystem, method, and program for storing and controlling access to data representing personal behaviour
US10158480B1 (en)2015-03-162018-12-18Winklevoss Ip, LlcAutonomous devices
US10915891B1 (en)2015-03-162021-02-09Winklevoss Ip, LlcAutonomous devices
SG10201502401XA (en)*2015-03-262016-10-28Huawei Internat Pte LtdMethod of obfuscating data
US10558996B2 (en)*2015-06-092020-02-11Fidelity National Information Services, LlcMethods and systems for regulating operation of units using encryption techniques associated with a blockchain
WO2017004527A1 (en)2015-07-022017-01-05Nasdaq, Inc.Systems and methods of secure provenance for distributed transaction databases
CN105162760B (en)*2015-07-282018-08-14郝孟一Randomly select method, apparatus and system
US9390154B1 (en)2015-08-282016-07-12Swirlds, Inc.Methods and apparatus for a distributed database within a network
US10747753B2 (en)2015-08-282020-08-18Swirlds, Inc.Methods and apparatus for a distributed database within a network
CN105468974B (en)*2015-11-192018-05-29广东欧珀移动通信有限公司A kind of file access method, device and mobile terminal
US11018858B2 (en)*2015-12-082021-05-25Nec CorporationMethod for re-keying an encrypted data file
US10108812B2 (en)2016-01-282018-10-23Nasdaq, Inc.Systems and methods for securing and disseminating time sensitive information using a blockchain
AU2017216289A1 (en)2016-02-042018-09-27Nasdaq Technology AbSystems and methods for storing and sharing transactional data using distributed computer systems
US11048805B2 (en)*2016-02-172021-06-29Nec CorporationMethod for storing data on a storage entity
US9922199B2 (en)*2016-02-182018-03-20Bank Of America CorporationDocument security tool
BR112018016234A2 (en)2016-02-232019-01-02Nchain Holdings Ltd computer-implemented method for controlling access to a resource, computer-based systems and method for controlling access to a digital wallet
SG11201806702XA (en)2016-02-232018-09-27Nchain Holdings LtdPersonal device security using elliptic curve cryptography for secret sharing
BR112018016821A2 (en)2016-02-232018-12-26Nchain Holdings Ltd computer-implemented system and methods
MX2018010052A (en)2016-02-232019-01-21Nchain Holdings LtdSystem and method for controlling asset-related actions via a blockchain.
CN116957790A (en)2016-02-232023-10-27区块链控股有限公司Method and system for realizing universal certification of exchange on blockchain
AU2017223138B2 (en)2016-02-232022-02-10nChain Holdings LimitedMethod and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
BR112018016819A2 (en)2016-02-232018-12-26Nchain Holdings Ltd method and systems for protecting a controlled digital resource using a distributed scatter table and ledger and a blockchain
CN108292402B (en)2016-02-232022-10-04恩链控股有限公司Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
CN115641131A (en)2016-02-232023-01-24区块链控股有限公司Method and system for secure transfer of entities over a blockchain
EP4235552A3 (en)2016-02-232023-09-13nChain Licensing AGMethods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain
IL261210B (en)2016-02-232022-08-01Nchain Holdings Ltd An exchange based on a 'block chain' with tokenization
GB2562622A (en)2016-02-232018-11-21Nchain Holdings LtdCryptographic method and system for secure extraction of data from a blockchain
MX2018010050A (en)2016-02-232019-01-21Nchain Holdings LtdAgent-based turing complete transactions integrating feedback within a blockchain system.
EP3748903A1 (en)2016-02-232020-12-09Nchain Holdings LimitedUniversal tokenisation system for blockchain-based cryptocurrencies
JP6511201B1 (en)2016-02-232019-05-15エヌチェーン ホールディングス リミテッドNchain Holdings Limited Registry and Automated Management Method for Sophisticated Trading Enforced by Blockchain
US11488120B2 (en)*2016-02-232022-11-01nChain Holdings LimitedMethods and systems for the efficient transfer of entities on a blockchain
CN106255197B (en)*2016-08-102019-12-31北京邮电大学 A User Access Method of Distributed Softswitch System
US20180063238A1 (en)*2016-08-252018-03-01Jiangang ZhangMassively Scalable, Low Latency, High Concurrency and High Throughput Decentralized Consensus Algorithm
KR102443888B1 (en)*2016-11-102022-09-16스월즈, 인크. Method and apparatus for distributed database containing anonymous entries
WO2018089843A1 (en)*2016-11-102018-05-17Saavha, Inc.Secured auditing system based on verified hash algorithm
KR102454779B1 (en)2016-12-192022-10-13스월즈, 인크. Method and apparatus for distributed database enabling deletion of events
US12111944B2 (en)*2017-03-162024-10-08Jun YuMethod and system for policy based real time data file access control
US11321680B2 (en)*2017-04-262022-05-03Ashish KumarSystem and method for processing and management of transactions using electronic currency
CN110770723A (en)*2017-05-182020-02-07科德克斯有限公司Distributed digital content distribution system and process using blockchain priority information
WO2018229531A1 (en)*2017-06-142018-12-20Harman International Industries, Inc.Systems and methods for security of network connected devices
SG10202103402RA (en)2017-07-112021-05-28Swirlds IncMethods and apparatus for efficiently implementing a distributed database within a network
US11138322B2 (en)*2017-08-012021-10-05Visa International Service AssociationPrivate data processing
SG11202002569RA (en)*2017-09-202020-04-29James FournierInternet data usage control system
PH12021552432A1 (en)2017-10-312022-07-18Americorp Invest LlcDistributed multi-ledger gambling architecture
CN107948161B (en)*2017-11-282020-08-07中国地质大学(武汉)Anonymous document approval method
US10373158B1 (en)2018-02-122019-08-06Winklevoss Ip, LlcSystem, method and program product for modifying a supply of stable value digital asset tokens
US11334883B1 (en)2018-03-052022-05-17Gemini Ip, LlcSystems, methods, and program products for modifying the supply, depositing, holding and/or distributing collateral as a stable value token in the form of digital assets
US11200569B1 (en)2018-02-122021-12-14Winklevoss Ip, LlcSystem, method and program product for making payments using fiat-backed digital assets
US11909860B1 (en)2018-02-122024-02-20Gemini Ip, LlcSystems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US11522700B1 (en)2018-02-122022-12-06Gemini Ip, LlcSystems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US10373129B1 (en)2018-03-052019-08-06Winklevoss Ip, LlcSystem, method and program product for generating and utilizing stable value digital assets
US10540654B1 (en)2018-02-122020-01-21Winklevoss Ip, LlcSystem, method and program product for generating and utilizing stable value digital assets
US12141871B1 (en)2018-02-122024-11-12Gemini Ip, LlcSystem, method and program product for generating and utilizing stable value digital assets
US11308487B1 (en)2018-02-122022-04-19Gemini Ip, LlcSystem, method and program product for obtaining digital assets
US11139955B1 (en)2018-02-122021-10-05Winklevoss Ip, LlcSystems, methods, and program products for loaning digital assets and for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
US10438290B1 (en)2018-03-052019-10-08Winklevoss Ip, LlcSystem, method and program product for generating and utilizing stable value digital assets
US11475442B1 (en)2018-02-122022-10-18Gemini Ip, LlcSystem, method and program product for modifying a supply of stable value digital asset tokens
US12271898B1 (en)2018-03-052025-04-08Gemini Ip, LlcSystem, method and program product for modifying a supply of stable value digital asset tokens
US10929842B1 (en)2018-03-052021-02-23Winklevoss Ip, LlcSystem, method and program product for depositing and withdrawing stable value digital assets in exchange for fiat
CN108494764B (en)*2018-03-202020-07-10海信集团有限公司Identity authentication method and device
CN108494790B (en)*2018-04-082020-01-21南京大学Method for detecting continuous network attack in distributed network
CN108470075A (en)*2018-04-122018-08-31重庆邮电大学A kind of socialization recommendation method of sequencing-oriented prediction
WO2019237126A1 (en)*2018-06-082019-12-12Gcp Ip Holdings I, LlcBlockchain overwatch
JP7324231B2 (en)*2018-06-152023-08-09サーキュラライズ ビーブイ Distributed database structure for anonymous exchange of information
US11064323B2 (en)*2018-08-232021-07-13Ford Global Technologies, LlcMethod and apparatus for peer to peer distribution strategy for updates
US11140177B2 (en)*2018-08-312021-10-05Cisco Technology, Inc.Distributed data authentication and validation using blockchain
CN109491965A (en)*2018-09-132019-03-19远光软件股份有限公司The storage method and its network and electronic equipment of purchase sale of electricity contract
CN109493225B (en)*2018-11-122022-02-18夸克链科技(深圳)有限公司Domain-divided verification mechanism of block chain
US11005825B2 (en)2018-11-132021-05-11Seagate Technology LlcSensor nodes and host forming a tiered ecosystem that uses public and private data for duplication
US11070449B2 (en)2018-12-042021-07-20Bank Of America CorporationIntelligent application deployment to distributed ledger technology nodes
US10841153B2 (en)2018-12-042020-11-17Bank Of America CorporationDistributed ledger technology network provisioner
AU2019201103A1 (en)*2019-02-152020-09-03Robert N. BarrettCryptography Method and System for Securing Data Via Electronic Transmission
US12093942B1 (en)2019-02-222024-09-17Gemini Ip, LlcSystems, methods, and program products for modifying the supply, depositing, holding, and/or distributing collateral as a stable value token in the form of digital assets
US11490256B2 (en)*2019-03-112022-11-01Hewlett Packard Enterprise Development LpSecure zero-touch provisioning of network devices in an offline deployment
CN110035121B (en)*2019-03-292021-02-19联想(北京)有限公司Information processing method and electronic equipment
US11394789B2 (en)2019-05-082022-07-19Hewlett Packard Enterprise Development LpSeamless migration of a network management system deployment to cloud-based deployment
US11501370B1 (en)2019-06-172022-11-15Gemini Ip, LlcSystems, methods, and program products for non-custodial trading of digital assets on a digital asset exchange
TWI738023B (en)*2019-07-092021-09-01中華電信股份有限公司Key distribution based solution for anonymous restoration on social network
KR102455758B1 (en)*2020-01-302022-10-17가부시키가이샤 스크린 홀딩스Data processing method, data processing device, and recording medium
US11276258B2 (en)2020-06-152022-03-15Delphian Systems, LLCEnhanced security for contactless access card system
US11829452B2 (en)2020-08-242023-11-28Leonard L. DreySystem and method of governing content presentation of multi-page electronic documents
US11784798B2 (en)2021-03-302023-10-10Visa International Service AssociationSystem, method, and computer program product for data security
US11949795B2 (en)2021-08-272024-04-02Bank Of America CorporationSystem for tracking resources using non-fungible tokens
US11882219B2 (en)2021-09-022024-01-23Bank Of America CorporationSystem for dynamically tracking resources using non-fungible tokens
US11902443B2 (en)2021-09-082024-02-13Bank Of America CorporationSystem for linking and partitioning non-fungible tokens
US11811931B2 (en)2021-09-152023-11-07Bank Of America CorporationSystem for real-time assessment of authenticity of a resource using non-fungible tokens
ES2904423B2 (en)2021-09-222023-01-09Univ Valencia Politecnica DISTRIBUTED LOG METHOD FOR ANONYMOUS ACCESS CONTROL
US11902444B2 (en)2021-10-182024-02-13Bank Of America CorporationSystem for virtualization of non-fungible tokens
CN114189526A (en)*2021-11-012022-03-15北京中合谷投资有限公司Centralized scheduling algorithm of distributed network
US12112356B2 (en)2021-12-092024-10-08Bank Of America CorporationSystem for intelligent assessment models for non-fungible electronic resources
US11893587B2 (en)2021-12-102024-02-06Bank Of America CorporationSystem for enhanced authentication using non-fungible tokens (NFTs)
US11983529B2 (en)2022-01-182024-05-14Bank Of America CorporationSystem for detection and recordation of functional code logic components on a distributed development platform
US11966915B2 (en)2022-02-032024-04-23Bank Of America CorporationSystem for tracking and tagging communication using electronic non-fungible resources within a distributed network
US11860862B2 (en)2022-02-092024-01-02Bank Of America CorporationSystem for identification and recordation of base components of a resource within a virtual medium
CN117874789B (en)*2024-01-052024-09-03张渴欣 A dynamic privacy data encryption method and system

Citations (75)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4760598A (en)*1981-07-231988-07-26Racal Data Communications Inc.Coded data transmission system
US5117350A (en)*1988-12-151992-05-26Flashpoint Computer CorporationMemory address mechanism in a distributed memory architecture
US5235599A (en)*1989-07-261993-08-10Nec CorporationSelf-healing network with distributed failure restoration capabilities
US5313646A (en)*1989-02-241994-05-17Sun Microsystems, Inc.Method and apparatus for translucent file system
US5423034A (en)*1992-06-101995-06-06Cohen-Levy; LeonNetwork file management with user determined hierarchical file structures and means for intercepting application program open and save commands for inputting and displaying user inputted descriptions of the location and content of files
US5436972A (en)*1993-10-041995-07-25Fischer; Addison M.Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
US5557765A (en)*1994-08-111996-09-17Trusted Information Systems, Inc.System and method for data recovery
US5557518A (en)*1994-04-281996-09-17Citibank, N.A.Trusted agents for open electronic commerce
US5590199A (en)*1993-10-121996-12-31The Mitre CorporationElectronic information network user authentication and authorization system
US5850442A (en)*1996-03-261998-12-15Entegrity Solutions CorporationSecure world wide electronic commerce over an open network
US6009177A (en)*1994-01-131999-12-28Certco LlcEnhanced cryptographic system and method with key escrow feature
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6028527A (en)*1996-11-252000-02-22Texas Instruments IncorporatedDecryption and encryption transmitter/receiver with self-test, learn and rolling code
US6098056A (en)*1997-11-242000-08-01International Business Machines CorporationSystem and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
US6185316B1 (en)*1997-11-122001-02-06Unisys CorporationSelf-authentication apparatus and method
US6230269B1 (en)*1998-03-042001-05-08Microsoft CorporationDistributed authentication system and method
US6299062B1 (en)*1998-08-182001-10-09Electronics And Telecommunications Research InstituteElectronic cash system based on a blind certificate
US6370649B1 (en)*1998-03-022002-04-09Compaq Computer CorporationComputer access via a single-use password
US6381344B1 (en)*1994-08-312002-04-30Communication Intelligence Corp.Method and system for the capture, storage, transport and authentication of handwritten signatures
US6385316B1 (en)*1997-03-112002-05-07Qualcomm IncorporatedMethod and apparatus for encrypting data in a wireless communication system
US20020077887A1 (en)*2000-12-152002-06-20Ibm CorporationArchitecture for anonymous electronic voting using public key technologies
US20020099666A1 (en)*2000-11-222002-07-25Dryer Joseph E.System for maintaining the security of client files
US20020106192A1 (en)*2000-06-012002-08-08Yoichiro SakoContents data, recording medium, recording method and device, reproducing method and device
US20020120563A1 (en)*2000-09-192002-08-29Mcwilliam William J.System and method for effecting anonymous payments
US20020184485A1 (en)*1999-12-202002-12-05Dray James F.Method for electronic communication providing self-encrypting and self-verification capabilities
US6514420B2 (en)*1999-06-212003-02-04Access Business Group International LlcPoint-of use water treatment system
US20030053625A1 (en)*2001-09-102003-03-20The Titan CorporationSelf-synchronizing, stream-oriented data encryption technique
US20030120928A1 (en)*2001-12-212003-06-26Miles CatoMethods for rights enabled peer-to-peer networking
US20030159032A1 (en)*2000-08-162003-08-21Edgardo GerckAutomatically generating unique, one-way compact and mnemonic voter credentials that support privacy and security services
US20030163413A1 (en)*2002-02-282003-08-28Wiczkowski Frank T.Method of conducting anonymous transactions over the internet
US20030187853A1 (en)*2002-01-242003-10-02Hensley Roy AustinDistributed data storage system and method
US6696563B2 (en)*1998-07-092004-02-24Celanese Ventures Gmbhα-Amylase-resistant polysaccharides, production method, use and foods containing these polysaccharides
US20040117303A1 (en)*2002-12-162004-06-17Hermogenes GamboaApparatus and anonymous payment system (ASAP) for the internet and other networks
US6760756B1 (en)*1999-06-232004-07-06Mangosoft CorporationDistributed virtual web cache implemented entirely in software
US20040199768A1 (en)*2003-04-042004-10-07Nail Robert A.System and method for enabling enterprise application security
US20040195323A1 (en)*2001-07-062004-10-07Dennis VaduraSystems and methods for electronic voting
US20040255037A1 (en)*2002-11-272004-12-16Corvari Lawrence J.System and method for authentication and security in a communication system
US20050004947A1 (en)*2003-06-302005-01-06Emlet James L.Integrated tool set for generating custom reports
US20050043858A1 (en)*2002-07-162005-02-24Alexander GelmanAtomic self-healing architecture
US20050076110A1 (en)*2003-07-112005-04-07Boban MathewGeneric inbox system and method
US6912660B1 (en)*1998-08-072005-06-28Silanis Technology Inc.Method for parallel approval of an electronic document
US6925182B1 (en)*1997-12-192005-08-02Koninklijke Philips Electronics N.V.Administration and utilization of private keys in a networked environment
US20050273603A1 (en)*2001-10-302005-12-08Girard Luke EMechanism to improve authentication for remote management of a computer system
US20050289086A1 (en)*2004-06-282005-12-29Afariogun Abdul A OAnonymous payment system
US6988196B2 (en)*2000-12-222006-01-17Lenovo (Singapore) Pte LtdComputer system and method for generating a digital certificate
US20060020788A1 (en)*2004-07-022006-01-26Ncr CorporationSelf-service terminal
US20060023887A1 (en)*2004-04-022006-02-02Agrawal Dharma PThreshold and identity-based key management and authentication for wireless ad hoc networks
US20060047944A1 (en)*2004-09-012006-03-02Roger Kilian-KehrSecure booting of a computing device
US7010532B1 (en)*1997-12-312006-03-07International Business Machines CorporationLow overhead methods and apparatus for shared access storage devices
US20060126848A1 (en)*2004-12-152006-06-15Electronics And Telecommunications Research InstituteKey authentication/service system and method using one-time authentication code
US20060136514A1 (en)*1998-09-012006-06-22Kryloff Sergey ASoftware patch generator
US20060149972A1 (en)*2002-11-132006-07-06Guoshun DengMethod for realizing security storage and algorithm storage by means of semiconductor memory device
US20060161781A1 (en)*2005-01-182006-07-20Robert RiceAutomated notary acknowledgement
US20060177094A1 (en)*2005-01-212006-08-10Mr. Robert SmithA system for embedding, extracting, and executing self-governing behavior and use controls within digital medium content
US7099898B1 (en)*1999-08-122006-08-29International Business Machines CorporationData access system
US20070136604A1 (en)*2005-12-062007-06-14Motorola, Inc.Method and system for managing secure access to data in a network
US7239605B2 (en)*2002-09-232007-07-03Sun Microsystems, Inc.Item and method for performing a cluster topology self-healing process in a distributed data system cluster
US7243156B2 (en)*2000-11-012007-07-10Digital Integrator, Inc.Information distribution method and system
US7264152B2 (en)*1999-04-192007-09-04First Data CorporationAnonymous transaction authentication
US7272717B2 (en)*2002-02-282007-09-18Kabushiki Kaisha ToshibaSystem of authentication, apparatus, program and method
US7281006B2 (en)*2003-10-232007-10-09International Business Machines CorporationSystem and method for dividing data into predominantly fixed-sized chunks so that duplicate data chunks may be identified
US20070250700A1 (en)*2006-04-212007-10-25Microsoft CorporationPeer-to-peer contact exchange
US7313565B2 (en)*2004-02-192007-12-25Microsoft CorporationData overlay, self-organized metadata overlay, and associated methods
US7383406B2 (en)*2004-11-192008-06-03International Business Machines CorporationApplication transparent autonomic availability on a storage area network aware file system
US7401220B2 (en)*2001-03-212008-07-15Microsoft CorporationOn-disk file format for a serverless distributed file system
US7463264B2 (en)*2004-05-142008-12-09PixarMethod and system for distributed serverless file management
US7466824B2 (en)*2003-10-092008-12-16Nortel Networks LimitedMethod and system for encryption of streamed data
US7475258B2 (en)*2001-01-172009-01-06Microsoft CorporationExclusive encryption
US7474751B2 (en)*2001-12-132009-01-06Huawei Technologies Co., Ltd.Method of selecting encrypting arithmetric for realizing communication of secrecy
US7478243B2 (en)*2001-03-212009-01-13Microsoft CorporationOn-disk file format for serverless distributed file system with signed manifest of file modifications
US7506010B2 (en)*2005-02-082009-03-17Pro Softnet CorporationStoring and retrieving computer data files using an encrypted network drive file system
US7640181B2 (en)*2000-02-172009-12-29Hart Intercivic, Inc.Distributed network voting system
US7640432B2 (en)*2000-12-112009-12-29International Business Machines CorporationElectronic cash controlled by non-homomorphic signatures
US7681228B2 (en)*2000-11-032010-03-16Authernative, Inc.Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions
US7734924B2 (en)*2000-09-082010-06-08Identrust, Inc.System and method for transparently providing certificate validation and other services within an electronic transaction

Family Cites Families (68)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5007067A (en)1989-09-291991-04-09At&T Bell LaboratoriesDiversity coding for transparent self-healing communications networks
JP2911519B2 (en)1990-02-061999-06-23キヤノン株式会社 Photoelectric conversion device
US5555404A (en)1992-03-171996-09-10Telenor AsContinuously available database server having multiple groups of nodes with minimum intersecting sets of database fragment replicas
RU2120700C1 (en)1993-11-011998-10-20Омский научно-исследовательский институт приборостроенияMethod for voice signal processing and device which implements said method
NZ296340A (en)1994-10-282000-01-28Surety Technologies IncDigital identification and authentication of documents by creating repository of hash values based on documents
CA2185346C (en)1995-06-062005-11-29Osamu TsukadaPortable analgesic system
JP3946808B2 (en)1997-04-102007-07-18日本電信電話株式会社 User information management device in authentication system
DE19755819C1 (en)1997-12-161999-08-26Ibm Distributed payment system and method for cashless payment transactions using a stock exchange chip card
AU6236498A (en)*1998-01-161999-08-02Institute Of Systems ScienceA method of data storage and apparatus therefor
US6192129B1 (en)*1998-02-042001-02-20International Business Machines CorporationMethod and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block
KR100411912B1 (en)*1998-02-242003-12-18오트크리토에 악츠이오네른오에 옵스체스트보 (모스코브스키야 고로즈카야 텔레폰나야 셋)Method for the block-encryption of discrete data
EP0944232A2 (en)1998-03-201999-09-22Lucent Technologies Inc.Customer premises equipment with reduced power consumption
US6496862B1 (en)1998-08-252002-12-17Mitsubishi Electric Research Laboratories, Inc.Remote monitoring and control of devices connected to an IEEE 1394 bus via a gateway device
WO2000013368A1 (en)1998-08-312000-03-09Borgers Frederick JMethod of authenticating or 'digitally signing' digital data objects
US8347086B2 (en)2000-12-182013-01-01Citibank, N.A.System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium
JP3923267B2 (en)1999-04-282007-05-30富士ソフト株式会社 Random number generator and encryption system
US7508945B1 (en)1999-05-182009-03-24Ferre Herrero Angel JoseSelf-corrector randomisation-encryption and method
US6269563B1 (en)1999-06-032001-08-07Gideon DaganPerpetual calendar
WO2000079362A2 (en)1999-06-232000-12-28Mangosoft CorporationDistributed virtual web cache implemented entirely in software
US6205533B1 (en)*1999-08-122001-03-20Norman H. MargolusMechanism for efficient data access and communication in parallel computations on an emulated spatial lattice
JP2001100633A (en)1999-09-302001-04-13Kosaburo SatoPerpetual calendar friendly to environment
US7546353B2 (en)1999-12-022009-06-09Western Digital Technologies, Inc.Managed peer-to-peer applications, systems and methods for distributed data access and storage
JP2001186186A (en)1999-12-272001-07-06Toshiba Corp Packet switching device, network system, and packet switching method
US7412462B2 (en)*2000-02-182008-08-12Burnside Acquisition, LlcData repository and method for promoting network storage of data
US7237114B1 (en)2000-04-262007-06-26Pronvest, Inc.Method and system for signing and authenticating electronic documents
AU2001265075A1 (en)*2000-05-262001-12-11Infolibria, Inc.High performance efficient subsystem for data object storage
US20020002545A1 (en)2000-06-292002-01-03Resneck James D.Electronic money transaction device and method
AU2001267087A1 (en)2000-08-302002-03-13Spectros CorporationSystem and method for client document certification and validation by remote host
US20020042808A1 (en)2000-09-292002-04-11Smith Joshua R.Method and apparatus for linking data and objects
US7884954B2 (en)2000-10-022011-02-08Canon Kabushiki KaishaPeripheral equipment and management method thereof
US7191252B2 (en)*2000-11-132007-03-13Digital Doors, Inc.Data security system and method adjunct to e-mail, browser or telecom program
JP2002185444A (en)2000-12-142002-06-28Fuji Xerox Co LtdNetwork system
US20030084020A1 (en)2000-12-222003-05-01Li ShuDistributed fault tolerant and secure storage
WO2002065329A1 (en)*2001-02-142002-08-22The Escher Group, Ltd.Peer-to peer enterprise storage
AU2002339711A1 (en)2001-04-202002-12-03Ponoi Corp.System and method for secure and private communication
WO2002087148A1 (en)2001-04-232002-10-31International Business Machines CorporationNon-transferable anonymous digital receipts
US20030046568A1 (en)2001-09-062003-03-06Riddick Christopher J.Media protection system and method and hardware decryption module used therein
US6859812B1 (en)2001-10-312005-02-22Hewlett-Packard Development Company, L.P.System and method for differentiating private and shared files within a computer cluster
JP2003273860A (en)2002-03-192003-09-26Ricoh Co Ltd Encrypted document browsing method, encrypted document browsing system, encrypted document browsing program, storage medium storing encrypted document browsing program, management device used in encrypted document browsing system, data structure of encrypted document, encrypted document For generating data structure of encrypted document
US20040131181A1 (en)*2002-04-032004-07-08Rhoads Steven CharlesMethod and apparatus for encrypting content
US6701258B2 (en)2002-05-132004-03-02Entek Ird International CorporationModular monitoring and protection system with distributed voting logic
FR2845501A1 (en)*2002-10-022004-04-09Benoit ChenonOnline voting system for elections uses voting server accessible to voters returning votes to internal server which is inaccessible to voters
US7441108B2 (en)*2002-11-192008-10-21Ken Scott FisherPortable memory drive with portable applications and cross-computer system management application
US7284121B2 (en)2002-11-202007-10-16Microsoft CorporationSystem and method for transmitting reduced information from a certificate to perform encryption operations
JP2004355358A (en)2003-05-292004-12-16Nippon Telegr & Teleph Corp <Ntt> Participant authentication type information exchange system and method and communication terminal used in the system
DE10325491A1 (en)2003-06-042004-12-30Sc-Info+Inno Gmbh + Co.Voting method with generation and control of voting slips from geographically distributed computers connected via e.g. Internet, and using electronic signatures
CA2471505A1 (en)2003-06-192004-12-19Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US7447735B2 (en)2003-07-012008-11-04Motorola, Inc.Interprocessor communication protocol
JP4262026B2 (en)2003-07-312009-05-13パナソニック株式会社 Mobile communication terminal device
US7076622B2 (en)*2003-09-302006-07-11International Business Machines CorporationSystem and method for detecting and sharing common blocks in an object storage system
FR2860363B1 (en)2003-09-302006-01-21Everbee Networks METHOD AND SYSTEM FOR SECURING A USER'S ACCESS TO A COMPUTER NETWORK
US7949996B2 (en)*2003-10-232011-05-24Microsoft CorporationPeer-to-peer identity management managed interfaces and methods
CN100421372C (en)2003-11-182008-09-24华为技术有限公司 A method for securely sending transmission keys
WO2005055162A1 (en)2003-11-262005-06-16Splat Thief, IncorporatedUser self-authentication system and method for remote credit card verification
CN100518055C (en)2003-12-102009-07-22联想(北京)有限公司 A Safe Data Transmission Method
WO2005060625A2 (en)2003-12-112005-07-07The Trustees Of Columbia University In The City Of New YorkGrp receptor-related methods for treating and preventing fear-related disorders
EP1704667B1 (en)2003-12-162010-02-17Sap AgElectronic signing apparatus and methods
US7698394B2 (en)2003-12-232010-04-13Alcatel LucentGlobal network management configuration
CN1658553B (en)2004-02-202011-04-27中国电子科技集团公司第三十研究所 A Strong Authentication Method Using Public Key Cryptography Algorithm Encryption Mode
JP2006526215A (en)*2004-03-222006-11-16ニトゲン・テクノロジーズ・インコーポレーテッド Content distribution network system based on streaming and file division, merge and playback method
GB0415130D0 (en)2004-03-262004-08-11Genonyme GmbhMethod, system and object for the identification of an individual
JP2005311545A (en)2004-04-192005-11-04Nextage:Kk Seal authentication system with electronic signature and seal authentication method with electronic signature
JP2005339247A (en)2004-05-272005-12-08Secured Communications:KkBidirectional one time id authenticating system and authenticating method
JP4716704B2 (en)2004-10-082011-07-06Omo株式会社 Authentication system and authentication method
US7778984B2 (en)*2004-11-192010-08-17Microsoft CorporationSystem and method for a distributed object store
MX2007007561A (en)2004-12-222008-03-10Merkatum CorpSelf-adaptive multimodal biometric authentication system and method.
US7849303B2 (en)*2005-02-222010-12-07Microsoft CorporationPeer-to-peer network information storage
DE602006005014D1 (en)2005-02-222009-03-19Microsoft Corp Network information in a peer-to-peer network

Patent Citations (76)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4760598A (en)*1981-07-231988-07-26Racal Data Communications Inc.Coded data transmission system
US5117350A (en)*1988-12-151992-05-26Flashpoint Computer CorporationMemory address mechanism in a distributed memory architecture
US5313646A (en)*1989-02-241994-05-17Sun Microsystems, Inc.Method and apparatus for translucent file system
US5235599A (en)*1989-07-261993-08-10Nec CorporationSelf-healing network with distributed failure restoration capabilities
US5423034A (en)*1992-06-101995-06-06Cohen-Levy; LeonNetwork file management with user determined hierarchical file structures and means for intercepting application program open and save commands for inputting and displaying user inputted descriptions of the location and content of files
US5436972A (en)*1993-10-041995-07-25Fischer; Addison M.Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
US5590199A (en)*1993-10-121996-12-31The Mitre CorporationElectronic information network user authentication and authorization system
US6009177A (en)*1994-01-131999-12-28Certco LlcEnhanced cryptographic system and method with key escrow feature
US5557518A (en)*1994-04-281996-09-17Citibank, N.A.Trusted agents for open electronic commerce
US5557765A (en)*1994-08-111996-09-17Trusted Information Systems, Inc.System and method for data recovery
US6381344B1 (en)*1994-08-312002-04-30Communication Intelligence Corp.Method and system for the capture, storage, transport and authentication of handwritten signatures
US5850442A (en)*1996-03-261998-12-15Entegrity Solutions CorporationSecure world wide electronic commerce over an open network
US6028527A (en)*1996-11-252000-02-22Texas Instruments IncorporatedDecryption and encryption transmitter/receiver with self-test, learn and rolling code
US20040190712A1 (en)*1997-03-112004-09-30Rose Gregory G.Method and apparatus for encrypting data in a wireless communication system
US6385316B1 (en)*1997-03-112002-05-07Qualcomm IncorporatedMethod and apparatus for encrypting data in a wireless communication system
US6185316B1 (en)*1997-11-122001-02-06Unisys CorporationSelf-authentication apparatus and method
US6098056A (en)*1997-11-242000-08-01International Business Machines CorporationSystem and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
US6925182B1 (en)*1997-12-192005-08-02Koninklijke Philips Electronics N.V.Administration and utilization of private keys in a networked environment
US7010532B1 (en)*1997-12-312006-03-07International Business Machines CorporationLow overhead methods and apparatus for shared access storage devices
US6023586A (en)*1998-02-102000-02-08Novell, Inc.Integrity verifying and correcting software
US6370649B1 (en)*1998-03-022002-04-09Compaq Computer CorporationComputer access via a single-use password
US6230269B1 (en)*1998-03-042001-05-08Microsoft CorporationDistributed authentication system and method
US6696563B2 (en)*1998-07-092004-02-24Celanese Ventures Gmbhα-Amylase-resistant polysaccharides, production method, use and foods containing these polysaccharides
US6912660B1 (en)*1998-08-072005-06-28Silanis Technology Inc.Method for parallel approval of an electronic document
US6299062B1 (en)*1998-08-182001-10-09Electronics And Telecommunications Research InstituteElectronic cash system based on a blind certificate
US20060136514A1 (en)*1998-09-012006-06-22Kryloff Sergey ASoftware patch generator
US7264152B2 (en)*1999-04-192007-09-04First Data CorporationAnonymous transaction authentication
US6514420B2 (en)*1999-06-212003-02-04Access Business Group International LlcPoint-of use water treatment system
US6760756B1 (en)*1999-06-232004-07-06Mangosoft CorporationDistributed virtual web cache implemented entirely in software
US7099898B1 (en)*1999-08-122006-08-29International Business Machines CorporationData access system
US20020184485A1 (en)*1999-12-202002-12-05Dray James F.Method for electronic communication providing self-encrypting and self-verification capabilities
US7640181B2 (en)*2000-02-172009-12-29Hart Intercivic, Inc.Distributed network voting system
US20020106192A1 (en)*2000-06-012002-08-08Yoichiro SakoContents data, recording medium, recording method and device, reproducing method and device
US20030159032A1 (en)*2000-08-162003-08-21Edgardo GerckAutomatically generating unique, one-way compact and mnemonic voter credentials that support privacy and security services
US7734924B2 (en)*2000-09-082010-06-08Identrust, Inc.System and method for transparently providing certificate validation and other services within an electronic transaction
US20020120563A1 (en)*2000-09-192002-08-29Mcwilliam William J.System and method for effecting anonymous payments
US7243156B2 (en)*2000-11-012007-07-10Digital Integrator, Inc.Information distribution method and system
US7681228B2 (en)*2000-11-032010-03-16Authernative, Inc.Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions
US20020099666A1 (en)*2000-11-222002-07-25Dryer Joseph E.System for maintaining the security of client files
US7640432B2 (en)*2000-12-112009-12-29International Business Machines CorporationElectronic cash controlled by non-homomorphic signatures
US20020077887A1 (en)*2000-12-152002-06-20Ibm CorporationArchitecture for anonymous electronic voting using public key technologies
US6988196B2 (en)*2000-12-222006-01-17Lenovo (Singapore) Pte LtdComputer system and method for generating a digital certificate
US7475258B2 (en)*2001-01-172009-01-06Microsoft CorporationExclusive encryption
US7478243B2 (en)*2001-03-212009-01-13Microsoft CorporationOn-disk file format for serverless distributed file system with signed manifest of file modifications
US7401220B2 (en)*2001-03-212008-07-15Microsoft CorporationOn-disk file format for a serverless distributed file system
US20040195323A1 (en)*2001-07-062004-10-07Dennis VaduraSystems and methods for electronic voting
US20030053625A1 (en)*2001-09-102003-03-20The Titan CorporationSelf-synchronizing, stream-oriented data encryption technique
US20050273603A1 (en)*2001-10-302005-12-08Girard Luke EMechanism to improve authentication for remote management of a computer system
US7474751B2 (en)*2001-12-132009-01-06Huawei Technologies Co., Ltd.Method of selecting encrypting arithmetric for realizing communication of secrecy
US20030120928A1 (en)*2001-12-212003-06-26Miles CatoMethods for rights enabled peer-to-peer networking
US20030187853A1 (en)*2002-01-242003-10-02Hensley Roy AustinDistributed data storage system and method
US7272717B2 (en)*2002-02-282007-09-18Kabushiki Kaisha ToshibaSystem of authentication, apparatus, program and method
US20030163413A1 (en)*2002-02-282003-08-28Wiczkowski Frank T.Method of conducting anonymous transactions over the internet
US20050043858A1 (en)*2002-07-162005-02-24Alexander GelmanAtomic self-healing architecture
US7239605B2 (en)*2002-09-232007-07-03Sun Microsystems, Inc.Item and method for performing a cluster topology self-healing process in a distributed data system cluster
US20060149972A1 (en)*2002-11-132006-07-06Guoshun DengMethod for realizing security storage and algorithm storage by means of semiconductor memory device
US20040255037A1 (en)*2002-11-272004-12-16Corvari Lawrence J.System and method for authentication and security in a communication system
US20040117303A1 (en)*2002-12-162004-06-17Hermogenes GamboaApparatus and anonymous payment system (ASAP) for the internet and other networks
US20040199768A1 (en)*2003-04-042004-10-07Nail Robert A.System and method for enabling enterprise application security
US20050004947A1 (en)*2003-06-302005-01-06Emlet James L.Integrated tool set for generating custom reports
US20050076110A1 (en)*2003-07-112005-04-07Boban MathewGeneric inbox system and method
US7466824B2 (en)*2003-10-092008-12-16Nortel Networks LimitedMethod and system for encryption of streamed data
US7281006B2 (en)*2003-10-232007-10-09International Business Machines CorporationSystem and method for dividing data into predominantly fixed-sized chunks so that duplicate data chunks may be identified
US7313565B2 (en)*2004-02-192007-12-25Microsoft CorporationData overlay, self-organized metadata overlay, and associated methods
US20060023887A1 (en)*2004-04-022006-02-02Agrawal Dharma PThreshold and identity-based key management and authentication for wireless ad hoc networks
US7463264B2 (en)*2004-05-142008-12-09PixarMethod and system for distributed serverless file management
US20050289086A1 (en)*2004-06-282005-12-29Afariogun Abdul A OAnonymous payment system
US20060020788A1 (en)*2004-07-022006-01-26Ncr CorporationSelf-service terminal
US20060047944A1 (en)*2004-09-012006-03-02Roger Kilian-KehrSecure booting of a computing device
US7383406B2 (en)*2004-11-192008-06-03International Business Machines CorporationApplication transparent autonomic availability on a storage area network aware file system
US20060126848A1 (en)*2004-12-152006-06-15Electronics And Telecommunications Research InstituteKey authentication/service system and method using one-time authentication code
US20060161781A1 (en)*2005-01-182006-07-20Robert RiceAutomated notary acknowledgement
US20060177094A1 (en)*2005-01-212006-08-10Mr. Robert SmithA system for embedding, extracting, and executing self-governing behavior and use controls within digital medium content
US7506010B2 (en)*2005-02-082009-03-17Pro Softnet CorporationStoring and retrieving computer data files using an encrypted network drive file system
US20070136604A1 (en)*2005-12-062007-06-14Motorola, Inc.Method and system for managing secure access to data in a network
US20070250700A1 (en)*2006-04-212007-10-25Microsoft CorporationPeer-to-peer contact exchange

Cited By (146)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9811671B1 (en)2000-05-242017-11-07Copilot Ventures Fund Iii LlcAuthentication method and system
US9818249B1 (en)2002-09-042017-11-14Copilot Ventures Fund Iii LlcAuthentication method and system
US8045693B2 (en)*2004-09-132011-10-25Oki Electric Industry Co., Ltd.Message reception confirmation method, communications terminal and message reception confirmation system
US20060059224A1 (en)*2004-09-132006-03-16Oki Electric Industry Co., Ltd.Message reception confirmation method, communications terminal and message reception confirmation system
US9596317B2 (en)2007-07-072017-03-14Qualcomm IncorporatedMethod and system for delivery of targeted information based on a user profile in a mobile communication device
US20090048977A1 (en)*2007-07-072009-02-19Qualcomm IncorporatedUser profile generation architecture for targeted content distribution using external processes
US9497286B2 (en)2007-07-072016-11-15Qualcomm IncorporatedMethod and system for providing targeted information based on a user profile in a mobile environment
US20090011740A1 (en)*2007-07-072009-01-08Qualcomm IncorporatedMethod and system for providing targeted information based on a user profile in a mobile environment
US20090013024A1 (en)*2007-07-072009-01-08Qualcomm IncorporatedMethods and systems for providing targeted information using identity masking in a wireless communications device
US9485322B2 (en)2007-07-072016-11-01Qualcomm IncorporatedMethod and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment
US20090319329A1 (en)*2007-07-072009-12-24Qualcomm IncorporatedUser profile generation architecture for mobile content-message targeting
US9398113B2 (en)*2007-07-072016-07-19Qualcomm IncorporatedMethods and systems for providing targeted information using identity masking in a wireless communications device
US9392074B2 (en)2007-07-072016-07-12Qualcomm IncorporatedUser profile generation architecture for mobile content-message targeting
US20090216847A1 (en)*2007-11-142009-08-27Qualcomm IncorporatedMethod and system for message value calculation in a mobile environment
US9705998B2 (en)2007-11-142017-07-11Qualcomm IncorporatedMethod and system using keyword vectors and associated metrics for learning and prediction of user correlation of targeted content messages in a mobile environment
US20090125517A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethod and system for keyword correlation in a mobile environment
US9203912B2 (en)2007-11-142015-12-01Qualcomm IncorporatedMethod and system for message value calculation in a mobile environment
US20090125585A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethod and system for using a cache miss state match indicator to determine user suitability of targeted content messages in a mobile environment
US9203911B2 (en)2007-11-142015-12-01Qualcomm IncorporatedMethod and system for using a cache miss state match indicator to determine user suitability of targeted content messages in a mobile environment
US20090124241A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethod and system for user profile match indication in a mobile environment
US20090125321A1 (en)*2007-11-142009-05-14Qualcomm IncorporatedMethods and systems for determining a geographic user profile to determine suitability of targeted content messages based on the profile
US20090157834A1 (en)*2007-12-142009-06-18Qualcomm IncorporatedMethod and system for multi-level distribution information cache management in a mobile environment
US9391789B2 (en)2007-12-142016-07-12Qualcomm IncorporatedMethod and system for multi-level distribution information cache management in a mobile environment
US11924356B2 (en)2008-04-232024-03-05Copilot Ventures Fund Iii LlcAuthentication method and system
US11600056B2 (en)2008-04-232023-03-07CoPilot Ventures III LLCAuthentication method and system
US12212690B2 (en)2008-04-232025-01-28Copilot Ventures Fund Iii LlcAuthentication method and system
US9846814B1 (en)2008-04-232017-12-19Copilot Ventures Fund Iii LlcAuthentication method and system
US11200439B1 (en)2008-04-232021-12-14Copilot Ventures Fund Iii LlcAuthentication method and system
US10275675B1 (en)2008-04-232019-04-30Copilot Ventures Fund Iii LlcAuthentication method and system
US9792384B2 (en)*2009-02-262017-10-17Red Hat, Inc.Remote retreival of data files
US20100228737A1 (en)*2009-02-262010-09-09Red Hat, Inc.HTTP Range Checksum
US20110078779A1 (en)*2009-09-252011-03-31Song LiuAnonymous Preservation of a Relationship and Its Application in Account System Management
US20130133050A1 (en)*2010-08-062013-05-23Panasonic CorporationDevice for sharing anonymized information, and method for sharing anonymized information
US8752149B2 (en)*2010-08-062014-06-10Panasonic CorporationDevice for sharing anonymized information, and method for sharing anonymized information
US10263978B1 (en)*2010-11-292019-04-16Amazon Technologies, Inc.Multifactor authentication for programmatic interfaces
US8776190B1 (en)*2010-11-292014-07-08Amazon Technologies, Inc.Multifactor authentication for programmatic interfaces
US9998435B1 (en)*2011-03-082018-06-12Ciphercloud, Inc.System and method to anonymize data transmitted to a destination computing device
US20120284794A1 (en)*2011-05-022012-11-08Architecture Technology CorporationPeer integrity checking system
US9754130B2 (en)*2011-05-022017-09-05Architecture Technology CorporationPeer integrity checking system
US11354446B2 (en)2011-05-022022-06-07Architecture Technology CorporationPeer integrity checking system
US9628471B1 (en)*2011-05-032017-04-18Symantec CorporationProtecting user identity at a cloud using a distributed user identity system
US10540349B2 (en)2011-06-142020-01-21Microsoft Technology Licensing, LlcRecommending data enrichments
US9147195B2 (en)*2011-06-142015-09-29Microsoft Technology Licensing, LlcData custodian and curation system
US10721220B2 (en)2011-06-142020-07-21Microsoft Technology Licensing, LlcData custodian and curation system
US10044757B2 (en)2011-10-112018-08-07Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US11134104B2 (en)2011-10-112021-09-28Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US10469534B2 (en)2011-10-112019-11-05Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US10063595B1 (en)2011-10-112018-08-28Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US10402546B1 (en)2011-10-112019-09-03Citrix Systems, Inc.Secure execution of enterprise applications on mobile devices
US9411749B2 (en)2012-01-262016-08-09Upthere, Inc.Chunk-level client side encryption in hierarchical content addressable storage systems
US8631209B2 (en)*2012-01-262014-01-14Upthere, Inc.Reusable content addressable stores as building blocks for creating large scale storage infrastructures
US9052824B2 (en)2012-01-262015-06-09Upthere, Inc.Content addressable stores based on sibling groups
US9176871B1 (en)2012-01-262015-11-03Upthere, Inc.Garbage collection of chunks
US9075834B2 (en)2012-01-262015-07-07Upthere, Inc.Detecting deviation between replicas using bloom filters
US9183212B2 (en)2012-01-262015-11-10Upthere, Inc.Representing directory structure in content-addressable storage systems
US9207866B2 (en)2012-01-262015-12-08Upthere, Inc.Chunk-level client side encryption in hierarchical content addressable storage systems
US20130198462A1 (en)*2012-01-262013-08-01Bertrand SerletReusable content addressable stores as building blocks for creating large scale storage infrastructures
US11082355B2 (en)2012-02-142021-08-03Airwatch, LlcControllng distribution of resources in a network
US11483252B2 (en)2012-02-142022-10-25Airwatch, LlcControlling distribution of resources on a network
US10951541B2 (en)2012-02-142021-03-16Airwatch, LlcControlling distribution of resources on a network
US12081452B2 (en)2012-02-142024-09-03Airwatch LlcControlling distribution of resources in a network
US9547770B2 (en)2012-03-142017-01-17Intralinks, Inc.System and method for managing collaboration in a networked secure exchange environment
US9355384B2 (en)2012-03-192016-05-31David W. VictorProviding access to documents requiring a non-disclosure agreement (NDA) in an online document sharing community
US10878041B2 (en)2012-03-192020-12-29David W. VictorProviding different access to documents in an online document sharing community depending on whether the document is public or private
US9594767B2 (en)2012-03-192017-03-14David W. VictorProviding access to documents of friends in an online document sharing community based on whether the friends' documents are public or private
US9875239B2 (en)2012-03-192018-01-23David W. VictorProviding different access to documents in an online document sharing community depending on whether the document is public or private
US9280794B2 (en)2012-03-192016-03-08David W. VictorProviding access to documents in an online document sharing community
US9807078B2 (en)2012-04-272017-10-31Synchronoss Technologies, Inc.Computerized method and system for managing a community facility in a networked secure collaborative exchange environment
US9654450B2 (en)2012-04-272017-05-16Synchronoss Technologies, Inc.Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys
WO2013163625A1 (en)2012-04-272013-10-31Intralinks, Inc.Computerized method and system for managing networked secure collaborative exchange
US10142316B2 (en)2012-04-272018-11-27Intralinks, Inc.Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment
AU2013251304B2 (en)*2012-04-272018-12-20Intralinks, Inc.Computerized method and system for managing networked secure collaborative exchange
US9596227B2 (en)2012-04-272017-03-14Intralinks, Inc.Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment
US9553860B2 (en)2012-04-272017-01-24Intralinks, Inc.Email effectivity facility in a networked secure collaborative exchange environment
US9369455B2 (en)2012-04-272016-06-14Intralinks, Inc.Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment
US10356095B2 (en)2012-04-272019-07-16Intralinks, Inc.Email effectivity facilty in a networked secure collaborative exchange environment
EP2842070A4 (en)*2012-04-272015-12-09Intralinks Inc COMPUTERIZED METHOD AND SYSTEM FOR MANAGING NETWORKED SECURE PARTICIPATORY EXCHANGES
US9397998B2 (en)2012-04-272016-07-19Intralinks, Inc.Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys
US9369454B2 (en)2012-04-272016-06-14Intralinks, Inc.Computerized method and system for managing a community facility in a networked secure collaborative exchange environment
US20140067668A1 (en)*2012-08-292014-03-06Bank Of America CorporationRemote Safe Locking and Control
WO2014035585A1 (en)*2012-08-292014-03-06Bank Of America CorporationRemote safe locking and control
US9973489B2 (en)2012-10-152018-05-15Citrix Systems, Inc.Providing virtualized private network tunnels
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US10545748B2 (en)2012-10-162020-01-28Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US10908896B2 (en)2012-10-162021-02-02Citrix Systems, Inc.Application wrapping for application management framework
US20150350278A1 (en)*2013-01-192015-12-03Trondert OüSecure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system
US20180124056A1 (en)*2013-03-112018-05-03Amazon Technologies, Inc.IMMEDIATE POLlCY EFFECTIVENESS IN EVENTUALLY CONSISTENT SYSTEMS
US9853979B1 (en)*2013-03-112017-12-26Amazon Technologies, Inc.Immediate policy effectiveness in eventually consistent systems
US10230730B2 (en)*2013-03-112019-03-12Amazon Technologies, Inc.Immediate policy effectiveness in eventually consistent systems
US10911457B2 (en)2013-03-112021-02-02Amazon Technologies, Inc.Immediate policy effectiveness in eventually consistent systems
US11824644B2 (en)2013-03-142023-11-21Airwatch, LlcControlling electronically communicated resources
US9401915B2 (en)*2013-03-152016-07-26Airwatch LlcSecondary device as key for authorizing access to resources
US20140282846A1 (en)*2013-03-152014-09-18SkySocket, LLCSecondary device as key for authorizing access to resources
US20160337347A1 (en)*2013-03-152016-11-17Airwatch LlcSecondary device as key for authorizing access to resources
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
US10097584B2 (en)2013-03-292018-10-09Citrix Systems, Inc.Providing a managed browser
US10476885B2 (en)2013-03-292019-11-12Citrix Systems, Inc.Application with multiple operation modes
US10701082B2 (en)2013-03-292020-06-30Citrix Systems, Inc.Application with multiple operation modes
US10965734B2 (en)2013-03-292021-03-30Citrix Systems, Inc.Data management for an application with multiple operation modes
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US20140365542A1 (en)*2013-06-062014-12-11Hon Hai Precision Industry Co., Ltd.Data processing system and method
US9043613B2 (en)2013-06-282015-05-26International Business Machines CorporationMultiple volume encryption of storage devices using self encrypting drive (SED)
US9342466B2 (en)2013-06-282016-05-17Globalfoundries Inc.Multiple volume encryption of storage devices using self encrypting drive (SED)
US9992190B2 (en)*2013-08-222018-06-05Nippon Telegraph And Telephone CorporationMulti-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
US20160197906A1 (en)*2013-08-222016-07-07Nippon Telegraph And Telephone CorporationMulti-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
US10346937B2 (en)2013-11-142019-07-09Intralinks, Inc.Litigation support in cloud-hosted file sharing and collaboration
US9514327B2 (en)2013-11-142016-12-06Intralinks, Inc.Litigation support in cloud-hosted file sharing and collaboration
US9363264B2 (en)*2013-11-252016-06-07At&T Intellectual Property I, L.P.Networked device access control
US20150150101A1 (en)*2013-11-252015-05-28At&T Intellectual Property I, L.P.Networked device access control
US10097543B2 (en)2013-11-252018-10-09At&T Intellectual Property I, L.P.Networked device access control
US10318384B2 (en)*2013-12-052019-06-11Google LlcDistributing data on distributed storage systems
US11113150B2 (en)2013-12-052021-09-07Google LlcDistributing data on distributed storage systems
US10678647B2 (en)2013-12-052020-06-09Google LlcDistributing data on distributed storage systems
US11620187B2 (en)2013-12-052023-04-04Google LlcDistributing data on distributed storage systems
US20160299815A1 (en)*2013-12-052016-10-13Google Inc.Distributing Data on Distributed Storage Systems
US12019519B2 (en)2013-12-052024-06-25Google LlcDistributing data on distributed storage systems
US20150170120A1 (en)*2013-12-162015-06-18Samsung Electronics Co., Ltd.Method of providing payment services and messenger server using the method
US20150256515A1 (en)*2014-03-062015-09-10Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US10554627B2 (en)*2014-03-062020-02-04Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US20170091750A1 (en)*2014-03-122017-03-30Enrico MaimTransactional system with peer-to-peer distributed architecture for exchanging units of account
US11210647B2 (en)*2014-03-122021-12-28Enrico MaimTransactional system with peer-to-peer distributed architecture for exchanging units of account
US9367631B2 (en)2014-04-182016-06-14Revolution Technologies, Inc.Dynamic directory and content communication
US9613190B2 (en)2014-04-232017-04-04Intralinks, Inc.Systems and methods of secure data exchange
US9762553B2 (en)2014-04-232017-09-12Intralinks, Inc.Systems and methods of secure data exchange
WO2016033208A1 (en)*2014-08-262016-03-03Hoyos Labs Ip Ltd.System and methods for secure file sharing and access management
US10194266B2 (en)2014-12-222019-01-29Airwatch LlcEnforcement of proximity based policies
US9813247B2 (en)2014-12-232017-11-07Airwatch LlcAuthenticator device facilitating file security
US20160275294A1 (en)*2015-03-162016-09-22The MaidSafe FoundationData system and method
US10033702B2 (en)2015-08-052018-07-24Intralinks, Inc.Systems and methods of secure data exchange
US10021397B2 (en)*2015-09-282018-07-10Renesas Electronics CorporationSemiconductor device
US10491570B2 (en)*2015-12-242019-11-26Ingenico GroupMethod for transmitting data, method for receiving data, corresponding devices and programs
US20180083772A1 (en)*2016-09-202018-03-22Daniel Patrick MullarkeyPerpetual encryption system, method, and software program product
US11297060B1 (en)*2016-12-302022-04-05Charles Schwab & Co., IncSystem and method for handling user requests for web services
US11595475B2 (en)2018-02-272023-02-28Elasticsearch B.V.Self-replicating management services for distributed computing architectures
US11108857B2 (en)*2018-02-272021-08-31Elasticsearch B.V.Self-replicating management services for distributed computing architectures
US12069146B2 (en)2018-02-272024-08-20Elasticsearch B.V.Management services for distributed computing architectures using rolling changes
US11636220B2 (en)*2019-02-012023-04-25Intertrust Technologies CorporationData management systems and methods
CN111338574A (en)*2020-02-202020-06-26平安科技(深圳)有限公司Block chain-based data self-repairing method, device, medium and electronic equipment
CN111414415A (en)*2020-02-262020-07-14北斗(天津)科学技术应用研究院(有限合伙)Decentralized information storage node communication network system and method
RU2748966C1 (en)*2020-02-262021-06-02Акционерное общество "Лаборатория Касперского"Method for synchronisation of anonymous identifiers
CN111817914A (en)*2020-06-302020-10-23晨边高地(无锡)科技有限公司Medium-high frequency algorithm transaction interface intelligent system
US20240056291A1 (en)*2020-12-242024-02-15Klarytee LtdData security methods
CN113644915A (en)*2021-07-012021-11-12中国科学院空天信息创新研究院 A data compression method, a data compression device, and an electronic device
US20230334489A1 (en)*2022-04-152023-10-19Bank Of America CorporationDynamic Quantum Enabled Method for Large Currency Transaction Exemption Using Distributed Hash Chain
US20230334482A1 (en)*2022-04-152023-10-19Bank Of America CorporationDynamic Quantum Enabled Method for Large Currency Transaction Exemption using Distributed Hash Chain
CN117473483A (en)*2023-12-272024-01-30四川省数字证书认证管理中心有限公司Electronic seal and off-line authorization method thereof

Also Published As

Publication numberPublication date
CA2707531A1 (en)2008-06-05
US20120210120A1 (en)2012-08-16
CA2768014A1 (en)2008-06-05
US8788803B2 (en)2014-07-22
EP2472430A1 (en)2012-07-04
IN2009KN02415A (en)2015-08-07
GB2444342A (en)2008-06-04
CN102750494A (en)2012-10-24
CN101627395A (en)2010-01-13
GB0624053D0 (en)2007-01-10
CN102750494B (en)2016-01-20
WO2008065341A3 (en)2008-07-17
AU2007327389A1 (en)2008-06-05
GB0709759D0 (en)2007-06-27
US20130061049A1 (en)2013-03-07
EP2118808A2 (en)2009-11-18
GB2446199A (en)2008-08-06
WO2008065341A2 (en)2008-06-05

Similar Documents

PublicationPublication DateTitle
US8788803B2 (en)Self-encryption process
US9411976B2 (en)Communication system and method
US20150006895A1 (en)Distributed network system
US20100058054A1 (en)Mssan
CN1833398B (en)Secure data parser method and system
CN102932136B (en)Systems and methods for managing cryptographic keys
US20040255137A1 (en)Defending the name space
CN105071936A (en)Systems and methods for secure data sharing
CN104079573A (en)Systems and methods for securing data in the cloud
CN101401341A (en)Secure data parsing method and system
WO2008065345A1 (en)Cyber cash
GB2444339A (en)Shared access to private files in a distributed network
WO2008065343A1 (en)Shared access to private files
WO2008065349A1 (en)Worldwide voting system
AU2012202853B2 (en)Self encryption
WO2008065346A2 (en)Secure messaging and data sharing
WO2008065348A2 (en)Perpetual data
WO2008065347A2 (en)Mssan
GB2444344A (en)File storage and recovery in a Peer to Peer network
GB2444341A (en)Distributed network messenger system with SPAM filtering, encryption, digital signing and digital contract generation
GB2439969A (en)Perpetual data on a peer to peer network
HK1186605A (en)Secure data parser method and system
HK1186595A (en)Secure data parser method and system
HK1186596A (en)Secure data parser method and system

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp