Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Accessing protected data on network storage from multiple devices

A network and device technology, which is applied in the field of accessing protected data on network storage from multiple devices, and can solve complex and advanced key management operations and other problems

Inactive Publication Date: 2007-03-28
NOKIA TECH OY
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another major problem you will encounter when designing an Authorized Domain is the resulting trade-off that must be made between a high level of security on the one hand and the desire to limit complexity when dealing with encryption / decryption keys on the other hand
Often, high levels of security imply complex and advanced key management operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accessing protected data on network storage from multiple devices
  • Accessing protected data on network storage from multiple devices
  • Accessing protected data on network storage from multiple devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] 1 shows a plurality of devices, such as mobile phones 101, computers 102, personal digital assistants (PDAs) 103, servers 104, etc., interconnected by a network 100 such as the Internet, wireless local area network (WLAN), public switched telephone network (PSTN), etc. . An Authorized Domain is usually defined as a set of interconnected trusted devices that are allowed to access a set of resources or services. This interconnection can be achieved through, for example, a radio interface, an infrared interface, a cable interface, or the like. In FIG. 1 , mobile phone 101 , computer 102 and PDA 103 are domain member devices that store data on network server 104 .

[0044] One of the main advantages of the present invention is that the web server does not need to be included in the authorized domain. The server can be any (unreliable) storage provider.

[0045] In an Authorized Domain as shown in Figure 1, a domain management application is envisioned that allows the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and a system of securely storing data on a network (100) for access by an authorized domain (101, 102, 103), which authorized domain includes at least two devices that share a confidential domain key (K), and an authorized domain management system for securely storing data on a network for access by an authorized domain. The present invention enables any member device to store protected data on the network such that any other member device can access the data in plaintext without having to communicate with the device that actually stored the data.

Description

technical field [0001] The present invention relates to a method for securely storing data on a network for access by devices belonging to an Authorized Domain, an Authorized Domain Management system for securely storing data on a network for storage by devices belonging to an Authorized Domain, to be included in a A master device in an authorized domain management system for securely storing data on a network, a candidate device to be included in an authorized domain management system for securely storing data on a network, removing from an authorized domain A method for a device, a system for removing a device belonging to an authorized domain from an authorized domain, a computer program comprising computer-executable parts for causing a device to perform the inventive method, for controlling access to data stored on a network A method and system for controlling access to data stored on a network. Background technique [0002] Storage of data on a network is a way of all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/22H04L9/00H04L9/08H04L9/30
CPCH04L63/062H04L63/10H04L9/0844H04L9/08H04L9/30H04L9/0891H04L2209/805H04L9/0894
Inventor N·阿索坎P·金斯布尔格S·莫洛尼T·苏伊克霍
Owner NOKIA TECH OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products