CALAMU TECHNOLOGIES CORPORATION (20240330486). SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK simplified abstract

From WikiPatents
Revision as of 11:50, 8 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK

Organization Name

CALAMU TECHNOLOGIES CORPORATION

Inventor(s)

Ophir Rachman of Sunnyvale CA (US)

Eric Sites of Palm Harbor FL (US)

Matthew Wilkinson of Gainesville FL (US)

Blake Emmons of Louisville KY (US)

Matt Meuse of Quechee VT (US)

Kelly Mclaughlin of South Plainfield NJ (US)

Lauren Miehe of East Wenatchee WA (US)

Paul Lewis of Asbury NJ (US)

SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240330486 titled 'SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK

Simplified Explanation:

This patent application describes a cloud-based system that securely stores data in cloud technology-specific data objects called "buckets" by splitting the data into fragments, encrypting them, and distributing them among multiple cloud storage providers. When a user requests access to the data, the system retrieves and reconstructs the data from the encrypted fragments.

  • Key Features and Innovation:
   - Secure storage of data in cloud-specific buckets
   - Fragmentation and encryption of data for enhanced security
   - Distribution of encrypted fragments among multiple cloud storage providers
   - Reconstruction of data upon user request

Potential Applications: This technology can be applied in various industries such as healthcare, finance, and government where secure storage and access to sensitive data are crucial.

Problems Solved: - Ensures secure storage of data in the cloud - Protects data from unauthorized access - Provides a reliable method for data retrieval and reconstruction

Benefits: - Enhanced data security - Redundant storage across multiple cloud providers - Efficient data retrieval and reconstruction process

Commercial Applications: Secure cloud storage solutions for industries handling sensitive data, data backup and recovery services, and secure file sharing platforms.

Prior Art: Prior research in the field of secure cloud storage systems and methods for data encryption and distribution.

Frequently Updated Research: Stay updated on advancements in cloud security, data encryption techniques, and multi-cloud storage solutions.

Questions about Cloud-Based Secure Data Storage: 1. How does this technology ensure the security of data stored in the cloud? 2. What are the potential challenges of distributing data fragments among multiple cloud storage providers?


Original Abstract Submitted

a cloud-based system and method for securely storing data formed into cloud technology-specific data objects (hereinafter, “buckets”) by an s3 gateway, comprising obtaining a source data bucket from the s3 gateway; splitting the data bucket into at least three fragments; encrypting the fragments using an encryption key associated with the fragments and distributing the encrypted fragments among at least three cloud storage providers, and creating a pointer file containing information for retrieving the encrypted fragments. when a system user requests access to the data, the system ensures the request is legitimate, then uses the information stored in the pointer file to retrieve the stored encrypted bucket fragments from the plurality of clouds, decrypts the fragments and reconstructs the data buckets, and provides data access to the s3 gateway.