The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 25, 2018

Filed:

Apr. 16, 2018
Applicant:

Xage Security, Inc., Palo Alto, CA (US);

Inventors:

Susanto Junaidi Irwan, San Francisco, CA (US);

Roman M. Arutyunov, San Jose, CA (US);

Alexander Michael Valderrama, Palo Alto, CA (US);

Assignee:

XAGE SECURITY, INC., Palo Alto, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/30 (2006.01); H04L 9/08 (2006.01); H04L 9/06 (2006.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01);
U.S. Cl.
CPC ...
H04L 9/3093 (2013.01); H04L 9/0637 (2013.01); H04L 9/085 (2013.01); H04L 9/0861 (2013.01); H04L 9/14 (2013.01); H04L 9/321 (2013.01);
Abstract

In an embodiment, a computer-implemented data security method comprises: at a first computing device, receiving security service data from a first digital data repository; using the first computing device, generating hidden security service data by generating a plurality of shares of the security service data; using the first computing device, encrypting each share of the plurality of shares using a separate public key from among a plurality of public keys corresponding to each of a plurality of second computing devices, to generate a plurality of encrypted shares; electronically storing the plurality of encrypted shares as data in a second digital data repository; using a subset of the plurality of second computing devices, in response to receiving an authentication request from a third computing device to access one or more fourth computing devices, decrypting a subset of the plurality of encrypted shares using a subset of separate private keys corresponding to each of the subset of the plurality of second computing devices to generate a plurality of decrypted shares; forming and storing a readable copy of the hidden security service data using the plurality of decrypted shares; using the readable copy of the hidden security service data, performing authentication services for the third computing device to grant or deny access to the one or more fourth computing devices.


Find Patent Forward Citations

Loading…