US 12,282,582 B2
Compromise free cloud data encryption and security
Henry R. Williams, Montclair, NJ (US)
Assigned to Mayida Zaal; and Edward Bialek
Filed by Mayida Zaal, Montclair, NJ (US); and Edward Bialek, Woodbridge, CT (US)
Filed on Apr. 29, 2022, as Appl. No. 17/733,133.
Application 17/733,133 is a continuation of application No. 16/563,647, filed on Sep. 6, 2019, abandoned.
Application 16/563,647 is a continuation of application No. 15/428,812, filed on Feb. 9, 2017, granted, now 10,445,524, issued on Oct. 15, 2019.
Application 15/428,812 is a continuation of application No. 14/487,259, filed on Sep. 16, 2014, granted, now 9,607,170, issued on Mar. 28, 2017.
Claims priority of provisional application 61/988,125, filed on May 2, 2014.
Prior Publication US 2023/0087628 A1, Mar. 23, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 12/14 (2006.01); G06F 21/86 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/6245 (2013.01) [G06F 12/1408 (2013.01); G06F 21/6218 (2013.01); G06F 21/6227 (2013.01); G06F 21/86 (2013.01); H04L 63/0428 (2013.01); H04L 63/0435 (2013.01); H04L 63/0442 (2013.01); H04L 63/083 (2013.01); H04L 63/108 (2013.01); H04L 63/166 (2013.01); G06F 2212/1052 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
a central computing authority; and
a network of computing devices, at least some of the computing devices being pod computing devices physically hosted by an operator, wherein
each of the pod computing devices comprises hardware that is separate from hardware of each other pod computing device of the pod computing devices;
each of the pod computing devices is allocated to a single user computing device; and
the pod computing devices include a first pod computing device that is allocated to a first user computing device such that access to encrypted user data stored within the first pod computing device is limited to the first user computing device, the first pod computing device comprising:
a central processing unit;
computer readable storage media in data communication with the central processing unit and storing data instructions therein executable by the central processing unit, the computer readable storage media comprising:
volatile memory;
non-volatile memory in data communication with the central processing unit;
a data communication device configured to securely communicate, using encrypted communications, across a data communication network with the first user computing device, the central computing authority, and other computing devices in the network;
wherein the data instructions are executable by the central processing unit to cause the central processing unit to:
receive a first user identifier, a first password, and a private key from a first user assigned to the first pod computing device using the data communication device;
store the first user identifier and the password in the computer readable storage media to identify the first user as the owner of the first pod computing device; and
store the private key in the volatile memory, such that the private key is erased from the computer readable storage media when the volatile memory loses power;
a database storing encrypted user data in the non-volatile memory, wherein the encrypted user data is encrypted using the private key of the first user, such that the encrypted user data is not accessible to the operator hosting the first pod computing device;
wherein the data instructions are further executable by the central processing device to cause the central processing unit to:
decrypt, using the private key, the encrypted user data and store unencrypted user data in the volatile memory for access by the first user computing device.