Ooma, Inc.
Securing access to user data stored in a cloud computing environment

Last updated:

Abstract:

Systems and methods for securing access to user data stored in a networked location are described herein. A first user device may generate data that a user may desire to keep private. The generated data may be transmitted to, and stored at, a networked location, which then makes it vulnerable to malicious attack or exposure to unintended recipients. To protect the user data stored at the networked location, a recursive data file signature is generated for each stored data file. In order to access the stored data file, the user needs to provide the data file signature. In addition, every time the user data is accessed by the user, the data file signature is changed. In this way, the exposed data file signature will no longer be valid if an unauthorized entity tries to access the user data.

Status:
Grant
Type:

Utility

Filling date:

3 Jul 2019

Issue date:

5 Oct 2021