METHOD FOR STORING AND RECOVERING DATA, UTILIZATION OF THE METHOD IN A STORAGE CLOUD, STORAGE SERVER AND COMPUTER PROGRAM PRODUCT
    11.
    发明申请
    METHOD FOR STORING AND RECOVERING DATA, UTILIZATION OF THE METHOD IN A STORAGE CLOUD, STORAGE SERVER AND COMPUTER PROGRAM PRODUCT 有权
    存储和恢复数据的方法,存储云中的方法的使用,存储服务器和计算机程序产品

    公开(公告)号:US20120203990A1

    公开(公告)日:2012-08-09

    申请号:US13366676

    申请日:2012-02-06

    申请人: Christoph König

    发明人: Christoph König

    IPC分类号: G06F12/14

    摘要: A method for storing data in which the data to be stored is divided into a plurality of source blocks, each source block subjected to steps including defining a block key for the source block based on a random function, encrypting the source block by utilizing the defined block key, selecting at least one first storage location and one second storage location from a plurality of different available storage locations, storing control data that includes information on the defined block key at the first selected storage location, and storing encrypted data that includes information on the encrypted source block at the second selected storage location.

    摘要翻译: 一种用于存储要存储的数据的数据被划分为多个源块的方法,每个源块经历了包括基于随机函数定义源块的块密钥的步骤,利用定义的源加密源块 块密钥,从多个不同的可用存储位置中选择至少一个第一存储位置和一个第二存储位置,存储包括在所述第一所选存储位置处的所定义的块密钥的信息的控制数据,以及存储包括关于 在第二选择的存储位置处的加密的源块。

    COMPUTER SECURITY METHOD, SYSTEM AND MODEL
    12.
    发明申请
    COMPUTER SECURITY METHOD, SYSTEM AND MODEL 审中-公开
    计算机安全方法,系统与模型

    公开(公告)号:US20120159624A1

    公开(公告)日:2012-06-21

    申请号:US12974328

    申请日:2010-12-21

    申请人: Christoph König

    发明人: Christoph König

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: A computer security method includes receiving a security alert associated with an electronic attack to at least one computer system of a data network, identifying a first set of business services which may be affected by the electronic attack, estimating, based on an identified first set of potentially affected business services, a first potential cost to a business when the electronic attack is successful, identifying at least one counteraction which may be employed to prevent or mitigate the electronic attack, identifying a second set of business services which may be affected by the at least one counteraction, estimating, based on the identified second set of potentially affected business services, a second potential cost to the business when the counteraction is employed, and comparing the first potential cost and the second potential cost.

    摘要翻译: 一种计算机安全方法包括:接收与数据网络的至少一个计算机系统的电子攻击相关联的安全警报,识别可能受电子攻击影响的第一组业务服务,基于所识别的第一组 可能受影响的商业服务,当电子攻击成功时,企业的首要潜在成本,确定可能被用于防止或减轻电子攻击的至少一种抵制,识别可能受到电子攻击影响的第二组商业服务 至少一个反作用力,基于所识别的第二组可能受影响的商业服务估计在采用反作用时业务的第二潜在成本,以及比较第一潜在成本和第二潜在成本。