Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Fhoosh Inc patents


Recent patent applications related to Fhoosh Inc. Fhoosh Inc is listed as an Agent/Assignee. Note: Fhoosh Inc may have other listings under different names/spellings. We're not affiliated with Fhoosh Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "F" | Fhoosh Inc-related inventors


Secure high speed data storage, access, recovery, and transmission

A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a second fragment associated with a second original record locator; obfuscating the first original record locator to generate a first obfuscated record locator and the second original record locator to generate a second obfuscated record locator; encrypting the first fragment using a first encryption key and the second fragment using a second encryption key; and storing, to at least a first of a plurality of storage locations, the first encrypted fragment with the corresponding first obfuscated record locator and the second encrypted fragment with the second obfuscated record locator.. . ... Fhoosh Inc

Systems and methods for secure storage of user information in a user profile

A method for authenticated communications between devices, includes: establishing communications for data streaming between a first device and a second device; establishing a shared key; exchanging the shared key between the first device and the second device; encrypting a dataset by the first device using the shared key; decrypting the dataset by the second device using the shared key; evaluating key regeneration criteria to determine whether the shared key should be regenerated; in response to determining that the shared key should be regenerated, generating a new shared key, and encrypting a next dataset by the first device using the new shared key.. . ... Fhoosh Inc

Systems and methods for secure storage of user information in a user profile

A method for storing a first data object, includes: on a client device, decomposing the first data object into a first fragment associated with a first original record locator and a second fragment associated with a second original record locator; on the client device, obfuscating the first original record locator to generate a first obfuscated record locator and the second original record locator to generate a second obfuscated record locator; on the client device, encrypting the first fragment using a first encryption key and the second fragment using a second encryption key; and storing, to at least a first of a plurality of storage locations, the first encrypted fragment with the corresponding first obfuscated record locator and the second encrypted fragment with the second obfuscated record locator.. . ... Fhoosh Inc

Systems and methods for secure storage of user information in a user profile

A system for storing and managing credentials and encryption keys, includes: a first data store and a second data store; a client device configured to transmit a request to retrieve user data stored in the first data store; a secure key platform configured to: store user credentials and data store credentials in the second data store separate from the user data stored in the first data store; receive, from the client device, the request to retrieve user data stored in the first data store; retrieve, from the second data store, user credentials associated with a user of the client device and data store credentials associated with the first data store in response to the request to retrieve user data; use the user credentials of the user of the client device and data store credentials of the first data store to retrieve user data from the first data store; and provide the user data to the client device.. . ... Fhoosh Inc

Systems and methods for secure storage of user information in a user profile

Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of information disclosed during a security breach. Information pertaining to a user is obtained from one or more sources and organized into a user profile and securely stored in a database. ... Fhoosh Inc

Systems and methods for secure storage and management of credentials and encryption keys

A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform. The client device is configured to transmit a request to retrieve user data stored in the first data store. ... Fhoosh Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Fhoosh Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Fhoosh Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###