Data Security, by credentials, lock with no availability.

Sai Vikram
InfoSec Write-ups
Published in
2 min readJul 6, 2021

--

Securing the data with credentials, username and password. credentials will be not available at any storage either in app or in drive, which also works in offline.

Locking data.

  • Data which is sent to lock, can be encrypted Data and it’s keys. Data could also be non-encrypted, which could encrypt in app and then lock the encrypted data.
  • The data is send to converter and locked with credentials where the locked data comes back to the system storage as selected by user where to store in system.
  • There would be no Available of any sort of data in the converter, not even the data size of 1bit.

UnLocking data.

  • The locked data which was stored by user in his storage is sent to the converter to unlock the data, where there fore the converter unlocks the locked data with input of credentials, if only the credentials are correct, data will be unlocked.
  • Then unlocked data is sent to the designated storage of his system selected by the user.
  • The credentials input at login can be customised by user to three, after username and password, with a four letter sequence input by clicking on the number buttons.
  • Each converter is designated with different id in programming itself, so though username and password is used to un-lock the data, data will be unlocked only with particular id based devices.
  • authority of technology provider would look after by not providing same id based devices to other clients, which would be a legal issue to technology provider, if not followed as terms.

--

--