×

Storing data in a server computer with deployable encryption/decryption infrastructure

  • US 10,241,930 B2
  • Filed: 03/22/2018
  • Issued: 03/26/2019
  • Est. Priority Date: 12/08/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for configuring a second computer to store data in a data-storage structure, wherein the data originates from a first computer that is communicatively connected to the second computer, and wherein the data is processed by an application in the second computer, the method comprising:

  • deploying an infrastructure having two configurations and configured to be deployed in a first configuration or a second configuration to the second computer, the infrastructure including implementing a forwarder module, a crypto module and a key control module;

    receiving a key trigger from the first computer;

    generating and storing a key by the key control module based upon receiving the key trigger from the first computer;

    responsive to deploying the infrastructure in the first configuration,receiving, by the forwarder module, the data from the first computer and identifying a data portion of the data for encryption,encrypting, by the crypto module, the data portion with the key,forwarding, by the forwarder module, the encrypted data portion to the application,reading, by the forwarder module, an encrypted data portion from the application for decryption,decrypting, by the crypto module, the encrypted data portion with the key, andforwarding, by the forwarder module, the decrypted data portion to the first computer;

    responsive to deploying the infrastructure in the second configuration,receiving, by the forwarder module, the data from the application and identifying the data portion of the data for encryption,encrypting, by the crypto module, the data portion with the key,forwarding, by the forwarder module, the encrypted data portion to the data-storage structure,reading, by the forwarder module, an encrypted data portion from the data-storage structure for decryption,decrypting, by the crypto module, the encrypted data portion with the key, andforwarding, by the forwarder module, the decrypted data portion to the application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×