Secure high speed data storage, access, recovery, and transmission
First Claim
1. A method for retrieving a data object, the method comprising:
- receiving a query comprising a field identifier and a field value related to the field identifier;
determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers;
in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator;
identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and
decrypting and forwarding the one or more encrypted values as a response to the query.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for retrieving a data object. An example method includes: receiving a query comprising a field identifier and a field value related to the field identifier; determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and decrypting and forwarding the one or more encrypted values as a response to the query.
160 Citations
25 Claims
-
1. A method for retrieving a data object, the method comprising:
-
receiving a query comprising a field identifier and a field value related to the field identifier; determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and decrypting and forwarding the one or more encrypted values as a response to the query. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for retrieving a data object, the system comprising:
-
a plurality of data storage locations; a secure platform comprising one or more processors coupled to at least one memory, the secure platform configured to; receive a query comprising a field identifier and a field value related to the field identifier; determine the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscate at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identify one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an existing record locator that matches the record locator; and decrypt and forwarding the one or more encrypted values as a response to the query. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification