Data security
First Claim
1. A method of creating a data file containing encrypted data, the method comprising the steps of:
- receiving a plaintext data having one or more data structures, each data structure having one or more fields containing plaintext data;
encrypting at least one field of plaintext data with an encryption algorithm to create encrypted data;
creating an encrypted data file; and
storing the encrypted data in the fields of the encrypted data file.
0 Assignments
0 Petitions
Accused Products
Abstract
Data Security methods, computer programs, and systems for encrypting and decrypting data, process sharing, and redundancy. The invention provides techniques for encryption including the encryption of a structured data file where each smallest unit of the data file (e.g., a field in a database record) is encrypted separately. The invention also provides techniques for decrypting such an encrypted data file. Requested fields of data are decrypted, stored in temporary memory, and displayed to the user or used to complete a task. Once the display is over or the task is completed, the decrypted data in temporary memory is deleted. The invention also provides techniques for real time process sharing and redundancy that utilize system characteristics to determine the apportionment of processes.
114 Citations
33 Claims
-
1. A method of creating a data file containing encrypted data, the method comprising the steps of:
-
receiving a plaintext data having one or more data structures, each data structure having one or more fields containing plaintext data;
encrypting at least one field of plaintext data with an encryption algorithm to create encrypted data;
creating an encrypted data file; and
storing the encrypted data in the fields of the encrypted data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for decrypting an encrypted data file comprising the steps of:
-
providing an encrypted data file, the encrypted data file having two or more data structures, each data structure having one or more fields containing encrypted data;
receiving a request to decrypt encrypted data in one or more of the fields; and
decrypting the requested data into plaintext data. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method for sharing processes among two or more networked computers in real time, the method comprising the steps of:
-
(1) receiving a request to execute a process;
(2) determining if a networked computer N is within a predetermined activity threshold;
(3) executing the process with the first networked computer if it is determined to be within the predetermined activity threshold; and
(4) repeating steps (2) to (4) with respect to networked computer N+1 if networked computer N is not within the predetermined activity threshold. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method for redundantly storing data among a plurality of networked computers in real time, the method comprising the steps of:
-
executing a process on a first computer, wherein the process amends, adds, and/or deletes data stored on the first computer;
determining if any of one or more of a second group of computers, other than the first computer, are within a predetermined activity threshold;
sending instructions to execute the process to each computer of the second group of computers determined to be within the predetermined activity threshold; and
placing instructions to execute the process in a queue for each computer in the second group of computers determined not to be within the predetermined activity threshold. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A method for controlling entry to a location, the method comprising the steps of:
-
receiving a request for entry to a location, the request including identification information of a requester;
decrypting a database entry associated with the requester'"'"'s identification information, wherein the database entry indicates whether or not the requester is allowed entry to the location;
allowing or denying entry based on the database entry. - View Dependent Claims (32, 33)
-
Specification