Meta-complete data storage
First Claim
Patent Images
1. A method for securely storing data comprising:
- encrypting a clear-text datum;
storing the encrypted datum; and
storing metadata about the encrypted datum.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the encryption of the data, systems and methods of providing secure access to real world data through data transformations, and systems and methods of managing security parameters for data.
174 Citations
25 Claims
-
1. A method for securely storing data comprising:
-
encrypting a clear-text datum; storing the encrypted datum; and storing metadata about the encrypted datum. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
2. The method of claim 2, wherein the combined length of the encrypted datum and the metadata being equal to or less than the length of the clear-text datum.
-
9. A method for providing selective access to a string of characters comprising:
-
encrypting a first subset of the string of characters; and combining the first subset of characters with an unencrypted subset of the string of characters to produce a partially encrypted string. - View Dependent Claims (10, 11, 12)
-
-
13. A method of secure, error-resistant data storage, the method comprising:
-
encrypting at least one datum using an initialization value; storing a recovery value for the initialization value; and storing an integrity value for one or more of the at least one datum. - View Dependent Claims (14, 15, 16)
-
-
17. A data management user interface for a data field comprising:
a GUI element for selecting a data policy option for each character in the data field. - View Dependent Claims (18, 19, 20, 21, 22)
-
23. A method of data storage comprising:
-
encrypting one or more characters of a datum; storing the encrypted characters with one or more clear text characters of the datum; searching on the clear text characters to produce a subset of records; and searching on the encrypted characters of the subset of records. - View Dependent Claims (24, 25)
-
Specification