Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data
First Claim
1. A computerized method of securing data in a plurality of security controlled data stores with:
- access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising;
storing separately sensitive content in secure data stores of said plurality of security data stores; and
permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores.
2 Assignments
0 Petitions
Accused Products
Abstract
The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words).
483 Citations
20 Claims
-
1. A computerized method of securing data in a plurality of security controlled data stores with:
- access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising;
storing separately sensitive content in secure data stores of said plurality of security data stores; and permitting reconstruction of some or all of said data with appropriate access controls applied to respective secure data stores. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
- access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising;
Specification