METHOD AND SYSTEM OF SECURING DATA OVER NETWORKS
First Claim
1. A method for securing data in an application layer of a network architecture, the method comprising:
- receiving, in the application layer on a transmitter computing device, a information package in the form a human-readable report;
parsing, in the application layer on the transmitter computing device, the information package into a plurality of discrete components, Wherein at least one of the components can be grouped with another component, the components sharing a common contextual relationship;
replacing, in the application layer on the transmitter computing device, a first parsed group of components from the information package with random strings, wherein the components are replaced by the random strings in a pre-determined order;
creating, in the application layer on the transmitter computing device, multiple derived packets, wherein the random strings forms one derived packet, the replaced first parsed group of components forms another derived packet and the combination of the inserted random strings and the remaining unaltered strings forms a third derived packet;
9 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems described herein can secure and deliver data over a network. A recipient computer requests a human-readable report from a transmitter computer that initiates a software application to generate a report using data from a backend database. In the application layer, the combination of the report and data is parsed and certain components are replaced to form multiple derived packets of the random strings, the replaced strings, and the combined unaltered string with random strings. The replacement is performed in a pre-determined order that can be a mathematical or logical function. The derived packets are encrypted at the application layer. Further, the receiving computer, in the application layer, decrypts the packets, then finds and replaces the random strings in the combined derived packet, thereby recreating the human-readable report.
-
Citations
23 Claims
-
1. A method for securing data in an application layer of a network architecture, the method comprising:
-
receiving, in the application layer on a transmitter computing device, a information package in the form a human-readable report; parsing, in the application layer on the transmitter computing device, the information package into a plurality of discrete components, Wherein at least one of the components can be grouped with another component, the components sharing a common contextual relationship; replacing, in the application layer on the transmitter computing device, a first parsed group of components from the information package with random strings, wherein the components are replaced by the random strings in a pre-determined order; creating, in the application layer on the transmitter computing device, multiple derived packets, wherein the random strings forms one derived packet, the replaced first parsed group of components forms another derived packet and the combination of the inserted random strings and the remaining unaltered strings forms a third derived packet; - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for rendering secured data in an application layer of a network architecture, the method comprising:
-
receiving, in the application layer on a recipient computing device, encrypted derived packets from the network; decrypting, in the application layer on the recipient computing device, the derived packets; searching, in the application layer on the recipient computing device, through the decrypted derived packets to identify a random derived packet containing random strings, an original derived packet containing original data strings is a pre-determined order and a combination derived packet containing the combined random strings and remaining unaltered strings; parsing, in the application layer on the recipient computing device, the combination derived packet to find the random strings listed in the random derived packet; and replacing, in the application layer on the recipient computing device, the random strings with the original data strings from the original derived packet after resolving the pre-determined order of replacement, thereby creating a human-readable report. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for securing data in an application layer of a network architecture, the method comprising:
-
receiving, in the application layer on a transmitter computing device, a information package in the form a human-readable report; parsing, in the application layer on the transmitter computing device, the information package into a plurality of discrete components, wherein at least one of the components can be grouped with another component, the components sharing a common contextual relationship; replacing, in the application layer on the transmitter computing device, a first parsed group of components from the information package with random strings, wherein the components are replaced by the random strings in a pre-determined order; creating, in the application layer on the transmitter computing device, multiple derived packets, wherein the random strings forms one derived packet, the replaced first parsed group of components forms another derived packet and the combination of the inserted random strings and the remaining unaltered strings forms a third derived packet; transmitting each derived packet from the transmitter computing device over a network to a recipient computing device; receiving, in the application layer the recipient computing device, derived packets from the network; searching, in the application layer on the recipient computing device, through the decrypted derived packets to identify a random derived packet containing the random strings, an original derived packet containing the replaced first parsed group of components is a pre-determined order and a combination derived packet containing the combined random strings and remaining unaltered strings; parsing, in the application layer on the recipient computing device, the combination derived packet to find the random strings listed in the random derived packet; and replacing, in the application layer on the recipient computing device, the random strings with the original data strings from the original derived packet after resolving the pre-determined order of replacement, thereby re-creating the human-readable report. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification