×

Method and Apparatus for Securing Data in a Memory Device

  • US 20120300931A1
  • Filed: 06/28/2012
  • Published: 11/29/2012
  • Est. Priority Date: 05/25/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing information in a local memory device, the method comprising the steps of:

  • coupling the local memory device to a first terminal,applying, at the first terminal, the following steps;

    applying a cipher to the original data to obtain enciphered data,generating a seed number,utilizing the seed number as a lookup key, retrieving a first bit string from a first lookup table,dividing the enciphered data to a first portion of data units and a second portion of data units, wherein the second portion is formed by removing from the enciphered data the units of data corresponding to selected bits of the first bit string, and the first portion is formed from the remaining data units of the enciphered data,storing the first portion in the local memory device;

    sending the second portion and the seed number via a data link for storage in a remote memory device connected to a network server;

    removing the local memory device from the first terminal;

    coupling the local memory device to a second terminal,applying, at the second terminal, the following steps;

    receiving a read request at the second terminal targeted to the original data;

    sending to the server the read request for obtaining the second portion and the seed number;

    upon a successful access rights authentication of the read request at the server resulting in an authorized read request, retrieving via a data link the second portion and the seed data stored in the remote memory device;

    utilizing the seed number as a lookup key, retrieving a second bit string from a second lookup table, wherein the first bit string and second bit string are identical,combining the first portion stored in the local memory device and the retrieved second portion by placing the units of data of the second portion into their original positions among the units of data in the first portion in conformity with the selected bits of the second bit string, wherein the combination of the first and second data portions reconstructs the enciphered data; and

    deciphering the enciphered data to obtain the original data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×