METHOD AND SYSTEM FOR FULLY ENCRYPTED REPOSITORY
First Claim
1. A method for using information in conjunction with a data repository, the method comprising:
- encrypting data associated with the information with an encryption key;
sending at least the encrypted data to the data repository;
receiving a request for the information from a remote device;
sending a request for the encrypted data to the data repository;
receiving at least part of the encrypted data from the data repository;
decrypting the at least part of the encrypted data; and
sending the information to the remote device.
6 Assignments
0 Petitions
Accused Products
Abstract
According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.
-
Citations
20 Claims
-
1. A method for using information in conjunction with a data repository, the method comprising:
-
encrypting data associated with the information with an encryption key; sending at least the encrypted data to the data repository; receiving a request for the information from a remote device; sending a request for the encrypted data to the data repository; receiving at least part of the encrypted data from the data repository; decrypting the at least part of the encrypted data; and sending the information to the remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for protecting information, the system comprising:
-
a data repository configured to; receive encrypted data; receive a first request for the encrypted data; and send the encrypted data in response to the first request; and a user module operating on a user device, configured to; receive a second request for information from a remote device; send the first request for the encrypted data to the data repository; receive the encrypted data from the data repository; recover the information from the encrypted data; and send at least the information to the remote device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. An information protection system comprising:
-
a user device coupled to a network and including a data processor and a non-transitory computer-readable storage medium comprising a plurality of computer-readable instructions tangibly embodied on the computer-readable storage medium, which, when executed by a data processor, provide encrypted data protection, the plurality of instructions comprising; instructions that cause the data processor to encrypt data associated with the information with an encryption key; instructions that cause the data processor to send at least the encrypted data to the data repository; instructions that cause the data processor to receive a request for the information from a remote device; instructions that cause the data processor send a request for the encrypted data to the data repository; instructions that cause the data processor to receive the encrypted data from the data repository; instructions that cause the data processor to decrypt the encrypted data using the encryption key; and instructions that cause the data processor to send the information to the remote device.
-
Specification