SECURE DATA PARSER METHOD AND SYSTEM
4 Assignments
0 Petitions
Accused Products
Abstract
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
-
Citations
19 Claims
-
1. (canceled)
-
2. A method for securing a data set, the method comprising:
-
encrypting the data set using an encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set; generating encryption key information that is capable of being used to generate the encryption key, wherein the encryption key information is distributed among the at least two portions of data; storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data. - View Dependent Claims (3, 4)
-
-
5. A method for securing a data set, the method comprising:
-
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set; encrypting the at least two portions of data using the encryption key; generating encryption key information that is capable of being used to generate the encryption key, wherein the encryption key information is distributed among the at least two portions of data; storing the at least two encrypted portions of data separately from each other; and restoring the data set using a subset of the at least two encrypted portion of data. - View Dependent Claims (6, 7)
-
-
8. A method for securing a data set, the method comprising:
-
encrypting the data set using an encryption key; transforming the encryption key using an All or Nothing Transform into a transformed encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set; generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data; storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data. - View Dependent Claims (9)
-
-
10. A method for securing a data set, the method comprising:
-
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set; encrypting each of the at least two portions of data using an encryption key into at least two portions of encrypted data; transforming the encryption key using an All or Nothing Transform into a transformed encryption key; generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data; storing each of the at least two portions of encrypted data separately; and restoring the data set from at least a subset of the at least two portions of data. - View Dependent Claims (11)
-
-
12. A method for securing a data set, the method comprising:
-
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set; transforming the splitting key using an All or Nothing Transform into a transformed splitting key; generating transformed splitting key information that is capable of being used to generate the transformed splitting key, wherein the transformed splitting key information is distributed among the at least two portions of data; storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data. - View Dependent Claims (13)
-
-
14. A method for securing a data set, the method comprising:
-
encrypting the data set using an encryption key into an encrypted data set; encrypting the encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set; storing each of the at least two portions of the encrypted data set separately; restoring the encrypted data set from at least a subset of the at least two portions of the encrypted data set; decrypting the encryption key; and decrypting the data set from the encrypted data set using the encryption key. - View Dependent Claims (15)
-
-
16. A method for securing a data set, the method comprising:
-
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set; encrypting the at least two portions of data using an encryption key into at least two encrypted portions of data; encrypting the encryption key; storing each of the at least two encrypted portions of data separately; and restoring the data set from at least a subset of the at least two encrypted portions of data, the restoring comprising; decrypting the encryption key, and decrypting the at least a subset of the at least two encrypted portions of data using the encryption key. - View Dependent Claims (17)
-
-
18. A method for securing a data set, the method comprising:
-
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set; encrypting the splitting key using an encryption key; storing each of the at least two portions of the data set separately; and restoring the data set from at least a subset of the at least two portions of the data set, the restoring comprising; decrypting the splitting key, and restoring, using the splitting key, the data set from the at least a subset of the at least two portions of data. - View Dependent Claims (19)
-
Specification