SECURE LOOKUP
First Claim
Patent Images
1. A method, executed on a computer system, for secure data transformation and lookup comprising:
- encrypting, by the computer system, a data value to create an encrypted value;
generating, by the computer system, a hash value based on the encrypted value;
performing, by the computer system, a modulo operation on the hash value to create a modulo value;
retrieving, by the computer system, a transformed value from a lookup table by using the modulo value as an index for the look up table; and
providing, by the computer system, the transformed value.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system.
16 Citations
19 Claims
-
1. A method, executed on a computer system, for secure data transformation and lookup comprising:
-
encrypting, by the computer system, a data value to create an encrypted value; generating, by the computer system, a hash value based on the encrypted value; performing, by the computer system, a modulo operation on the hash value to create a modulo value; retrieving, by the computer system, a transformed value from a lookup table by using the modulo value as an index for the look up table; and providing, by the computer system, the transformed value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for secure data transformation and lookup comprising:
-
a look up table comprising transformed values, each with a corresponding index; a processor, configured to; receive a data value to be transformed; encrypt the data value to create an encrypted value; generate a hash value based on the encrypted value; perform a modulo operation on the hash value to create a modulo value; retrieve, from the lookup table, a transformed value by using the modulo value as the index; and providing the transformed value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product, tangibly embodied in a non-transitory computer-readable storage medium, for secure data transformation and lookup, the computer program product including instructions operable to cause a processor to:
-
encrypt a data value to create an encrypted value; generate a hash value based on the encrypted value; perform a modulo operation on the hash value to create a modulo value; retrieve a transformed value from a lookup table by using the modulo value as an index for the look up table; and provide the transformed value. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method, executed on a computer system, for secure data transformation and lookup comprising:
-
retrieving, by the computer system, a data value from a production database; encrypting, by the computer system, the data value to create an encrypted value; generating, by the computer system, a hash value based on the encrypted value; performing, by the computer system, a modulo operation on the hash value to create a modulo value; retrieving, by the computer system, a lookup table from a memory; retrieving, by the computer system, a transformed value from the lookup table by using the modulo value as an index for the look up table; and transmitting, by the computer system, the transformed value to a non-production computer system.
-
Specification