Searchable Encrypted Data
First Claim
1. A data encryption computer, comprising:
- a processor; and
a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising;
receiving a plurality of sensitive data records comprising personal information of different users;
identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user;
generating a searchable field index for each of the one or more searchable fields;
encrypting the sensitive data records using a database encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key.
124 Citations
17 Claims
-
1. A data encryption computer, comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising; receiving a plurality of sensitive data records comprising personal information of different users; identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user; generating a searchable field index for each of the one or more searchable fields; encrypting the sensitive data records using a database encryption key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
receiving, by a processor, personal information of a user; generating, by the processor, one or more index values, each associated with a searchable field index, using the personal information; sending, by the processor, the one or more index values; receiving, by the processor, one or more encrypted data records matching the index values; and decrypting, by the processor, the encrypted data records using a database decryption key. - View Dependent Claims (8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
receiving, by a processor, one or more index values for searchable field indices, wherein the index values are generated using personal information of a user; retrieving, by the processor, one or more encrypted data records using the index values; and sending, by the processor, the one or more encrypted data records. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification