ENHANCING DATA SECURITY USING RE-ENCRYPTION
First Claim
Patent Images
1. A system, comprising:
- a data source configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage; and
a data warehouse server configured to perform operations comprising;
decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups methodology;
re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and
correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers.
2 Assignments
0 Petitions
Accused Products
Abstract
A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups algorithm; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers.
18 Citations
28 Claims
-
1. A system, comprising:
-
a data source configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage; and a data warehouse server configured to perform operations comprising; decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups methodology; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
decrypting usage data, by a data warehouse server, using a two-way rolling key groups algorithm, the usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage; re-encrypting, by the data warehouse server, the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating, by the data warehouse server, the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium storing computer-executable instructions executable by a computing device to provide operations comprising:
-
decrypting usage data using a two-way rolling key groups algorithm, the usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium storing computer-executable instructions executable by a computing device to provide operations comprising:
-
maintaining a group assignment indicating ranges of subscriber identifiers and associated rolling key groups, each range of subscriber identifiers being associated with a different rolling key group; identifying a rolling key group to which a particular subscriber identifier is assigned by determining which of the ranges of subscriber identifiers includes the particular subscriber identifier; encrypting user data associated with the particular subscriber identifier into an encrypted record according to a two-way encryption key associated with the identified rolling key group; and including in the encrypted record an indication of the identified rolling key group to facilitate decrypting the encrypted user data. - View Dependent Claims (25, 26, 27, 28)
-
Specification