SECURE APPLICATION ACCESS SYSTEM
First Claim
Patent Images
1. A method, comprising:
- receiving, over a network, by a proxy server, a file to be encrypted;
creating, by the proxy server, an index of keywords;
encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword.
5 Assignments
0 Petitions
Accused Products
Abstract
A proxy server creates an index of keywords, receives at least a portion of a file, and, when a keyword in the index is encountered in the at least a portion of the file as the at least a portion of the file is being encrypted, associates in the index an encrypted record location identifier with the encountered keyword. The proxy server receives a search query and uses the keyword index to retrieve encrypted records from the server. The encrypted records are decrypted and sent as search results in response to the search query.
-
Citations
30 Claims
-
1. A method, comprising:
-
receiving, over a network, by a proxy server, a file to be encrypted; creating, by the proxy server, an index of keywords; encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10)
-
-
6. (canceled)
-
11. An apparatus, comprising:
-
a subsystem at a proxy server, implemented at least partially in hardware, that receives, over a network, a file to be encrypted; a subsystem at the proxy server, implemented at least partially in hardware, that creates an index of keywords; an encryption subsystem at the proxy server, implemented at least partially in hardware, that encrypts the file, when a keyword in the index is encountered in the file as the file is being encrypted, associates in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (12, 13, 14, 15, 17, 18, 19, 20)
-
-
16. (canceled)
-
21. A non-transitory computer readable medium, storing software instructions, which when executed by one or more processors cause performance of:
-
receiving, over a network, by a proxy server, a file to be encrypted; creating, by the proxy server, an index of keywords; encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (22, 23, 24, 25, 27, 28, 29, 30)
-
-
26. (canceled)
Specification