SECURE APPLICATION ACCESS SYSTEM
First Claim
Patent Images
1. A method, comprising:
- requesting, by a first device, an encrypted record from a second device;
receiving, by the first device, an encrypted record from a second device;
decrypting, by the first device, the received encrypted record as decrypted data;
creating, by the first device, an index of keywords;
searching the decrypted data, when a keyword in the index is encountered in the decrypted data, associating an encrypted record location identifier in the index with the encountered keyword.
5 Assignments
0 Petitions
Accused Products
Abstract
A proxy server creates an index of keywords, receives an encrypted record, decrypts the received encrypted record as decrypted data and, when a keyword in the index is encountered in the decrypted data, associates in the index an encrypted record location identifier with the encountered keyword. The proxy server receives a search query and uses the keyword index to retrieve encrypted records from the server. The encrypted records are decrypted and sent as search results in response to the search query.
90 Citations
30 Claims
-
1. A method, comprising:
-
requesting, by a first device, an encrypted record from a second device; receiving, by the first device, an encrypted record from a second device; decrypting, by the first device, the received encrypted record as decrypted data; creating, by the first device, an index of keywords; searching the decrypted data, when a keyword in the index is encountered in the decrypted data, associating an encrypted record location identifier in the index with the encountered keyword. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
a subsystem at a first device, implemented at least partially in hardware, that requests an encrypted record from a second device; a subsystem at a first device, implemented at least partially in hardware, that receives an encrypted record from a second device; a subsystem at a first device, implemented at least partially in hardware, that decrypts the received encrypted record as decrypted data; a subsystem at a first device, implemented at least partially in hardware, that creates an index of keywords; a subsystem at a first device, implemented at least partially in hardware, that searches the decrypted data, when a keyword in the index is encountered in the decrypted data, associates an encrypted record location identifier in the index with the encountered keyword. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable medium, storing software instructions, which when executed by one or more processors cause performance of:
-
requesting, by a first device, an encrypted record from a second device; receiving, by the first device, an encrypted record from a second device; decrypting, by the first device, the received encrypted record as decrypted data; creating, by the first device, an index of keywords; searching the decrypted data, when a keyword in the index is encountered in the decrypted data, associating an encrypted record location identifier in the index with the encountered keyword. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification