SECURE DATA PARSER METHOD AND SYSTEM
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity.
2 Citations
31 Claims
-
1. (canceled)
-
2. A method performed by a programmed computer system for securing a data set in a computer network, the method comprising:
-
a. producing a plurality of data shares, wherein each share comprises at least some but less than all of the data set; b. substantially randomly assigning the data shares to a plurality of available data share receiving locations within the computer network; and c. storing the data shares in the assigned receiving locations. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for securing a data set in a computer network, the system comprising:
- one or more hardware processors configured to;
d. produce a plurality of data shares, wherein each share comprises at least some but less than all of the data set; e. substantially randomly assign the data shares to a plurality of available data share receiving locations within the computer network; and f. store the data shares in the assigned receiving locations. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
- one or more hardware processors configured to;
-
22. A non-transitory computer readable medium comprising instructions thereon for securing a data set in a computer network, the instructions comprising:
-
g. instructions for producing a plurality of data shares, wherein each share comprises at least some but less than all of the data set; h. instructions for substantially randomly assigning the data shares to a plurality of available data share receiving locations within the computer network; and i. instructions for storing the data shares in the assigned receiving locations. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification