SYSTEMS AND METHODS FOR SECURITY HARDENING OF DATA IN TRANSIT AND AT REST VIA SEGMENTATION, SHUFFLING AND MULTI-KEY ENCRYPTION
First Claim
1. A method for hardening the security, confidentiality and privacy of a file, the method comprising:
- segmenting at a first computer system a file into a plurality of file segments; and
encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for security hardening of a file in transit and at rest via segmentation, shuffling and multi-key encryption are presented. The method including segmenting at a first computer system a file into a plurality of file segments, and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. Additionally included is bidirectional data transformation of a file by obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity
53 Citations
27 Claims
-
1. A method for hardening the security, confidentiality and privacy of a file, the method comprising:
-
segmenting at a first computer system a file into a plurality of file segments; and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for decrypting a file, the method comprising:
-
receiving at a first computer system file description data comprising a plurality of encrypted encryption keys and a plurality of encrypted file segments; decrypting the plurality of encrypted encryption keys in order to obtain a plurality of encryption keys; decrypting the plurality of encrypted file segments in order to obtain a plurality of file segments; and combining each file segment in the plurality of file segments so as to generate a copy of the file. - View Dependent Claims (20, 21)
-
-
22. A system for hardening the security, confidentiality and privacy of a file, the system comprising:
-
one or more processors; and memory, including instructions executable by the one or more processors to cause the system to at least; divide a file at a first computer system into a plurality of file segments, wherein a size of each file segment of the plurality of file segments is configurable; and encrypt the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. - View Dependent Claims (23, 24)
-
-
25. A system for decrypting a file, the system comprising:
-
one or more processors; and memory, including instructions executable by the one or more processors to cause the system to at least; receive a plurality of file segments and encrypted file description data; decrypt the identity of each of the file segments in the plurality of file segments and of an encryption key that is associated with each file segment in the plurality of file segments; download a plurality of encrypted file segments generated from the plurality of file segments; decrypt each encrypted file segment of the plurality of encrypted file segments using the encryption key that is associated with each file segment in the plurality of file segments; and combine each decrypted file segment into a copy of a file.
-
-
26. A method for hardening the security, confidentiality, and privacy of a file, the method comprising:
-
obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity; mapping the obfuscated digital values of the file to the digital values of the file; transferring the obfuscated digital values of the file to a second computer system; and using the obfuscated digital values of the file as an input to search, query, or otherwise reference back as output to the first computer system. - View Dependent Claims (27)
-
Specification