METHODS, DEVICES, AND MEDIA FOR SECURELY UTILIZING A NON-SECURED, DISTRIBUTED, VIRTUALIZED NETWORK RESOURCE WITH APPLICATIONS TO CLOUD-COMPUTING SECURITY AND MANAGEMENT
First Claim
1. A method for securing information by transforming the information into individually-unintelligible parts, the method comprising the steps of:
- (a) dividing an original data stream into a set of split data streams;
(b) applying a first invertible transformation function to said split data streams, said step of applying producing an intermediate set of data streams; and
(c) extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses methods for securing information by transforming the information into individually-unintelligible parts, methods include: dividing an original data stream into a set of split data streams; applying a first invertible transformation function to the split data streams, the step of applying producing an intermediate set of data streams; and extracting a final set of data streams from the intermediate set by applying a selection rule which produces the final set, thereby transforming the original data stream into individually-unintelligible parts in the final set. Preferably, the method further includes: applying a second invertible transformation function to the final set to produce the intermediate set, wherein the second invertible transformation is an inverse function of the first invertible transformation; extracting the split streams from the intermediate set by applying a selection rule which produces the split data streams; and reconstructing the original data stream from the split data streams.
-
Citations
12 Claims
-
1. A method for securing information by transforming the information into individually-unintelligible parts, the method comprising the steps of:
-
(a) dividing an original data stream into a set of split data streams; (b) applying a first invertible transformation function to said split data streams, said step of applying producing an intermediate set of data streams; and (c) extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable storage medium having computer-readable code embodied on the non-transitory computer-readable storage medium, the computer-readable code comprising:
-
(a) program code for dividing an original data stream into a set of split data streams; (b) program code for applying a first invertible transformation function to said split data streams, said applying producing an intermediate set of data streams; and (c) program code for extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (6, 7, 8)
-
-
9. A device for securing information by transforming the information into individually-unintelligible parts, the device comprising:
-
(a) a data-processing unit including; (i) a CPU for performing computational operations; and (ii) a memory module for storing data; and (b) a deployed security mechanism, residing on said data-processing unit, configured for; (i) dividing an original data stream into a set of split data streams; (ii) applying a first invertible transformation function to said split data streams, said step of applying producing an intermediate set of data streams; and (iii) extracting a final set of data streams from said intermediate set by applying a selection rule which produces said final set, thereby transforming said original data stream into individually-unintelligible parts in said final set. - View Dependent Claims (10, 11, 12)
-
Specification