Computer-Implemented System And Method For Storing And Retrieving Sensitive Information
First Claim
Patent Images
1. A computer-implemented system for storing and retrieving sensitive information, comprising:
- a database to maintain segments of encrypted sensitive data each encrypted via a single use encryption key and associated with a reference code;
a reference receipt module to receive the reference code for at least one of the segments of encrypted sensitive data;
a key module to recreate the encryption key based on the received reference code;
a decryption module to decrypt the encrypted sensitive data segment using the recreated encryption key; and
a population module to populate a field in a display with the decrypted sensitive data segment.
16 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for storing and retrieving sensitive information is provided. Segments of sensitive data each encrypted via a single use encryption key and associated with a reference code are maintained. The reference code is received for at least one of the segments of encrypted sensitive data and the encryption key is recreated based on the received reference code. The encrypted sensitive data segment is decrypted using the recreated encryption key and the decrypted sensitive data segment populates a field in a display.
47 Citations
20 Claims
-
1. A computer-implemented system for storing and retrieving sensitive information, comprising:
-
a database to maintain segments of encrypted sensitive data each encrypted via a single use encryption key and associated with a reference code; a reference receipt module to receive the reference code for at least one of the segments of encrypted sensitive data; a key module to recreate the encryption key based on the received reference code; a decryption module to decrypt the encrypted sensitive data segment using the recreated encryption key; and a population module to populate a field in a display with the decrypted sensitive data segment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for storing and retrieving sensitive information, comprising:
-
maintaining segments of encrypted sensitive data each encrypted via a single use encryption key and associated with a reference code; receiving the reference code for at least one of the segments of encrypted sensitive data; recreating the encryption key based on the received reference code; decrypting the encrypted sensitive data segment using the recreated encryption key; and populating a field in a display with the decrypted sensitive data segment. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification