Data security through dissembly of data elements or connections between elements
First Claim
Patent Images
1. A method for providing data security comprising the steps of:
- identifying an original table having a primary key and multiple data fields;
replicating the original table in a replicate table;
adding a new primary key and a link field to the replicate table;
removing an element from the replicate table; and
storing the element removed in a secure location, with no direct linkage between the new primary key and the element removed from the replicate table;
requesting the new primary key;
retrieving the new primary key associated with the element stored in the secure location;
presenting the new primary key and the link field to the secure location to retrieve the element stored in the secure location; and
combining the element, stored in the secure location, with the replicate table.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique for providing data security through the removal of elements of a database table, be they the data fields themselves, or structural components, such as connection information that defines how, for example, the elements of a database are structured. The removed elements are placed in a secure location, retrievable only by having knowledge of a new primary key stored with the removed elements.
-
Citations
32 Claims
-
1. A method for providing data security comprising the steps of:
-
identifying an original table having a primary key and multiple data fields;
replicating the original table in a replicate table;adding a new primary key and a link field to the replicate table; removing an element from the replicate table; and storing the element removed in a secure location, with no direct linkage between the new primary key and the element removed from the replicate table; requesting the new primary key; retrieving the new primary key associated with the element stored in the secure location; presenting the new primary key and the link field to the secure location to retrieve the element stored in the secure location; and combining the element, stored in the secure location, with the replicate table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for providing data security comprising:
-
a storage unit an, for storing an original table; a replicate data store, for storing a new primary key, a link field and a replicate of the original; table in which a selected removed element of the original table is not stored; a secure location, for storing the removed element and a replicate of the new primary key, with no direct linkage between the removed element of the replicate of the original table and the new primary key; a connection, to request the new primary key and the link field to reconstruct a data table; and a second storage unit to store the reconstructed data table which originated from portions of the replicate data store and at least one element retrieved from the secure location. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification