Information storage system
First Claim
1. A system for storing information having a predetermined use which requires said information to be secured, including:
- a client system for generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and
a remote server for storing said second data with an encoded identifier generated from said identifier.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data, (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data. Accordingly, only part of the information to be secured is stored locally on the client system, whilst the other part is stored on the remote server, and neither the client system nor the remote server have a record of the entire information.
-
Citations
22 Claims
-
1. A system for storing information having a predetermined use which requires said information to be secured, including:
-
a client system for generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and a remote server for storing said second data with an encoded identifier generated from said identifier. - View Dependent Claims (2, 3)
-
-
4. A system for storing information having a predetermined use which requires said information to be secured, including:
-
a client system for storing an encoded version of said information and an identifier, the encoded information having been generated from first data of said information and an encoded version of second data of said information, wherein said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data; and a remote server for storing said second data and an encoded identifier generated from said identifier; wherein said client system is adapted to send at least the encoded version of the second data to said remote server. - View Dependent Claims (5)
-
-
6. A process, executed by a client system, for storing information having a predetermined use which requires said information to be secured, including:
-
generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data; sending said first data to a remote server for storage with an encoded identifier generated from an identifier; and storing said second data with said identifier. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. An information storage system having components for executing the steps of any one of 6-10, 11-16, 17, 18-22.
-
15. A computer-readable storage medium having stored thereon program code for executing the steps of any one of 6-10, 11-16, 17, 18-22.
-
16. A process for storing information having a predetermined use which requires said information to be secured, including:
-
receiving an identifier and first data from a client system having second data, said first data and said second data being such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data; storing said first data with an encoded identifier generated from said identifier, without storing said identifier; generating encoded first data from said first data; and sending said encoded first data to said client system for storage with said second data and said identifier.
-
-
17. A process for generating information having a predetermined use which requires said information to be secured, including:
-
determining, on the basis of an identifier, first data of said information; sending said identifier to said remote server; receiving second data of said information from a remote server, said second data determined on the basis of an encoded identifier generated from said identifier; and generating said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data. - View Dependent Claims (18, 19)
-
-
20. A process for generating information having a predetermined use which requires said information to be secured, including:
-
receiving an identifier; determining first data of said information on the basis of an encoded identifier generated from said identifier; and sending said first data to a client system to enable said information to be generated from said first data and second data of said information, wherein said predetermined use is infeasible with only one of said first data and said second data.
-
-
21. A process for generating information having a predetermined use which requires said information to be secured, including:
-
determining, on the basis of an identifier, an encoded version of said information, the encoded information having been generated from first data of said information and an encoded version of second data of said information; and sending said identifier and said encoded information to a remote server for generation of said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
-
-
22. A process, executed by a computer system, for generating information having a predetermined use which requires said information to be secured, including:
-
receiving an identifier and an encoded version of said information; determining first data of said information on the basis of an encoded identifier generated from said identifier; determining second data from an encoded version of said second data; generating said information from said first data and second data of the encoded information, wherein said predetermined use is infeasible with only one of said first data and said second data; using said information for said predetermined use; and destroying said information.
-
Specification