×

Method and apparatus for transparent encryption

  • US 7,757,278 B2
  • Filed: 01/02/2002
  • Issued: 07/13/2010
  • Est. Priority Date: 01/04/2001
  • Status: Active Grant
First Claim
Patent Images

1. A transparent encryption appliance that does not store data for protecting data received from a web stored in a database by a web server environment, the transparent encryption appliance comprising:

  • at least one client interface for coupling to at least one network and communicating with one or more clients via the at least one network;

    a server interface for coupling to the web server environment;

    wherein the appliance is separate from the web server environment and is operative to be connected between the web server environment and the at least one network, wherein the server interface and the at least one client interface communicate using same communications protocol; and

    a processor coupled to the at least one client interface and the server interface for at least one of securing and unsecuring data, wherein;

    securing data comprises;

    evaluating a data transaction received through the at least one client interface;

    identifying first sensitive data contained in said data transaction;

    securing only the first sensitive data by at least one of encrypting, hashing, and keyed hashing;

    replacing in the data transaction the identified first sensitive data with the secured first sensitive data; and

    providing the data transaction including the secured first sensitive data through the web server interface; and

    unsecuring data comprises;

    responsive to a request received through the at least one client interface for second sensitive data corresponding to at least a portion of the stored secured first sensitive data or other stored secured sensitive data, receiving through the web server interface the secured second sensitive data corresponding to the requested data;

    unsecuring the received secured second sensitive data by at least one of decrypting and hash verifying; and

    providing the unsecured second sensitive data through the at least one client interface.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×