Information storage system
First Claim
1. A system for protecting digital data, including;
- a first computer system for generating first data and second data from said digital data, such that said digital data can be generated from said first data and said second data, and use of said digital data is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and
a second computer system for storing said second data with an encoded identifier generated from said identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data. (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data. Accordingly, only part of the information to be secured is stored locally on the client system, while the other part is stored on the remote server, and neither the client system nor the remote server have a record of the entire information.
-
Citations
22 Claims
-
1. A system for protecting digital data, including;
-
a first computer system for generating first data and second data from said digital data, such that said digital data can be generated from said first data and said second data, and use of said digital data is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and a second computer system for storing said second data with an encoded identifier generated from said identifier. - View Dependent Claims (2, 3)
-
-
4. A system for protecting digital data, including:
-
a first computer system for storing an encoded version of said digital data and an identifier, the encoded digital data having been generated from first data of said digital data and an encoded version of second data of said digital data, wherein said digital data can be generated from said first data and said second data, and use of said digital data is infeasible with only one of said first data and said second data; and a second computer system for storing said second data and an encoded identifier generated from said identifier; wherein said first computer system is adapted to send at least the encoded version of the second data to said second computer system. - View Dependent Claims (5)
-
-
6. A process, executed by a first computer system, for protecting digital data, including:
-
generating first data and second data from said digital data, such that said digital data can be generated from said first data and said second data, and use of said digital data cannot be performed using only one of said first data and said second data; sending said first data to a second computer system for storage with an encoded identifier generated from an identifier; and storing said second data with said identifier. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 21, 22)
-
-
14. A process for protecting digital data, including:
-
receiving an identifier and first data from a computer system having second data, said first data and said second data being such that said digital data can be generated from said first data and said second data, and use of said digital data cannot be performed using only one of said first data and said second data; storing said first data with an encoded identifier generated from said identifier, without storing said identifier; generating encoded first data from said first data; and sending said encoded first data to said computer system for storage with said second data and said identifier.
-
-
15. A process for generating digital data, including:
-
determining, on the basis of an identifier, first data of said digital data; sending said identifier to a computer system; receiving second data of said digital data from said computer system, said second data determined on the basis of an encoded identifier generated from said identifier; and generating said digital data from said first data and said second data, wherein use of said digital data is infeasible with only one of said first data and said second data. - View Dependent Claims (16, 17)
-
-
18. A process for generating digital data, including:
-
receiving an identifier; determining first data of said digital data on the basis of an encoded identifier generated from said identifier; and sending said first data to a computer system to enable said digital data to be generated from said first data and second data of said digital data, wherein said use of said digital data is infeasible with only one of said first data and said second data.
-
-
19. A process for generating digital data, including;
-
determining, on the basis of an identifier, an encoded version of said digital data, the encoded digital data having been generated from first data of said digital data and an encoded version of second data of said digital data; and sending said identifier and said encoded digital data to a computer system for generation of said digital data from said first data and said second data, wherein said use of said digital data is infeasible with only one of said first data and said second data.
-
-
20. A process, executed by a computer system, for generating digital data, including:
-
receiving an identifier and an encoded version of said digital data; determining first data of said digital data on the basis of an encoded identifier generated from said identifier; determining second data from an encoded version of said digital data; generating said digital data from said first data and second data, wherein use of said digital data is infeasible with only one of said first data and said second data; using said digital data; and destroying said digital data.
-
Specification