Security systems and methods for use with structured and unstructured data
First Claim
Patent Images
1. A method for encrypting, authenticating, and aggregating data pools, the method comprising a computer having a computer readable medium having stored thereon instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
- providing a record including a first data item and a second data item, the first data item including secure data and the second data item including unsecure data;
using tag-level encryption to encode a security level to the first data item and a security level to the second data item, wherein the levels of security are different;
authenticating the first data item and the second data item using a security function triggered by a content of the first data item and a content of the second data item;
aggregating the first data item into a secure data pool based at least in part on the security function; and
aggregating the second data item into an unsecure data pool based at least in part on the security function, wherein aggregating the first data item and aggregating the second data item includes separate routing for the first data item and for the second data item.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure foundations for distributed databases and content management systems combining unstructured and structured data, and allowing post-input reorganization to achieve a high degree of flexibility.
396 Citations
21 Claims
-
1. A method for encrypting, authenticating, and aggregating data pools, the method comprising a computer having a computer readable medium having stored thereon instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
-
providing a record including a first data item and a second data item, the first data item including secure data and the second data item including unsecure data; using tag-level encryption to encode a security level to the first data item and a security level to the second data item, wherein the levels of security are different; authenticating the first data item and the second data item using a security function triggered by a content of the first data item and a content of the second data item; aggregating the first data item into a secure data pool based at least in part on the security function; and aggregating the second data item into an unsecure data pool based at least in part on the security function, wherein aggregating the first data item and aggregating the second data item includes separate routing for the first data item and for the second data item. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17)
-
-
11. A method for storing a relationship among a plurality of authenticated data within aggregated data pools, the method comprising a computer having a computer readable medium having stored thereon instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
-
providing a record including a first data item and a second data item; using tag-level encryption to encode a first metadata to the first data item and a second metadata to the second data item, wherein the encoding of the first metadata and the second metadata are different; authenticating the first metadata item for the first data item and the second metadata item for the second data item using a security function triggered by the metadata; aggregating the first data item in a first data pool based at least in part on the first metadata and the security function; aggregating the second data item in a second data pool based at least in part on the second metadata and the security function, wherein aggregating the first data item and aggregating the second data item includes a separate routing for the first data item and for the second data item; and expressing a relationship between the first data item and the second data item in a file external to the first data pool and the second data pool. - View Dependent Claims (12, 13, 14, 15, 16, 18, 19, 20, 21)
-
Specification