×

Security systems and methods for use with structured and unstructured data

  • US 8,347,088 B2
  • Filed: 02/01/2006
  • Issued: 01/01/2013
  • Est. Priority Date: 02/01/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for encrypting, authenticating, and aggregating data pools, the method comprising a computer having a computer readable medium having stored thereon instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:

  • providing a record including a first data item and a second data item, the first data item including secure data and the second data item including unsecure data;

    using tag-level encryption to encode a security level to the first data item and a security level to the second data item, wherein the levels of security are different;

    authenticating the first data item and the second data item using a security function triggered by a content of the first data item and a content of the second data item;

    aggregating the first data item into a secure data pool based at least in part on the security function; and

    aggregating the second data item into an unsecure data pool based at least in part on the security function, wherein aggregating the first data item and aggregating the second data item includes separate routing for the first data item and for the second data item.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×