Segmented mapping
First Claim
Patent Images
1. A method, executed on a computer processor, for irreversibly masking data comprising:
- receiving a mapping scheme comprising a number of segments and a different cryptographic algorithm for each segment, wherein the number of segments of the mapping scheme and lengths of each segment are determined randomly;
receiving a target value to be masked;
splitting the target value into a number of segments based on the number of segments of the mapping scheme;
applying the cryptographic algorithm for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value; and
concatenating the encrypted segments to create a masked value.
1 Assignment
0 Petitions
Accused Products
Abstract
Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.
-
Citations
6 Claims
-
1. A method, executed on a computer processor, for irreversibly masking data comprising:
-
receiving a mapping scheme comprising a number of segments and a different cryptographic algorithm for each segment, wherein the number of segments of the mapping scheme and lengths of each segment are determined randomly; receiving a target value to be masked; splitting the target value into a number of segments based on the number of segments of the mapping scheme; applying the cryptographic algorithm for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value; and concatenating the encrypted segments to create a masked value. - View Dependent Claims (2, 3)
-
-
4. A computer program product, tangibly embodied in a non-transitory computer-readable storage medium, for irreversibly masking data, the computer program product including instructions operable to cause a data processing apparatus to:
-
receive a mapping scheme comprising a number of segments and a different cryptographic algorithm for each segment, wherein the number of segments of the mapping scheme and lengths of each segment are determined randomly; receive a target value to be masked; split the target value into a number of segments based on the number of segments of the mapping scheme; apply the cryptographic algorithm for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value; and concatenate the encrypted segments to create a masked value. - View Dependent Claims (5, 6)
-
Specification