×

Tokenization of multiple-field records

  • US 8,620,882 B2
  • Filed: 12/29/2010
  • Issued: 12/31/2013
  • Est. Priority Date: 12/29/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of controlling access to a complex datum which includes a set of data groups having data stored on a set of external storage media, the method comprising:

  • receiving, by a server from a client computer over a network, a user token representing a user at the client computer;

    mapping, by the server, the user token to a set of data group tokens, each data group token in the set of data group tokens corresponding to a data group in the set of data groups and defining a level of access the user has to that respective data group, each data group in the set of data groups containing data which is stored on an external storage medium from the set of external storage media; and

    sending, by the server, the set of data group tokens to the client computer over the network;

    wherein the server includes a non-volatile memory in which a database is stored;

    wherein the database includes a lookup table containing a set of user tokens and a set of index values, each index value from the set of index values corresponding to a user token in the set of user tokens;

    wherein mapping the user token to a set of data group tokens includes;

    locating the user token in the lookup table,finding the corresponding index value from the lookup table, andobtaining the set of data group tokens from the corresponding index value;

    wherein the index value corresponding to the user token represents a data partitioning scheme;

    wherein obtaining the set of data group tokens includes partitioning the user token according to the data partitioning scheme represented by the corresponding index value;

    wherein each data group token includes a set of data group token bits;

    wherein the method further comprises;

    sending, before the receiving of the user token, a hash function to the client computer,for each data group token, generating a set of message authentication code (MAC) bits from an operation of the hash function on the data group token bits of that data group token, andfor each data group token, combining the set of MAC bits with the data group token bits of that data group token; and

    wherein an application, at the client computer, of the hash function to a data group token of the set of data group tokens producing the set of MAC bits generated for the data group token implies that the data group token is valid.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×