Security system with extraction, reconstruction and secure recovery and storage of data
First Claim
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising:
- storing separately sensitive content in secure data stores of said plurality of security data stores, wherein said security data stores are selected in a predetermined manner by random selection, and wherein each said secure data store has a unique access control;
permitting reconstruction of some or all of said data by a requesting party with appropriate access controls applied to respective secure data stores;
the permitted reconstruction limited by (i) the requesting party'"'"'s permitted login day-and-time permissions;
(ii) the requesting party'"'"'s permitted login time allocation for said respective secure data store;
(iii) the requesting party'"'"'s location; and
(iv) the requesting party'"'"'s audit process results; and
auditing the requesting party'"'"'s access to said respective secure data stores for a predetermined threat pattern based upon the requesting party'"'"'s access rights, permitted login day-and-time permissions, login time allocation, the requesting party'"'"'s location and generating the requesting party'"'"'s audit process results.
2 Assignments
0 Petitions
Accused Products
Abstract
The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words).
-
Citations
19 Claims
-
1. A computerized method of securing data in a plurality of security controlled data stores with access controls thereat, said data potentially having sensitive content such as sensitive words, data objects, characters, images, data elements or icons, comprising:
-
storing separately sensitive content in secure data stores of said plurality of security data stores, wherein said security data stores are selected in a predetermined manner by random selection, and wherein each said secure data store has a unique access control; permitting reconstruction of some or all of said data by a requesting party with appropriate access controls applied to respective secure data stores; the permitted reconstruction limited by (i) the requesting party'"'"'s permitted login day-and-time permissions;
(ii) the requesting party'"'"'s permitted login time allocation for said respective secure data store;
(iii) the requesting party'"'"'s location; and
(iv) the requesting party'"'"'s audit process results; andauditing the requesting party'"'"'s access to said respective secure data stores for a predetermined threat pattern based upon the requesting party'"'"'s access rights, permitted login day-and-time permissions, login time allocation, the requesting party'"'"'s location and generating the requesting party'"'"'s audit process results. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification