Method and system for fully encrypted repository
First Claim
1. A method for using information in conjunction with a data repository, the method comprising:
- encrypting data associated with the information using an encryption key to generate encrypted data, wherein;
the data associated with the information comprises a field and a value; and
the encrypted data comprises an encrypted field and an encrypted value;
sending at least the encrypted data to the data repository;
receiving a request for at least the value from a remote device;
sending a request for at least the value to the data repository, wherein the request for at least the value comprises the encrypted field;
receiving at least the encrypted value from the data repository, wherein the data repository uses the encrypted field to identify the encrypted value;
decrypting the encrypted value; and
sending at least the value to the remote device.
6 Assignments
0 Petitions
Accused Products
Abstract
According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.
100 Citations
16 Claims
-
1. A method for using information in conjunction with a data repository, the method comprising:
-
encrypting data associated with the information using an encryption key to generate encrypted data, wherein; the data associated with the information comprises a field and a value; and the encrypted data comprises an encrypted field and an encrypted value; sending at least the encrypted data to the data repository; receiving a request for at least the value from a remote device; sending a request for at least the value to the data repository, wherein the request for at least the value comprises the encrypted field; receiving at least the encrypted value from the data repository, wherein the data repository uses the encrypted field to identify the encrypted value; decrypting the encrypted value; and sending at least the value to the remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for protecting information, the system comprising:
-
a data repository configured to; receive encrypted data comprising an encrypted field and an encrypted value; receive a first request for the encrypted data, wherein the first request comprises the encrypted field; retrieve the encrypted data by comparing the encrypted data to the encrypted field; and send the encrypted value in response to the first request; and a user module operating on a user device, configured to; receive a second request for information from a remote device; encrypt a field using an encryption key to generate the encrypted field; send the first request for the encrypted data to the data repository; receive the encrypted value from the data repository; recover a value from the encrypted value; and send at least the value to the remote device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An information protection system comprising:
-
a user device coupled to a network and including a data processor and a non-transitory computer-readable storage medium comprising a plurality of computer-readable instructions tangibly embodied on the non-transitory computer-readable storage medium, which, when executed by a data processor, provide encrypted data protection, the plurality of instructions comprising; instructions that cause the data processor to encrypt data associated with the information using an encryption key to generate encrypted data, wherein; the data associated with the information comprises a field and a value; and the encrypted data comprises an encrypted field and an encrypted value; instructions that cause the data processor to send at least the encrypted data to the data repository; instructions that cause the data processor to receive a request for at least the value from a remote device; instructions that cause the data processor send a request for at least the value to the data repository, wherein the request for at least the value comprises the encrypted field; instructions that cause the data processor to receive at least the encrypted value from the data repository, wherein the data repository uses the encrypted field to identify the encrypted value; instructions that cause the data processor to decrypt the encrypted data using the encryption key the encrypted value; and instructions that cause the data processor to send at least the value to the remote device.
-
Specification