×

Method of processing data to enable external storage thereof with minimized risk of information leakage

  • US 9,043,933 B2
  • Filed: 11/19/2013
  • Issued: 05/26/2015
  • Est. Priority Date: 06/30/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product to control a memory space within a virtual execution framework, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code executable by a hardware processor to perform a method comprising:

  • receiving from a first one of a plurality of computers, a first data set independently possessed by the first computer to a memory space which is under control of the virtual execution framework;

    receiving from a second one of the plurality of computers, a second data set independently possessed by the second computer to a memory space which is under control of the virtual execution framework;

    receiving, under control of the virtual execution framework, a calculation module to a memory space which is under control of the virtual execution framework, by one of;

    the first computer, the second computer, or a third computer;

    forcing, under control of the virtual execution framework, one of;

    the first computer, the second computer, or the third computer to calculate a combined data set from the first data set and the second data set using the calculation module;

    receiving from the first computer a first encryption module controllable only by the first computer to a memory space which is under control of the first computer;

    receiving from the second computer a second encryption module controllable only by the second computer to a memory space which is under control of the virtual execution framework;

    forcing, under control of the virtual execution framework, the second computer to encrypt the combined data set using the second encryption module;

    causing the first computer to dual-encrypt the combined data set encrypted by the second encryption module using the first encryption module; and

    causing the dual-encrypted combined data set to be transported to an external storage by the first computer or the second computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×