Secure application access system
First Claim
Patent Images
1. A method, comprising:
- receiving, over a network, by a proxy server, a file to be encrypted;
creating, by the proxy server, an index of keywords;
encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword.
5 Assignments
0 Petitions
Accused Products
Abstract
A proxy server creates an index of keywords, receives at least a portion of a file, and, when a keyword in the index is encountered in the at least a portion of the file as the at least a portion of the file is being encrypted, associates in the index an encrypted record location identifier with the encountered keyword. The proxy server receives a search query and uses the keyword index to retrieve encrypted records from the server. The encrypted records are decrypted and sent as search results in response to the search query.
61 Citations
27 Claims
-
1. A method, comprising:
-
receiving, over a network, by a proxy server, a file to be encrypted; creating, by the proxy server, an index of keywords; encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
a subsystem at a proxy server, implemented at least partially in hardware, that receives, over a network, a file to be encrypted; a subsystem at the proxy server, implemented at least partially in hardware, that creates an index of keywords; an encryption subsystem at the proxy server, implemented at least partially in hardware, that encrypts the file, when a keyword in the index is encountered in the file as the file is being encrypted, associates in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable medium, storing software instructions, which when executed by one or more processors cause performance of:
-
receiving, over a network, by a proxy server, a file to be encrypted; creating, by the proxy server, an index of keywords; encrypting, by the proxy server, the file, when a keyword in the index is encountered in the file as the file is being encrypted, associating in the index a substring of encrypted data extracted from the encrypted file in which the keyword was encountered with the encountered keyword. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification