Secure lookup
First Claim
Patent Images
1. A method, executed on a computer system, for secure data transformation and lookup comprising:
- encrypting, by the computer system, a data value to create an encrypted value;
generating, by the computer system, a hash value based on the encrypted value;
performing, by the computer system, a modulo operation on the hash value to create a modulo value;
retrieving, by the computer system, a transformed value from a lookup table by using the modulo value as an index for the look up table; and
providing, by the computer system, the transformed value.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system.
-
Citations
19 Claims
-
1. A method, executed on a computer system, for secure data transformation and lookup comprising:
-
encrypting, by the computer system, a data value to create an encrypted value; generating, by the computer system, a hash value based on the encrypted value; performing, by the computer system, a modulo operation on the hash value to create a modulo value; retrieving, by the computer system, a transformed value from a lookup table by using the modulo value as an index for the look up table; and providing, by the computer system, the transformed value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for secure data transformation and lookup comprising:
-
a look up table comprising transformed values, each with a corresponding index; a processor, configured to; receive a data value to be transformed; encrypt the data value to create an encrypted value; generate a hash value based on the encrypted value; perform a modulo operation on the hash value to create a modulo value; retrieve, from the lookup table, a transformed value by using the modulo value as the index; and providing the transformed value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product, tangibly embodied in a non-transitory computer-readable storage medium, for secure data transformation and lookup, the computer program product including instructions operable to cause a processor to:
-
encrypt a data value to create an encrypted value; generate a hash value based on the encrypted value; perform a modulo operation on the hash value to create a modulo value; retrieve a transformed value from a lookup table by using the modulo value as an index for the look up table; and provide the transformed value. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method, executed on a computer system, for secure data transformation and lookup comprising:
-
retrieving, by the computer system, a data value from a production database; encrypting, by the computer system, the data value to create an encrypted value; generating, by the computer system, a hash value based on the encrypted value; performing, by the computer system, a modulo operation on the hash value to create a modulo value; retrieving, by the computer system, a lookup table from a memory; retrieving, by the computer system, a transformed value from the lookup table by using the modulo value as an index for the look up table; and transmitting, by the computer system, the transformed value to a non-production computer system.
-
Specification