Method and system for shielding data in untrusted environments
First Claim
Patent Images
1. A system to shield data, the system comprising:
- a hardware processor;
a transformation knowledge key generator operable to generate a transformation knowledge key used to shield the data, wherein the transformation knowledge key is configured to include at least two components; and
a library of shielding algorithms configured to include at least two types of shielding algorithms, wherein the transformation knowledge key generator is configured to select the at least two types of shielding algorithms to generate the at least two components;
wherein the transformation knowledge key generator is operable to concatenate the at least two components in a configurable order to generate the transformation knowledge key;
wherein the library of shielding algorithms is configured to include a plurality of shielding algorithms comprising;
an encryption type algorithm configured to generate a first component of the transformation knowledge key;
a noise insertion type algorithm configured to generate a second component of the transformation knowledge key;
a data splitting type algorithm configured to generate a third component of the transformation knowledge key; and
a data byte reformatting type algorithm configured to generate a fourth component of the transformation knowledge key,wherein the at least two components are selectable from the first component, the second component, the third component and the fourth component arranged in the configurable order.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are techniques related to shielding data. A method and system for generating a transformation knowledge key (TKK) may include a TKK generator operable to generate a TKK used to shield the data. The TKK is configured to include at least two components. A library of shielding algorithms is configured to include at least two types of shielding algorithms. The TKK generator is configured to select the at least two types of shielding algorithms to generate the at least two components. The TKK generator is operable to concatenate the at least two components in a configurable order to generate the TKK.
-
Citations
24 Claims
-
1. A system to shield data, the system comprising:
-
a hardware processor; a transformation knowledge key generator operable to generate a transformation knowledge key used to shield the data, wherein the transformation knowledge key is configured to include at least two components; and a library of shielding algorithms configured to include at least two types of shielding algorithms, wherein the transformation knowledge key generator is configured to select the at least two types of shielding algorithms to generate the at least two components; wherein the transformation knowledge key generator is operable to concatenate the at least two components in a configurable order to generate the transformation knowledge key; wherein the library of shielding algorithms is configured to include a plurality of shielding algorithms comprising; an encryption type algorithm configured to generate a first component of the transformation knowledge key; a noise insertion type algorithm configured to generate a second component of the transformation knowledge key; a data splitting type algorithm configured to generate a third component of the transformation knowledge key; and a data byte reformatting type algorithm configured to generate a fourth component of the transformation knowledge key, wherein the at least two components are selectable from the first component, the second component, the third component and the fourth component arranged in the configurable order. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of generating a transformation knowledge key, the method comprising:
-
segmenting the transformation knowledge key in to at least two components selectable from a first component, a second component, a third component and a fourth component; providing a library of shielding algorithms configured to include at least four members including an encryption type algorithm, a noise insertion type algorithm, a data splitting type algorithm and a data byte reformatting type algorithm; providing the encryption type algorithm configured to generate the first component; providing the noise insertion type algorithm configured to generate the second component; providing the data splitting type algorithm configured to generate the third component; providing the data byte reformatting type algorithm configured to generate the fourth component; and concatenating the at least two components selectable from the first component, the second component, the third component and the fourth component in a configurable order to generate the transformation knowledge key; at least one of the segmenting, providing and concatenating steps is implemented by a hardware processor.
-
-
24. One or more non-transitory computer-readable storage media storing instructions that, when executed by one or more processors, cause the one or more processors to perform acts comprising:
-
segmenting the transformation knowledge key in to at least two components selectable from a first component, a second component and a third component; configuring a library of shielding algorithms to include at least four members including an encryption type algorithm, a noise insertion type algorithm, a data splitting type algorithm and a data byte reformatting type algorithm; configuring the encryption type algorithm to generate the first component; configuring the noise insertion type algorithm to generate the second component; configuring the data splitting type algorithm to generate the third component; configuring the data byte reformatting type algorithm to generate the fourth component; and concatenating at least two components selectable from the first component, the second component, the third component and the fourth component in a configurable order to generate the transformation knowledge key.
-
Specification