Secure data parser method and system
First Claim
Patent Images
1. A method performed by a computer system for securing a data set, the method comprising:
- (a) producing redundancy information based on information in the data set;
(b) producing a plurality of n shares using the data set, each of the n shares comprising at least some of the data in the data set;
(c) including at least some of the redundancy information in each of the plurality of n shares; and
(d) using a computer network coupled to the computer system to substantially randomly distribute at least some of the plurality of n shares to a corresponding plurality of physically dispersed storage locations;
wherein the data set is recoverable using at least a threshold number, less than n, of the n shares.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity.
-
Citations
30 Claims
-
1. A method performed by a computer system for securing a data set, the method comprising:
-
(a) producing redundancy information based on information in the data set; (b) producing a plurality of n shares using the data set, each of the n shares comprising at least some of the data in the data set; (c) including at least some of the redundancy information in each of the plurality of n shares; and (d) using a computer network coupled to the computer system to substantially randomly distribute at least some of the plurality of n shares to a corresponding plurality of physically dispersed storage locations; wherein the data set is recoverable using at least a threshold number, less than n, of the n shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system configured for securing a data set, the system comprising:
one or more processors configured to; (a) produce redundancy information based on information in the data set; (b) produce a plurality of n shares using the data set, wherein each of the n shares comprises at least some of the data set; (c) include at least some of the redundancy information in each of the plurality of n shares; and (d) substantially randomly distribute at least some of the plurality of n shares to a corresponding plurality of physically dispersed storage locations, wherein the data set is recoverable using at least a threshold number, less than n, of the n shares. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A non-transitory computer readable medium comprising instructions that, when executed by one or more processors, cause a computer system to carry out a method for securing a data set, the method comprising:
-
(a) producing redundancy information based on information in the data set; (b) producing a plurality of n shares using the data set, wherein each of the n shares comprises at least some of the data set; (c) including at least some of the redundancy information in each of the plurality of n shares; and (d) substantially randomly distributing at least some of the plurality of n shares to a corresponding plurality of physically dispersed storage locations; wherein the data set is recoverable using at least a threshold number, less than n, of the n shares. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification