Secure data parser method and system
First Claim
Patent Images
1. A method for securing data, the method comprising:
- generating original secret information;
obtaining a plurality of public keys from unique certificate authorities;
dispersing the secret information into shares; and
encrypting the shares based, at least in part, on a plurality of encryption keys, at least one of the encryption keys being from the plurality of public keys, wherein the shares are restorable from at least a subset of the shares by recombining at least a threshold number of the shares.
4 Assignments
0 Petitions
Accused Products
Abstract
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
-
Citations
20 Claims
-
1. A method for securing data, the method comprising:
-
generating original secret information; obtaining a plurality of public keys from unique certificate authorities; dispersing the secret information into shares; and encrypting the shares based, at least in part, on a plurality of encryption keys, at least one of the encryption keys being from the plurality of public keys, wherein the shares are restorable from at least a subset of the shares by recombining at least a threshold number of the shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing data, the system comprising processing circuitry configured to:
-
generate original secret information; obtain a plurality of public keys from unique certificate authorities; disperse the secret information into shares; and encrypt the shares based, at least in part, on a plurality of encryption keys, at least one of the encryption keys being from the plurality of public keys, wherein the shares are restorable from at least a subset of the shares by recombining at least a threshold number of the shares. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification