×

Method and system for secure deployment of information technology (IT) solutions in untrusted environments

  • US 9,336,363 B2
  • Filed: 01/21/2014
  • Issued: 05/10/2016
  • Est. Priority Date: 01/21/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system operable to shield data into shielded data, the system comprising:

  • a hardware processor;

    logic instructions stored on computer readable storage media and executable by the hardware processor, the logic instructions being configured to include;

    a trusted agent operable in a trusted computing environment, wherein the trusted agent includes a transformation knowledge key generator and a data transformer,wherein the transformation knowledge key generator is operable to generate a transformation knowledge key, the transformation knowledge key being generated using at least two shielding algorithms to shield the data into the shielded data, wherein the transformation knowledge key is configured to include transformation expressions corresponding to each one of the at least two algorithms, wherein the transformation expressions are configured to include transformation operators, the transformation knowledge key being configurable to include a nested instance of another transformation operators corresponding to another transformation knowledge key,wherein the data transformer is operable to transform the data into N segments of the shielded data using corresponding N instances of the transformation knowledge key, N being a positive integer, wherein the trusted agent is configured to store the N instances of the transformation knowledge key and at least one segment of the N segments of the shielded data in the trusted computing environment; and

    a communications agent securely coupled to the trusted agent, the communications agent being operable to communicate the N segments of the shielded data for storage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×