Meta-complete data storage
First Claim
Patent Images
1. A method comprising:
- accessing, by a processor, a plurality of structured data, each datum of the plurality of structured data comprising;
a first subset of characters, the first subset of characters comprising clear-text characters; and
a second subset of characters, the second subset of characters comprising encrypted characters, the encrypted characters generated by applying an encryption function to unencrypted characters, the second subset of characters further comprising metadata describing the encryption function such that a length of the second subset of characters comprising the metadata is equal to or less than a length of the unencrypted characters;
searching, by the processor, the plurality of structured data with a query term received from a requesting entity by;
identifying a first result set, each result in the first result set comprising a datum of the plurality of structured data with a first subset of characters at least partially matching a first portion of the query term; and
identifying a second result set, each result in the second result set comprising a result of the first result set with a second subset of characters at least partially matching a second portion of the query term; and
presenting the second result set of data to the requesting entity.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the encryption of the data, systems and methods of providing secure access to real world data through data transformations, and systems and methods of managing security parameters for data.
53 Citations
21 Claims
-
1. A method comprising:
-
accessing, by a processor, a plurality of structured data, each datum of the plurality of structured data comprising; a first subset of characters, the first subset of characters comprising clear-text characters; and a second subset of characters, the second subset of characters comprising encrypted characters, the encrypted characters generated by applying an encryption function to unencrypted characters, the second subset of characters further comprising metadata describing the encryption function such that a length of the second subset of characters comprising the metadata is equal to or less than a length of the unencrypted characters; searching, by the processor, the plurality of structured data with a query term received from a requesting entity by; identifying a first result set, each result in the first result set comprising a datum of the plurality of structured data with a first subset of characters at least partially matching a first portion of the query term; and identifying a second result set, each result in the second result set comprising a result of the first result set with a second subset of characters at least partially matching a second portion of the query term; and presenting the second result set of data to the requesting entity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a database comprising a non-transitory computer-readable storage medium storing a plurality of structured data, each datum of the plurality of structured data comprising; a first subset of characters, the first subset of characters comprising clear-text characters; and a second subset of characters, the second subset of characters comprising encrypted characters, the encrypted characters generated by applying an encryption function to unencrypted characters, the second subset of characters further comprising metadata describing the encryption function such that a length of the second subset of characters comprising the metadata is equal to or less than a length of the unencrypted characters; a search engine comprising one or more hardware processors and configured to search the plurality of structured data with a query term received from a requesting entity by; identifying a first result set, each result in the first result set comprising a datum of the plurality of structured data with a first subset of characters at least partially matching a first portion of the query term; and identifying a second result set, each result in the second result set comprising a result of the first result set with a second subset of characters at least partially matching a second portion of the query term; and an output configured to present the second result set of data to the requesting entity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable computer instructions configured to, when executed by one or more hardware processors, perform steps comprising:
-
accessing a plurality of structured data, each datum of the plurality of structured data comprising; a first subset of characters, the first subset of characters comprising clear-text characters; and a second subset of characters, the second subset of characters comprising encrypted characters, the encrypted characters generated by applying an encryption function to unencrypted characters, the second subset of characters further comprising metadata describing the encryption function such that a length of the second subset of characters comprising the metadata is equal to or less than a length of the unencrypted characters; searching the plurality of structured data with a query term received from a requesting entity by; identifying a first result set, each result in the first result set comprising a datum of the plurality of structured data with a first subset of characters at least partially matching a first portion of the query term; and identifying a second result set, each result in the second result set comprising a result of the first result set with a second subset of characters at least partially matching a second portion of the query term; and presenting the second result set of data to the requesting entity. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification