Secure data storage and communication for network computing
First Claim
1. A method, including steps ofreceiving one or more set of data structures from one or more client devices at a server device, wherein said server device maintains said set of data structures in a format inaccessible to unauthorized users of said set of data structures;
- sending, one or more times, particular sets of data object instances from said one or more client devices to the server device, said sets of data object instances having an organization in a data structure;
at said server, causing each said set of data object instances from said client device to be operated on in accord with a set of data management rules, said steps of causing to be operated including supplying one or more applets to the client device, the applets operating at the client device to operate on one or more data object instances at the client device;
wherein, in response to said requests from said one or more client devices, performing an operation on said server device, wherein said operation changes a relationship of said plurality of data object instances to said data structure without changing attribute values of said data object instances,sending a result of said steps of performing the operation to said client device,wherein said steps of supplying one or more applets are performed in response to receiving partially obfuscated data object instances at said server,wherein the server determines a particular set of applets to supply in response to said non-obfuscated portions of said partially obfuscated data object instances.
0 Assignments
0 Petitions
Accused Products
Abstract
A method comprising the steps of receiving a data object, obfuscating the meaning of at least a portion of the data and transmitting the data to a second processor-controlled device. In some embodiments the data may be formatted as either a spreadsheet or an XML file and the obfuscation process may operate on the elements and the attributes of the XML file. The obfuscating may include replacing meaningful data with identifiers before transmitting them to another client device or a server. In response, the other client device or server may operate on the data and return it, or optionally return code or applets to be executed on the client device. Some embodiments allow for a server or other client device to access remote resources for use when processing the data. The client devices may be cellular telephones or other smart devices including portable computers and tablets.
88 Citations
12 Claims
-
1. A method, including steps of
receiving one or more set of data structures from one or more client devices at a server device, wherein said server device maintains said set of data structures in a format inaccessible to unauthorized users of said set of data structures; -
sending, one or more times, particular sets of data object instances from said one or more client devices to the server device, said sets of data object instances having an organization in a data structure; at said server, causing each said set of data object instances from said client device to be operated on in accord with a set of data management rules, said steps of causing to be operated including supplying one or more applets to the client device, the applets operating at the client device to operate on one or more data object instances at the client device; wherein, in response to said requests from said one or more client devices, performing an operation on said server device, wherein said operation changes a relationship of said plurality of data object instances to said data structure without changing attribute values of said data object instances, sending a result of said steps of performing the operation to said client device, wherein said steps of supplying one or more applets are performed in response to receiving partially obfuscated data object instances at said server, wherein the server determines a particular set of applets to supply in response to said non-obfuscated portions of said partially obfuscated data object instances. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification