Method and computer program product for order preserving symbol based encryption
First Claim
Patent Images
1. A system to provide sorting of encrypted data within a software as a service (SaaS) environment, the system comprising:
- symbol based encryption module to encrypt data on a per symbol basis and to provide sort and search preserving encryption that allows other modules to sort tokens and to search for tokens, the symbol based encryption module to replace data elements with a random tokens and maintain a lexicographic order between the random tokens and the plaintext data elements they represent;
a database system coupled with the symbol based encryption module to store encrypted tokens that have been encrypted by the symbol based encryption module, the database system to allow access to the encrypted tokens through the SaaS environment.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for sorting encrypted data within a software as a service (SaaS) environment. Data is encrypted on a per symbol basis with a symbol based encryption module. Sort and search functionality preserving encryption that allows other modules to sort tokens and to search for tokens is provided. Encrypted tokens that have been encrypted by the symbol based encryption module are stored in a database. Access to the encrypted tokens is provided through the SaaS environment.
-
Citations
18 Claims
-
1. A system to provide sorting of encrypted data within a software as a service (SaaS) environment, the system comprising:
-
symbol based encryption module to encrypt data on a per symbol basis and to provide sort and search preserving encryption that allows other modules to sort tokens and to search for tokens, the symbol based encryption module to replace data elements with a random tokens and maintain a lexicographic order between the random tokens and the plaintext data elements they represent; a database system coupled with the symbol based encryption module to store encrypted tokens that have been encrypted by the symbol based encryption module, the database system to allow access to the encrypted tokens through the SaaS environment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, cause the one or more processors to:
-
encrypt data on a per symbol basis, with a symbol based encryption module, the symbol based encryption module to replace data elements with a random tokens and maintain a lexicographic order between the random tokens and the plaintext data elements they represent; provide sort and search preserving encryption, with the symbol based encryption module, that allows other modules to sort tokens and to search for tokens; store, in a database system coupled with the symbol based encryption module, encrypted tokens that have been encrypted by the symbol based encryption module; allow access to the encrypted tokens through a software as a service (SaaS) environment. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for sorting encrypted data within a software as a service (SaaS) environment, the method comprising:
-
encrypting data on a per symbol basis, with a symbol based encryption module, the symbol based encryption module to replace data elements with a random tokens and maintain a lexicographic order between the random tokens and the plaintext data elements they represent; providing sort and search preserving encryption, with the symbol based encryption module, that allows other modules to sort tokens and to search for tokens; storing, in a database system coupled with the symbol based encryption module, encrypted tokens that have been encrypted by the symbol based encryption module; allowing access to the encrypted tokens through the SaaS environment. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification