×

Storing data in a server computer with deployable encryption/decryption infrastructure

  • US 9,959,217 B2
  • Filed: 12/04/2015
  • Issued: 05/01/2018
  • Est. Priority Date: 12/08/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for configuring a second computer to store data in a data-storage structure, wherein the data originates from a first computer that is communicatively connected to the second computer, and wherein the data is processed by an application in the second computer, the method comprising:

  • deploying an infrastructure capable of having a first configuration or a second configuration to the second computer including deploying code to the second computer that is imported from a source external to the second computer to implement a forwarder module, a crypto module and a key control module for execution by a processor of the second computer;

    responsive to deploying the infrastructure in the first configuration,receiving, by the forwarder module, the data from the first computer and identifying a data portion of the data, wherein the data portion is to be encrypted, andreading, by the forwarder module, an encrypted data portion from the application, wherein the encrypted data portion is to be decrypted and forwarding the encrypted data portion to the application;

    responsive to deploying the infrastructure in the second configuration,receiving, by the forwarder module, the data from the application and identifying the data portion of the data, wherein the data portion is to be encrypted, andreading, by the forwarder module, an encrypted data portion from the data-storage structure, wherein the encrypted data portion is to be decrypted and forwarding the encrypted data portion to the data-storage structure;

    encrypting, by the crypto module, the data portion with a key and decrypting, by the crypto module, the encrypted data portion with the key;

    generating and storing the key by the key control module; and

    providing the key into the key control module upon receiving a key trigger from the first computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×