×

Apparatus and method for continuous data protection in a distributed computing network

  • US 9,971,906 B2
  • Filed: 05/22/2015
  • Issued: 05/15/2018
  • Est. Priority Date: 09/29/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for data protection comprising:

  • receiving, at a database system comprising one or more hardware processors, a request for access to unobfuscated data from a requesting entity, the database system associated with a first set of security parameters such that data stored by the database system must be encrypted with a first set of encryption keys, the requesting entity associated with a second set of security parameters such that data stored by the requesting entity must be encrypted with a second set of encryption keys, at least one encryption key in the second set of encryption keys not included within the first set of encryption keys;

    in response to the request;

    accessing, by the database system, unobfuscated data stored by the database system;

    producing, by the database system, obfuscated data by performing a first decryption operation on a first portion of the unobfuscated data using the first set of encryption keys and performing a data masking operation on a second portion of the unobfuscated data, the data masking operation comprising a replacement of each character of the second portion of unobfuscated data with a same masking character;

    generating, by the database system, a report comprising the obfuscated data representative of the unobfuscated data; and

    providing, by the database system, the generated report to the requesting entity;

    receiving, by the database system from the requesting entity, an identification of a portion of the obfuscated data included within the generated report; and

    in response to receiving the identification of the portion of the obfuscated data, providing, by the database system, the requesting entity access to a third portion of the unobfuscated data corresponding to the identified portion of the obfuscated data by performing a second decryption operation on the third portion of the obfuscated data using the first set of encryption keys, the requesting entity configured to encrypt the third portion of the unobfuscated data with the second set of encryption keys prior to storing the third portion of the unobfuscated data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×