Systems and methods for security hardening of data in transit and at rest via segmentation, shuffling and multi-key encryption
First Claim
1. A system for decrypting a file, the system comprising:
- one or more processors; and
memory, including instructions executable by the one or more processors to cause the system to at least;
receive a plurality of file segments and encrypted file description data;
decrypt the identity of each of the file segments in the plurality of file segments and of an encryption key that is associated with each file segment in the plurality of file segments;
download a plurality of encrypted file segments generated from the plurality of file segments;
decrypt each encrypted file segment of the plurality of encrypted file segments using the encryption key that is associated with each file segment in the plurality of file segments; and
combine each decrypted file segment into a copy of a file.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for security hardening of a file in transit and at rest via segmentation, shuffling and multi-key encryption are presented. The method including segmenting at a first computer system a file into a plurality of file segments, and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. Additionally included is bidirectional data transformation of a file by obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity.
12 Citations
3 Claims
-
1. A system for decrypting a file, the system comprising:
-
one or more processors; and memory, including instructions executable by the one or more processors to cause the system to at least; receive a plurality of file segments and encrypted file description data; decrypt the identity of each of the file segments in the plurality of file segments and of an encryption key that is associated with each file segment in the plurality of file segments; download a plurality of encrypted file segments generated from the plurality of file segments; decrypt each encrypted file segment of the plurality of encrypted file segments using the encryption key that is associated with each file segment in the plurality of file segments; and combine each decrypted file segment into a copy of a file.
-
-
2. A method for hardening the security, confidentiality, and privacy of a file, the method comprising:
-
obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity; mapping the obfuscated digital values of the file to the digital values of the file; transferring the obfuscated digital values of the file to a second computer system; and using the obfuscated digital values of the file as an input to search, query, or otherwise reference back as output to the first computer system. - View Dependent Claims (3)
-
Specification