Secure data parser method and system
First Claim
Patent Images
1. A method, comprising:
- a) encrypting a data set to provide an encrypted data set;
b) separating the encrypted data set into two or more portions of data;
c) encrypting one or more of the portions of data from step b); and
d) storing the encrypted portions of data from step c) at one or more locations on one or more data depositories.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity.
408 Citations
67 Claims
-
1. A method, comprising:
-
a) encrypting a data set to provide an encrypted data set;
b) separating the encrypted data set into two or more portions of data;
c) encrypting one or more of the portions of data from step b); and
d) storing the encrypted portions of data from step c) at one or more locations on one or more data depositories. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 56, 57)
-
-
10. A method, comprising:
-
a) separating a data set into two or more portions of data;
b) encrypting one or more of the portions of data of step a); and
c) storing the one or more encrypted portions of data of step b) on one or more locations on one or more data depository. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 58, 59)
-
-
20. A method, comprising:
-
a) generating an encryption master key and encrypting a data set using the encryption master key;
b) separating each of the encryption master key and the encrypted data set into two or more portions according to one separating pattern and appending an encryption master key portion to an encrypted data set portion;
c) generating one or more encryption keys for the portions of data from step b) and encrypting said portions of data using said encryption key; and
d) storing the encrypted portions of data from step c) and the encryption keys from step c) on at least one data depository. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 60, 61)
-
-
30. A method, comprising:
-
a) generating an encryption master key and encrypting a data set using the encryption master key;
b) separating each of the encryption master key and the encrypted data set into two or more portions according to one separating pattern and storing the encryption master key portions on one or more locations of one or more data depositories;
c) generating one or more encryption keys for the encrypted data set portions of step b) and encrypting said portions of data using said encryption key; and
d) storing the encrypted portions from step c) and the encryption keys from step c) on at least one location of at least one data depository, wherein said data depositories are different from the data depositories of step b). - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 62, 63)
-
-
40. A system, comprising:
-
a) a data splitting module;
b) a cryptographic handling module; and
c) a data assembling module. - View Dependent Claims (41, 42, 43)
-
-
44. A method, comprising:
-
a) encrypting a data set to provide an encrypted data set;
b) separating the encrypted data set into two or more portions of data according to the contents of a unique key value;
c) encrypting one or more of the portions of data from step b); and
d) storing the encrypted portions of data from step c) at one or more locations on one or more data depositories. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 64, 65)
-
-
54. A method, comprising:
-
a) splitting a data set into N number of data units;
b) selecting X number of shares for data unit storage;
c) generating N number of random numbers that correspond to the X number of shares;
d) assigning the random numbers to the data units; and
e) storing the data units and the random number in the share that corresponds to the random number. - View Dependent Claims (55, 66, 67)
-
Specification