METHOD AND SYSTEM FOR SHIELDING DATA IN UNTRUSTED ENVIRONMENTS
First Claim
Patent Images
1. A system to shield data, the system comprising:
- a transformation knowledge key generator operable to generate a transformation knowledge key used to shield the data, wherein the transformation knowledge key is configured to include at least two components; and
a library of shielding algorithms configured to include at least two types of shielding algorithms, wherein the transformation knowledge key generator is configured to select the at least two types of shielding algorithms to generate the at least two components,wherein the transformation knowledge key generator is operable to concatenate the at least two components in a configurable order to generate the transformation knowledge key.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are techniques related to shielding data. A method and system for generating a transformation knowledge key (TKK) may include a TKK generator operable to generate a TKK used to shield the data. The TKK is configured to include at least two components. A library of shielding algorithms is configured to include at least two types of shielding algorithms. The TKK generator is configured to select the at least two types of shielding algorithms to generate the at least two components. The TKK generator is operable to concatenate the at least two components in a configurable order to generate the TKK.
-
Citations
25 Claims
-
1. A system to shield data, the system comprising:
-
a transformation knowledge key generator operable to generate a transformation knowledge key used to shield the data, wherein the transformation knowledge key is configured to include at least two components; and a library of shielding algorithms configured to include at least two types of shielding algorithms, wherein the transformation knowledge key generator is configured to select the at least two types of shielding algorithms to generate the at least two components, wherein the transformation knowledge key generator is operable to concatenate the at least two components in a configurable order to generate the transformation knowledge key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of generating a transformation knowledge key, the method comprising:
-
segmenting the transformation knowledge key in to at least two components selectable from a first component, a second component, a third component and a fourth component; providing a library of shielding algorithms configured to include at least 4 members including an encryption type algorithm, a noise insertion type algorithm, a data splitting type algorithm and a data byte reformatting type algorithm; providing the encryption type algorithm configured to generate the first component; providing the noise insertion type algorithm configured to generate the second component; providing the data splitting type algorithm configured to generate the third component; providing the data byte reformatting type algorithm configured to generate the fourth component; and concatenating the at least two components selectable from the first component, the second component, the third component and the fourth component in a configurable order to generate the transformation knowledge key.
-
-
25. One or more computer-readable storage media storing instructions that, when executed by one or more processors, cause the one or more processors to perform acts comprising:
-
segmenting the transformation knowledge key in to at least two components selectable from a first component, a second component and a third component; configuring a library of shielding algorithms to include at least 4 members including an encryption type algorithm, a noise insertion type algorithm, a data splitting type algorithm and a data byte reformatting type algorithm; configuring the encryption type algorithm to generate the first component; configuring the noise insertion type algorithm to generate the second component; configuring the data splitting type algorithm to generate the third component; configuring the data byte reformatting type algorithm to generate the fourth component; and concatenating at least two components selectable from the first component, the second component, the third component and the fourth component in a configurable order to generate the transformation knowledge key.
-
Specification