发明名称 Data privacy
摘要 In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques for data security may include distributing an encrypted private key. In some embodiments, unreadable data may be encrypted and/or decrypted using time-varying keys.;In some embodiments, techniques for data security may include combining information and a policy, and encoding the combined information and policy, wherein encrypting the combined information and policy is performed using a public key, or via tokenization.;In some embodiments, techniques for data security may include receiving data, wherein the data has been encoded, decoding the data, determining a first datum and a second datum, wherein the first datum and the second datum are associated with the decoded data, and determining a policy, wherein the policy is associated with the first datum.
申请公布号 US9450754(B2) 申请公布日期 2016.09.20
申请号 US201313783011 申请日期 2013.03.01
申请人 Roskind James A.;Emigh Aaron T. 发明人 Roskind James A.;Emigh Aaron T.
分类号 H04L9/30;H04L29/06;G06F21/62 主分类号 H04L9/30
代理机构 Mahamedi IP Law LLP 代理人 Mahamedi IP Law LLP
主权项 1. A method for security, comprising: Receiving account information relating to an account; receiving a policy identifying one or more permitted parties for a financial transaction involving the account information without accessing the account related to the account information; combining the account information and the policy, wherein combining the account information and policy includes forming the combined information and policy so that a partial characteristic of the account information may be extracted from the combined information and policy; generating a token to reference the account information using a format that is compatible for use in referencing the account information but not including the account information; associating the token with the combined information and policy by storing the token with the combined information and policy in a relational database, the token being a key of the relational database; encrypting the combined information and policy by a public key; extracting the partial characteristic from the combined information and policy; and providing the extracted partial characteristic in response to a request from a requesting party, the request including the token, wherein the extracted partial characteristic is provided by a transmitter via a data network.
地址 Redwood City CA US