Claims
- 1. A method, comprising:
a) encrypting a data set to provide an encrypted data set; b) separating the encrypted data set into two or more portions of data; c) encrypting one or more of the portions of data from step b); and d) storing the encrypted portions of data from step c) at one or more locations on one or more data depositories.
- 2. The method of claim 1, wherein the separating of step b) separates the encrypted data set into four or more portions of data.
- 3. The method of claim 2, wherein step b) and step c) are repeated one or more times before the storing of step d), and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm in step a).
- 4. The method of claim 1, wherein the storing of step d) is on different locations of the same data depository.
- 5. The method of claim 1, wherein the storing of step d) is on different data depositories.
- 6. The method of claim 1, wherein the storing of step d) is on different data depositories in different geographic locations.
- 7. The method of claim 1, wherein the encryption of step c) provides an encryption key, and wherein the encryption key is stored in step d) together with the data encrypted using said encryption key in step c).
- 8. The method of claim 1, wherein the encryption of step c) provides an encryption key, and wherein the encryption key is stored in step d) separately from the data encrypted using said encryption key in step c).
- 9. The method of claim 1, wherein the data set of step a) comprises data selected from the group consisting of encryption key data, text, video, audio, images, biometrics, and digital data.
- 10. A method, comprising:
a) separating a data set into two or more portions of data; b) encrypting one or more of the portions of data of step a); and c) storing the one or more encrypted portions of data of step b) on one or more locations on one or more data depository.
- 11. The method of claim 10, wherein the separating of step a) separates the data set into four or more portions of data.
- 12. The method of claim 10, wherein step a) and step b) are repeated one or more times before the storing of step c), and, optionally, wherein the encryption of step b) is repeated using a different encryption algorithm.
- 13. The method of claim 10, wherein the storing of step c) is on different locations of the same data depository.
- 14. The method of claim 10, wherein the storing of step c) is on different data depositories.
- 15. The method of claim 10, wherein the storing of step c) is on different data depositories in different geographic locations.
- 16. The method of claim 10, wherein the encryption of step b) provides an encryption key, and wherein the encryption key is stored in step c) together with the data encrypted using said encryption key in step b).
- 17. The method of claim 10, wherein the encryption of step b) provides an encryption key, and wherein the encryption key is stored in step c) separately from the data encrypted using said encryption key in step b).
- 18. The method of claim 10, wherein the data set of step a) comprises data selected from a group consisting of encryption key data, text, video, audio, images, biometrics, and digital data.
- 19. The method of claim 10, wherein the encryption of step b) is performed using an encryption algorithm selected from a group consisting of RS1, RC4™, and OTP.
- 20. A method, comprising:
a) generating an encryption master key and encrypting a data set using the encryption master key; b) separating each of the encryption master key and the encrypted data set into two or more portions according to one separating pattern and appending an encryption master key portion to an encrypted data set portion; c) generating one or more encryption keys for the portions of data from step b) and encrypting said portions of data using said encryption key; and d) storing the encrypted portions of data from step c) and the encryption keys from step c) on at least one data depository.
- 21. The method of claim 20, wherein the storing of encrypted data portions in step d) is on two or more different locations of one data depository.
- 22. The method of claim 20, wherein the storing of encrypted data portions in step d) is on two or more data depositories.
- 23. The method of claim 20, wherein the storing of the encryption keys in step d) is on two or more different locations of one data depository.
- 24. The method of claim 20, wherein the storing of the encryption keys of step d) is on two or more different data depositories.
- 25. The method of claim 20, wherein the encryption keys generated in step c) is stored according to step d) with the encrypted data of step c) on different locations on one or more data depository.
- 26. The method of claim 20, wherein the encryption key generated in step c) is stored according to step d) on a different data depository from the encrypted data of step c) that was encrypted using said encryption key.
- 27. The method of claim 20, wherein the encrypted data of step b) is separated into four or more portions.
- 28. The method of claim 20, wherein the encryption master key of step b) is separated into four or more portions.
- 29. The method of claim 20, wherein step b) and step c) are repeated one or more times, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 30. A method, comprising:
a) generating an encryption master key and encrypting a data set using the encryption master key; b) separating each of the encryption master key and the encrypted data set into two or more portions according to one separating pattern and storing the encryption master key portions on one or more locations of one or more data depositories; c) generating one or more encryption keys for the encrypted data set portions of step b) and encrypting said portions of data using said encryption key; and d) storing the encrypted portions from step c) and the encryption keys from step c) on at least one location of at least one data depository, wherein said data depositories are different from the data depositories of step b).
- 31. The method of claim 30, wherein the storing of encrypted data portions in step d) is on two or more different locations of one data depository.
- 32. The method of claim 30, wherein the storing of encrypted data portions in step d) is on two or more data depositories.
- 33. The method of claim 30, wherein the storing of the encryption keys in step d) is on two or more different locations of one data depository.
- 34. The method of claim 30, wherein the storing of the encryption keys of step d) is on two or more different data depositories.
- 35. The method of claim 30, wherein the encryption keys generated in step c) and used to encrypt a data set in step c) is stored according to step d) with the encrypted data set that was encrypted using the encryption key on one or more data depositories.
- 36. The method of claim 30, wherein the encryption key generated in step c) and used to encrypt a data set in step c) is stored according to step d) in a different location on one or more data depositories from the encrypted data set that was encrypted using the encryption key.
- 37. The method of claim 30, wherein the encrypted data of step b) is separated into four or more portions.
- 38. The method of claim 30, wherein the encryption master key of step b) is separated into four or more portions.
- 39. The method of claim 30, wherein step b) and step c) are repeated one or more times, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 40. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module.
- 41. The system of claim 40, wherein said data splitting module separates data into two or more portions.
- 42. The system of claim 40, wherein said cryptographic handling module operates on data prior to of after said data is operated on by the data splitting module, and performs encryption of the data.
- 43. The system of claim 40, wherein said data assembling module operates on data that has been operated on by the data splitting module or the cryptographic module to restore said data to its original form.
- 44. A method, comprising:
a) encrypting a data set to provide an encrypted data set; b) separating the encrypted data set into two or more portions of data according to the contents of a unique key value; c) encrypting one or more of the portions of data from step b); and d) storing the encrypted portions of data from step c) at one or more locations on one or more data depositories.
- 45. The method of claim 44, wherein the separating of step b) separates the encrypted data set into four or more portions of data according to the contents of a unique key value.
- 46. The method of claim 45, wherein step b) and step c) are repeated one or more times before the storing of step d), and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm in step a).
- 47. The method of claim 44, wherein the storing of step d) is on different locations of the same data depository.
- 48. The method of claim 44, wherein the storing of step d) is on different data depositories.
- 49. The method of claim 44, wherein the storing of step d) is on different data depositories in different geographic locations.
- 50. The method of claim 44, wherein the encryption of step c) provides an encryption key, and wherein the encryption key is stored in step d) together with the data encrypted using said encryption key in step c).
- 51. The method of claim 44, wherein the encryption of step c) provides an encryption key, and wherein the encryption key is stored in step d) separately from the data encrypted using said encryption key in step c).
- 52. The method of claim 44, wherein the data set of step a) comprises data selected from the group consisting of encryption key data, text, video, audio, images, biometrics, and digital data.
- 53. The method of claim 44 wherein said portions of data comprise one or more bits of data.
- 54. A method, comprising:
a) splitting a data set into N number of data units; b) selecting X number of shares for data unit storage; c) generating N number of random numbers that correspond to the X number of shares; d) assigning the random numbers to the data units; and e) storing the data units and the random number in the share that corresponds to the random number.
- 55. The method of claim 54, wherein said data units comprise at least one bit.
- 56. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 1.
- 57. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 1, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 58. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 10.
- 59. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 10, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 60. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 20.
- 61. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 20, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 62. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 30.
- 63. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 30, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 64. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 44.
- 65. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 44, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
- 66. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 54.
- 67. A system, comprising:
a) a data splitting module; b) a cryptographic handling module; and c) a data assembling module, wherein said system performs the method of claim 54, and optionally, wherein the encrypting of step c) is performed using an encryption algorithm that is different from the encryption algorithm used in step a).
REFERENCE TO RELATED APPLICATION
[0001] The present application is a continuation-in-part application of co-pending non-provisional application Ser. No. 09/666,519, filed on Sep. 20, 2000, which claims priority benefit under 35 U.S.C. §119(e) from U.S. Provisional Application No. 60/154,734, filed Sep. 20, 1999, entitled “SECURE SITE FOR INTERNET TRANSACTIONS” and from U.S. Provisional Application No. 60/200,396, filed Apr. 27, 2000, entitled “SECURE SITE FOR INTERNET TRANSACTIONS”.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60154734 |
Sep 1999 |
US |
|
60200396 |
Apr 2000 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09666519 |
Sep 2000 |
US |
Child |
10458928 |
Jun 2003 |
US |