The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 18, 2020

Filed:

Jul. 31, 2018
Applicant:

Salesforce.com, Inc., San Francisco, CA (US);

Inventors:

William C. Eidson, Palo Alto, CA (US);

Michael Goldberg Boilen, Kirkland, WA (US);

David Hacker, Moraga, CA (US);

Assignee:

salesforce.com, inc., San Francisco, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 29/06 (2006.01); G06F 9/54 (2006.01); H04L 9/08 (2006.01); G06F 11/30 (2006.01); G06F 11/34 (2006.01); H04L 9/32 (2006.01); H04L 9/14 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
G06F 21/602 (2013.01); G06F 9/542 (2013.01); G06F 11/3072 (2013.01); G06F 11/3476 (2013.01); G06F 21/62 (2013.01); G06F 21/6254 (2013.01); H04L 9/0861 (2013.01); H04L 9/0891 (2013.01); H04L 9/14 (2013.01); H04L 9/3213 (2013.01); H04L 9/3234 (2013.01); H04L 63/108 (2013.01); H04L 63/20 (2013.01); H04L 67/22 (2013.01); G06F 2221/2141 (2013.01);
Abstract

A first raw value of a first field from the first set of fields is encrypted to generate a first token using a symmetric key encryption mechanism based on a first cryptographic key associated with a first time window after which the first cryptographic key is no longer valid for tokenization of raw fields of raw log records. After the first time window has elapsed, a second raw value of a second field from the second set of fields is encrypted to generate a second token using the symmetric key encryption mechanism based on a second cryptographic key that is different from the first cryptographic key. The second cryptographic key is associated with a third time window that occurs after the first time window and after which the second cryptographic key is no longer valid for tokenization of raw fields of raw log records.


Find Patent Forward Citations

Loading…