The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 13, 2010

Filed:

Jan. 02, 2002
Applicants:

Dan Boneh, Palo Alto, CA (US);

Rajeev Chawla, Union City, CA (US);

Alan Frindell, Mountain View, CA (US);

Eu-jin Goh, San Carlos, CA (US);

Nagendra Modadugu, Menlo Park, CA (US);

Panagiotis Tsirigotis, Mountain View, CA (US);

Inventors:

Dan Boneh, Palo Alto, CA (US);

Rajeev Chawla, Union City, CA (US);

Alan Frindell, Mountain View, CA (US);

Eu-Jin Goh, San Carlos, CA (US);

Nagendra Modadugu, Menlo Park, CA (US);

Panagiotis Tsirigotis, Mountain View, CA (US);

Assignee:

SafeNet, Inc., Belcamp, MD (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 15/16 (2006.01);
U.S. Cl.
CPC ...
Abstract

A method and apparatus are provided for protecting sensitive information within server or other computing environments. Numerous electronic requests addressed to a server system are received over network couplings and evaluated. The evaluation scans for sensitive information including credit card information and private user information. Upon detecting sensitive data, cryptographic operations are applied to the sensitive data. When the sensitive data is being transferred to the server system, the cryptographic operations encrypt the sensitive data prior to transfer among components of the server system. When sensitive data is being transferred from the server system, the cryptographic operations decrypt the sensitive data prior to transfer among the network couplings. The cryptographic operations also include hash, and keyed hash operations.


Find Patent Forward Citations

Loading…