Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys
A security device and data archiving technology, applied in computer security devices, digital data protection, electronic digital data processing and other directions, can solve the problem of lack of security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] FIG. 1 shows a block diagram of a preferred embodiment of a system for archiving data 9 , 10 based on the method according to the invention. A plurality (two as an example here) of client stations 1 is provided. Cleartext (ie unencrypted) data 9 is stored thereon. Furthermore, for each client station 1 a security device 2 is provided. The security device 2 is used for encryption and decryption of the data 9 , 10 . To this end, it comprises at least a first key 6 and a temporary second key 7 or fragments 6,7. The security device 2 communicates with the archive station 4 via the network 3 . In the archive station 4 the encrypted data 10 are stored in a data memory 11 . Also stored in the key memory 12 is a second key 7 which in each case belongs to the encrypted data 10 .
[0023] The data 9 , 10 can be present, in particular stored and / or transmitted, in the form of plaintext data 9 as well as encrypted data 10 . If the term "data" is used in this document without ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 