Multiple Layers of Data Security
A technology of data and data objects, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as evasion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] Embodiments may be discussed in a system to create and use secure data objects. In one embodiment, data may be encrypted using a key. From several functions that can be run on the data, one or more functions can be selected. The selected one or more functions may be associated with encrypted data. The selected function or functions may provide exclusive access to the data. A data structure may be created specifying conditions for access to one or more functions. Exclusive interfaces can be created that provide access to one or more functions. The interface may grant access to one or more functions upon determining that one or more of the conditions are met. In another embodiment, the interface may grant access to the one or more functions when it is determined that all conditions are met. Encrypted data, associated one or more functions, data structures and interfaces may be included within the object.
[0013] In an embodiment, software required to perform one or...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


