Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method to Encrypt by File Fragmentation across a Grid - Ethical Hacking Disclosure

IP.com Disclosure Number: IPCOM000248466D
Publication Date: 2016-Dec-02
Document File: 4 page(s) / 174K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a secure data storage method that fragments files on a character or byte level, encrypts the data, and optimizes the storage of sensitive information.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 46% of the total text.

Page 01 of 4

Method to Encrypt by File Fragmentation across a Grid - Ethical Hacking Disclosure

Secure data storage of financial and other sensitive information has become more challenging with the threat of systems being compromised by hackers and other cyber security threats. Additional troubles stem from a third party or some entity hacking into

a corpus of data and stealing the content.

The problem addressed herein is that the defense mechanism is traditionally the prevention of access. A new method is needed to render data unusable in the event of

breached data access.

The novel solution is a secure data storage method that fragments files on a character or byte level, encrypts the data, and optimizes the storage of sensitive information.

The system receives text files and other documents that contain sensitive information. It then executes scripts that loop through the text in a document, parsing out characters based on a designated numbering algorithm. The algorithm generates multiple new files. The system places each new file on a different server, naming the files in a way that the system can reconstruct the original file on demand. The process also converts each character in every file to a number and each number to a character, as an added layer of security.

Users log into the system and request to view a file. The system searches for files in this cluster that have proper naming conventions and then reassembles the file, which

then displays on a user's screen.

With this system and method, if data were compromised, the information remains protected because each file is unreadable based on character parsing and encryption.

A single file is unreadable because it is represented as a collection of random letters

and numbers. To make a file usable, all the files on the system are needed; a user has to penetrate through multiple servers to attain these files, know how many fragments exist, know the encryption method, and be able to reconstruct the file. This process is extremely difficult because it requires the simultaneous penetration of multiple servers.

In a preferred embodiment, the system comprises multiple servers, connected on data grid. The implementation steps follow:


1. System receives and loads the data files


2. System fragments the files by:

A. Parsing out characters

    B. Renaming the files
C. Distribution files across multiple servers D. Encrypting the files
3. Authorized user requests the files

4. System reconstructs the files

Fragmentation

1


Page 02 of 4

The fragmentation process:

1. System divides a file into five fragments 2. System loops through all the characters in the original file and parses out every fifth character into a dedicated separate file, for example:

• Characters 1, 6, 11, 16, 21, 26, etc. to one fragment, • Characters 2, 7, 12, 17, 22, 27, etc. to a second fragment
• Continue fragmentation

This method can be either expanded or contracted. For example, a user that wants to fragment files down to 20 frag...