K2View innovates in data management with new encryption patent

Organizations can encrypt data associated with a specific person, place or thing

encryption logo

On May 19, the U.S. Patent and Trademark Office issued a patent to K2View for a new encryption. This patented approach provides a more secure method for encrypting data. It’s based on the concept of “a hierarchical structure of encryption keys for information stored in a database.” 

K2View enables companies to use a data operations methodology, which is a set of people, processes and technology that focuses on “delivering the right data, to the right place, at the right time.” This methodology is based on the firm’s patented Digital Entity, a person, place or thing recreated digitally out of its data. The Digital Entity delivers data about the business in real time for almost any situation.

Advertisement - Article continues below

A DataOps methodology must pair with security by design. The new patent involves K2View’s method for uniquely encrypting data at three different levels at the same time: during deployment, at the digital entity category level (e.g., customers) and at the individual entity level (e.g., Jane Doe).

“When combined with our previously patented Digital Entity, it’s now possible to encrypt every micro-database individually,” said Achi Rotem, CTO and co-founder, K2View. “So, if you’re a financial services company and have millions or billions of credit cards, a hacker would now need to hack each individually encrypted database to achieve a mass breach. Similarly, if you’re a consumer company with millions of customers, like a telco or a retailer, a hacker now needs to hack millions of individually encrypted databases – one per customer – for a mass breach to occur.”

Advertisement
Advertisement - Article continues below

K2View provides advanced data fabric, data integration and data delivery software. Its main product, K2View Fabric, uses patented logical unit technology to enable secure access and control of an organization’s data across any number of systems and data sources. 

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/hardware/components/356405/is-it-time-to-put-intel-outside
components

Is it time to put Intel Outside?

10 Jul 2020