K2View innovates in data management with new encryption patent

Organizations can encrypt data associated with a specific person, place or thing

Padlock over lines of binary code

On May 19, the U.S. Patent and Trademark Office issued a patent to K2View for a new encryption. This patented approach provides a more secure method for encrypting data. It’s based on the concept of “a hierarchical structure of encryption keys for information stored in a database.” 

K2View enables companies to use a data operations methodology, which is a set of people, processes and technology that focuses on “delivering the right data, to the right place, at the right time.” This methodology is based on the firm’s patented Digital Entity, a person, place or thing recreated digitally out of its data. The Digital Entity delivers data about the business in real time for almost any situation.

A DataOps methodology must pair with security by design. The new patent involves K2View’s method for uniquely encrypting data at three different levels at the same time: during deployment, at the digital entity category level (e.g., customers) and at the individual entity level (e.g., Jane Doe).

“When combined with our previously patented Digital Entity, it’s now possible to encrypt every micro-database individually,” said Achi Rotem, CTO and co-founder, K2View. “So, if you’re a financial services company and have millions or billions of credit cards, a hacker would now need to hack each individually encrypted database to achieve a mass breach. Similarly, if you’re a consumer company with millions of customers, like a telco or a retailer, a hacker now needs to hack millions of individually encrypted databases – one per customer – for a mass breach to occur.”

K2View provides advanced data fabric, data integration and data delivery software. Its main product, K2View Fabric, uses patented logical unit technology to enable secure access and control of an organization’s data across any number of systems and data sources. 

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

BillQuick billing software exploit lets hackers deploy ransomware
Security

BillQuick billing software exploit lets hackers deploy ransomware

26 Oct 2021
Ransomware hit industrial sector the hardest in the third quarter
ransomware

Ransomware hit industrial sector the hardest in the third quarter

25 Oct 2021
Tesco services knocked offline after suspected cyber attack
hacking

Tesco services knocked offline after suspected cyber attack

25 Oct 2021
Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021

Most Popular

UK spy agencies supercharge espionage efforts with AWS data deal
cloud computing

UK spy agencies supercharge espionage efforts with AWS data deal

26 Oct 2021
Cryptocurrency: Should you invest?
cryptocurrencies

Cryptocurrency: Should you invest?

27 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021