IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

K2View innovates in data management with new encryption patent

Organizations can encrypt data associated with a specific person, place or thing

Padlock over lines of binary code

On May 19, the U.S. Patent and Trademark Office issued a patent to K2View for a new encryption. This patented approach provides a more secure method for encrypting data. It’s based on the concept of “a hierarchical structure of encryption keys for information stored in a database.” 

K2View enables companies to use a data operations methodology, which is a set of people, processes and technology that focuses on “delivering the right data, to the right place, at the right time.” This methodology is based on the firm’s patented Digital Entity, a person, place or thing recreated digitally out of its data. The Digital Entity delivers data about the business in real time for almost any situation.

A DataOps methodology must pair with security by design. The new patent involves K2View’s method for uniquely encrypting data at three different levels at the same time: during deployment, at the digital entity category level (e.g., customers) and at the individual entity level (e.g., Jane Doe).

“When combined with our previously patented Digital Entity, it’s now possible to encrypt every micro-database individually,” said Achi Rotem, CTO and co-founder, K2View. “So, if you’re a financial services company and have millions or billions of credit cards, a hacker would now need to hack each individually encrypted database to achieve a mass breach. Similarly, if you’re a consumer company with millions of customers, like a telco or a retailer, a hacker now needs to hack millions of individually encrypted databases – one per customer – for a mass breach to occur.”

K2View provides advanced data fabric, data integration and data delivery software. Its main product, K2View Fabric, uses patented logical unit technology to enable secure access and control of an organization’s data across any number of systems and data sources. 

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Recommended

What is zero trust?
network security

What is zero trust?

14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
Hardware

Retbleed hardware-level flaw brings overhead woe to Intel and AMD

13 Jul 2022
An analysis of the European cyber threat landscape
Whitepaper

An analysis of the European cyber threat landscape

8 Jul 2022
Solve cyber resilience challenges with storage solutions
Whitepaper

Solve cyber resilience challenges with storage solutions

4 Jul 2022

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Microsoft successfully tests emission-free hydrogen fuel cell system for data centres
data centres

Microsoft successfully tests emission-free hydrogen fuel cell system for data centres

29 Jul 2022