20240028758. Secured Search for Ready-Made Search Software simplified abstract (IronCore Labs, Inc.)

From WikiPatents
Jump to navigation Jump to search

Secured Search for Ready-Made Search Software

Organization Name

IronCore Labs, Inc.

Inventor(s)

Robert Wall of Bozeman MT (US)

Patrick Walsh of Boulder CO (US)

Colt Frederickson of Bozeman MT (US)

Secured Search for Ready-Made Search Software - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240028758 titled 'Secured Search for Ready-Made Search Software

Simplified Explanation

The abstract describes a search management system that ensures the security of search indices, search queries, and document records used by cloud-based search software. This is achieved without making any modifications to the core software of the cloud-based search system. A search proxy is introduced as an intermediary between the cloud-based vendor application and the search software.

The search proxy utilizes key-based deterministic cryptographic tokenization to irreversibly secure plaintext words from document records for indexing and plaintext keywords from search queries for search and retrieval. Additionally, the search proxy applies key-based encryption to the pre-tokenized plaintext words of the document record, storing the encrypted data as a separate field within the document record.

When a search query is made, the search software retrieves the encrypted field and other parts of the document record, and the search proxy decrypts the field to reproduce the original document record.

  • Key-based deterministic cryptographic tokenization is used to secure plaintext words from document records for indexing and plaintext keywords from search queries for search and retrieval.
  • Key-based encryption is applied to the pre-tokenized plaintext words of the document record, and the encrypted data is stored as a separate field within the document record.
  • The search proxy acts as an intermediary between the cloud-based vendor application and the search software, ensuring the security of search indices, search queries, and document records without modifying the core software of the cloud-based search system.
  • The search proxy decrypts the encrypted field retrieved from the search software to reproduce the original document record.

Potential applications of this technology:

  • Cloud-based search systems that require enhanced security for search indices, search queries, and document records.
  • Industries dealing with sensitive information such as healthcare, finance, or legal sectors where secure search and retrieval of documents is crucial.

Problems solved by this technology:

  • Ensures the cryptographic security of search indices, search queries, and document records in cloud-based search systems without requiring modifications to the core software.
  • Protects sensitive information from unauthorized access or exposure during indexing, search, and retrieval processes.

Benefits of this technology:

  • Enhanced security for cloud-based search systems without the need for extensive modifications to the existing infrastructure.
  • Enables secure search and retrieval of sensitive documents without compromising the privacy and integrity of the data.


Original Abstract Submitted

search management systems and methods that cryptographically-secure search indices, search queries, and associated document records while in-use by cloud-based search software without requiring modification to the cloud-based search core software. the search proxy resides between a cloud-based vendor application and the cloud-based search software. the search proxy uses key-based deterministic cryptographic tokenization to irreversibly cryptographically-secure plaintext words from document records for indexing and plaintext keywords from search queries for search and retrieval. the search proxy separately uses key-based encryption on the document record's pre-tokenized plaintext words, adding the encrypted data as a separate field to the document record. this encrypted field is stored as part of the document by the search service. a search query retrieves the encrypted field and the other parts of the document record from the search software, and the search proxy decrypts the field to reproduce the original document record.