US 12,008,117 B2
System and methods for using cipher objects to protect data
Gregory Scott Smith, Madison, TN (US); Melani Leigh Smith Weed, Franklin, TN (US); Daniel Michael Fischer, Brentwood, TN (US); Elke M. Ridenour, Brentwood, TN (US); and Behzad Nadji, Tiburon, CA (US)
Assigned to SERTAINTY CORPORATION, Nashville, TN (US)
Filed by SERTAINTY CORPORATION, Nashville, TN (US)
Filed on Jul. 13, 2021, as Appl. No. 17/374,781.
Application 17/374,781 is a continuation of application No. 16/657,412, filed on Oct. 18, 2019, granted, now 11,093,623, issued on Aug. 17, 2021.
Application 16/657,412 is a continuation of application No. 15/704,735, filed on Sep. 14, 2017, granted, now 10,482,266, issued on Nov. 19, 2019.
Application 15/704,735 is a continuation of application No. 14/689,668, filed on Apr. 17, 2015, granted, now 9,792,451, issued on Oct. 17, 2017.
Application 14/689,668 is a continuation in part of application No. 13/710,366, filed on Dec. 10, 2012, abandoned.
Claims priority of provisional application 61/980,617, filed on Apr. 17, 2014.
Claims priority of provisional application 61/569,162, filed on Dec. 9, 2011.
Prior Publication US 2021/0342459 A1, Nov. 4, 2021
Int. Cl. G06F 21/60 (2013.01); H04L 9/40 (2022.01); H04W 4/18 (2009.01)
CPC G06F 21/604 (2013.01) [G06F 21/606 (2013.01); H04L 63/104 (2013.01); H04L 63/20 (2013.01); H04W 4/185 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2141 (2013.01); H04L 63/0428 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for creating digitally secured data, comprising:
initializing a dynamic participant controller (DPC);
receiving, by the DPC, a set of digital participant data;
constructing, by the DPC and using the set of digital participant data, a computer-based intelligent cipher transfer object (ICTO);
applying, by the DPC, an outer cloaking pattern to the set of digital participant data in the ICTO using an interim ruleset;
adding, by the DPC, owner data elements to the ICTO;
replacing, by the DPC, the interim ruleset with owner-specific rules;
applying, by the DPC, an inner cloaking pattern to the ICTO based at least in part on the owner-specific rules, thus creating a secure set of digital participant data.