K2View innovates in data management with new encryption patent

Organizations can encrypt data associated with a specific person, place or thing

Padlock over lines of binary code

On May 19, the U.S. Patent and Trademark Office issued a patent to K2View for a new encryption. This patented approach provides a more secure method for encrypting data. It’s based on the concept of “a hierarchical structure of encryption keys for information stored in a database.” 

K2View enables companies to use a data operations methodology, which is a set of people, processes and technology that focuses on “delivering the right data, to the right place, at the right time.” This methodology is based on the firm’s patented Digital Entity, a person, place or thing recreated digitally out of its data. The Digital Entity delivers data about the business in real time for almost any situation.

A DataOps methodology must pair with security by design. The new patent involves K2View’s method for uniquely encrypting data at three different levels at the same time: during deployment, at the digital entity category level (e.g., customers) and at the individual entity level (e.g., Jane Doe).

“When combined with our previously patented Digital Entity, it’s now possible to encrypt every micro-database individually,” said Achi Rotem, CTO and co-founder, K2View. “So, if you’re a financial services company and have millions or billions of credit cards, a hacker would now need to hack each individually encrypted database to achieve a mass breach. Similarly, if you’re a consumer company with millions of customers, like a telco or a retailer, a hacker now needs to hack millions of individually encrypted databases – one per customer – for a mass breach to occur.”

K2View provides advanced data fabric, data integration and data delivery software. Its main product, K2View Fabric, uses patented logical unit technology to enable secure access and control of an organization’s data across any number of systems and data sources. 

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021