A technique for providing data security through the removal of elements of a database table, be they the data fields themselves, or structural components, such as connection information that defines how, for example, the elements of a database are structured. The removed elements are placed in a secure location, retrievable only by having knowledge of a new primary key stored with the removed elements.

 
Web www.patentalert.com

< Threaded presentation of electronic mail

> Methods and systems for managing successful completion of a network of processes

~ 00409