XML encryption scheme

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C705S03600T

Reexamination Certificate

active

06694433

ABSTRACT:

FIELD OF THE INVENTION
Generally, cryptographic systems are used to prevent unauthorized disclosure of information during transmission and/or storage of data. The process of encryption involves the manipulation of data so that it is unreadable, in effect making the content inaccessible, to an unauthorized entity. The process of decryption involves the manipulation of encrypted data so as to recreate the original scheduled condition of the data, or to transform the encrypted data into readable data that corresponds to the original unencrypted data. Secrecy is not the only advantage provided by encryption. The process of encryption ensures data integrity, as encrypted data that has been modified does not decrypt properly unless the proper, that is, authorized, procedures are followed. It is the integrity property provided by encryption that is used by the present invention, as well as its security properties.
BACKGROUND OF THE INVENTION
The corporate world used to depend solely on paper to operate. Hard copy documents were used to provide corporate governance, settle disputes at law, and formed the basis for audits by tax and regulatory authorities, internal authorized recipients, and independent accountants. In many instances, this is no longer the case. As business moves to electronic operational and accounting systems, hard copy documents in many cases either do not exist or are merely incidental to electronic records. This lack of hard copy affects the ability of management and other interested parties to manage and audit corporate systems.
An original paper document carries a degree of presumption of authenticity that cannot currently be attributed to an electronic file. Changes can be virtually impossible to detect in the electronic world. With electronic data interchange, a company uses computers, computer programs, and transmission links to automatically transact business with customers and suppliers. With image processing systems, documents are scanned and converted to digital images. The original documents may not be retained. Some electronic information may exist for only a short time and may not be retrievable if files are updated and backup files do not exist.
A company may have many information and control systems. In this context, a system is the entire combination, or a logical sub-part, of tangible and intangible elements that, acting together, protect assets and provide reliable data, or the assurance thereof. The tangible part of the system includes, but is not limited to, paper documents and the markings and signatures made thereon, as well as the physical processes and procedures used to safeguard assets. System intangibles include policies and procedures providing instructions and structure to the business process.
Management and other interested parties must determine that policies, procedures, and instructions are carried out to a sufficient degree in a timely fashion. Information and control systems provide this assurance. Authorized recipients review information and control systems to determine if the design of each meets stated objectives. They also review the synergistic effect of all relevant systems to determine their overall effectiveness. If the sum of all system designs are deemed to be effective in producing stated objectives, authorized recipients then must perform tests of these systems in order to prove the systems actually exist and are functioning as represented by management.
Based on the volume of information involved, authorized recipients and others reviewing corporate activities cannot directly examine all activities and data produced by a company. They must devise tests for evaluating the activities and data that they can directly examine, in order to provide a reliable indication of the overall well-being of the corporation. The nature, timing, and extent of these tests are based on professional judgment. Tests include those steps necessary to verify that stated control elements exist and are functioning as intended. Tests also include the examination of particular transactions to provide operational assurance on a statistical basis.
The tests of both controls and transactions may include the examination of documents produced both within the company and by outside entities. For some audit objectives, such as confirmation of balances, activities, agreements, etc., evidence will be obtained from parties independent of the company. The authorized recipient's goal is to reduce to an acceptable level the risk of not discovering a material misstatement or system control deficiency. If an authorized recipient cannot reduce detection risk to an acceptable level, it may be impossible to render an unqualified opinion.
As more businesses adopt electronic systems and interact electronically with vendors and customers, the ability to reliably audit both controls and transactions is greatly diminished, perhaps, in some cases, to the point that serious adverse control and audit consequences will become common.
SUMMARY OF THE INVENTION
An objective of the present invention is to use encryption and encrypted objects to record and authenticate inputs, processes, scheduled conditions, and virtual environments of electronic accounting and operational systems, and to provide a means to distribute these encrypted objects to designated locations for access by designated individuals or entities.
Inputs in this context can be any individual action or sum of actions having any effect on a control or accounting system. Outputs in this context can be the result of any process or action of a control or accounting system. These actions may be transactional in nature, directly entered by a human being as the first electronically recorded action, or may be a result of computations within the system, or may be passed to the system by another system.


REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4757537 (1988-07-01), Edelman et al.
patent: 4864616 (1989-09-01), Pond et al.
patent: 4955082 (1990-09-01), Hattori et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5052040 (1991-09-01), Preston et al.
patent: 5065429 (1991-11-01), Lang
patent: 5191611 (1993-03-01), Lang
patent: 5204961 (1993-04-01), Barlow
patent: 5222018 (1993-06-01), Sharpe et al.
patent: 5319562 (1994-06-01), Whitehouse
patent: 5369702 (1994-11-01), Shanton
patent: 5369707 (1994-11-01), Follendore, III
patent: 5499297 (1996-03-01), Boebert
patent: 5535279 (1996-07-01), Seestrom
patent: 5535297 (1996-07-01), Goettsche
patent: 5602921 (1997-02-01), Ramadei et al.
patent: 5680452 (1997-10-01), Shanton
patent: 5684705 (1997-11-01), Herbert
patent: 5694472 (1997-12-01), Johnson et al.
patent: 5696829 (1997-12-01), Cordery et al.
patent: 5717755 (1998-02-01), Shanton
patent: 5749078 (1998-05-01), Gargiulo et al.
patent: 5778066 (1998-07-01), Shah et al.
patent: 5794234 (1998-08-01), Church et al.
patent: 5898781 (1999-04-01), Shanton
patent: 5999623 (1999-12-01), Bowman et al.
patent: 6055634 (2000-04-01), Severwright
patent: 6098071 (2000-08-01), Aoyama et al.
patent: 6105012 (2000-08-01), Chang et al.
patent: 6169805 (2001-01-01), Dunn et al.
patent: 6223287 (2001-04-01), Douglas et al.
patent: 6370516 (2002-04-01), Reese
patent: 6385552 (2002-05-01), Snyder
patent: 2293737 (1996-04-01), None
Rumbaugh, James, et al. “Object-Oriented Modeling and Design.” Prentice Hall. 1991. Sections 10.6 and 14.3.*
Massey; An Introduction to Contemporary Cryptology; Proceedings of the IEEE; 1988; pp. 533-549; vol. 76; No. 5.
Schneier; Untangling Public-Key Cryptography; Dr. Dobb's Journal; May 1992; pp. 16-28.
Bray et al. (Eds.), “Extensible Markup Language (XML) 1.0”, W3C Recommendations, Feb. 10, 1998, World Wide Web Consortium, www.w3.org/TR/1998/REC-xml-19980210.
Cover, “XML and Encryption”, “The SGML/XML Web Page”, Nov. 8, 2000 or earlier, Organization for

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

XML encryption scheme does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with XML encryption scheme, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and XML encryption scheme will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3315066

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.