Method and system for camouflaging access-controlled data

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S182000

Reexamination Certificate

active

07454782

ABSTRACT:
A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user's knowledge that he has been exposed.

REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4386233 (1983-05-01), Smid et al.
patent: 5206905 (1993-04-01), Lee et al.
patent: 5375169 (1994-12-01), Scheidt et al.
patent: 5559961 (1996-09-01), Blonder
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5745574 (1998-04-01), Muftic
patent: 5761306 (1998-06-01), Lewis
patent: 5787173 (1998-07-01), Scheidt et al.
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5894519 (1999-04-01), Clemot et al.
patent: 6002768 (1999-12-01), Albanese et al.
patent: 6061799 (2000-05-01), Eldridge et al.
patent: 6173282 (2001-01-01), McCaughan et al.
patent: 6408388 (2002-06-01), Fischer
patent: 2747208 (1997-10-01), None
patent: WO 96/02993 (1996-02-01), None
Rachna,Dhamija; Adrian, Perrig; DeJa Vu: A User Study Using Images for Authentication, Aug. 2000, 9th Usenix Security Symposium.
Hoover, D.N. et al., “Software Smart Cards via Cryptographic Camouflage,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 208-215.
TECSEC, “Enhancing Security Technologies,” www.tecsec.com, “Company,” “Contact Us,” and “Products/CKM Technology Overview,” 37 pages, Jun. 5, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for camouflaging access-controlled data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for camouflaging access-controlled data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for camouflaging access-controlled data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4041638

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.