Information security – Access control or authentication – Network
Reexamination Certificate
2001-10-30
2008-11-18
Parthasarathy, Pramila (Department: 2136)
Information security
Access control or authentication
Network
C713S182000
Reexamination Certificate
active
07454782
ABSTRACT:
A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user's knowledge that he has been exposed.
REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4386233 (1983-05-01), Smid et al.
patent: 5206905 (1993-04-01), Lee et al.
patent: 5375169 (1994-12-01), Scheidt et al.
patent: 5559961 (1996-09-01), Blonder
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5745574 (1998-04-01), Muftic
patent: 5761306 (1998-06-01), Lewis
patent: 5787173 (1998-07-01), Scheidt et al.
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5894519 (1999-04-01), Clemot et al.
patent: 6002768 (1999-12-01), Albanese et al.
patent: 6061799 (2000-05-01), Eldridge et al.
patent: 6173282 (2001-01-01), McCaughan et al.
patent: 6408388 (2002-06-01), Fischer
patent: 2747208 (1997-10-01), None
patent: WO 96/02993 (1996-02-01), None
Rachna,Dhamija; Adrian, Perrig; DeJa Vu: A User Study Using Images for Authentication, Aug. 2000, 9th Usenix Security Symposium.
Hoover, D.N. et al., “Software Smart Cards via Cryptographic Camouflage,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 208-215.
TECSEC, “Enhancing Security Technologies,” www.tecsec.com, “Company,” “Contact Us,” and “Products/CKM Technology Overview,” 37 pages, Jun. 5, 2001.
Hird Geoffrey R.
Kausik Balas Natarajan
Rajasekaran Sanguthevar
Arcot Systems, Inc.
Parthasarathy Pramila
Townsend and Townsend / and Crew LLP
LandOfFree
Method and system for camouflaging access-controlled data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for camouflaging access-controlled data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for camouflaging access-controlled data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4041638