Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-07-17
2007-07-17
Moazzami, Nasser (Department: 2136)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S031000, C713S168000, C709S203000, C709S227000, C709S229000, C380S277000, C380S278000, C380S279000, C380S286000
Reexamination Certificate
active
10655680
ABSTRACT:
A method for controlling and tracking access to disseminated information involves encrypting data using a key that is maintained in a key repository. A user requests a message ID and key from the key repository. The key repository issues a message ID and key to the user. The user generates an encrypted message using the key. The encrypted message is then distributed with the message ID to one or more recipients. To read the encrypted message, a particular recipient obtains the key for the message from the key repository by providing the message ID to the key repository. The particular recipient then decrypts the message using the key provided by the key repository. Messages are deleted, in the sense of becoming unusable, by deleting the corresponding key from the key repository. A log is provided to track key repository activity including the issuance of keys and key requests from message recipients. A policy manager is employed to control which recipients are granted keys to read messages and which messages are deleted.
REFERENCES:
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5265159 (1993-11-01), Kung
patent: 5410602 (1995-04-01), Finkelstein et al.
patent: 5481613 (1996-01-01), Ford et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5775995 (1998-07-01), Okamoto
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5786817 (1998-07-01), Sakano et al.
patent: 5794253 (1998-08-01), Norin et al.
patent: 5870548 (1999-02-01), Nielsen
patent: 5958005 (1999-09-01), Thorne et al.
patent: 6134660 (2000-10-01), Boneh et al.
patent: 6215877 (2001-04-01), Matsumoto
patent: 6324650 (2001-11-01), Ogilvie
patent: 7020779 (2006-03-01), Sutherland
patent: WO 98/49643 (1998-04-01), None
patent: WO 98/58321 (1998-06-01), None
patent: WO 99/05814 (1998-07-01), None
patent: WO 98/35474 (1998-08-01), None
Bauer, L., et al, ‘A General and Flexible Access-Control System for the Web’, Aug. 2002, Proceedings of the 11th USENIX Security Symposium, entire document, http://www.ece.cmu.edu/˜lbauer/papers/webauth-sec02.pdf.
Microsoft Corp., “Microsoft CryptoAPI”, Jan. 17, 1996, Microsoft Corp., Version 0.9, entire document.
ZipLip Inc., web site URL “https://www.ziplip.com/products.html,” 1999-2002, entire page.
ZipLip Inc., web site URL “https://www.ziplip.com/products/ZLPublicKeyInfrastructure.html,” 1999-2002, entire page.
ZipLip Inc., “web site URL https://www.ziplip.com/technology/summary.html,” 1999-2002, entire page.
Boneh, Dan, et al., “A Revocable Backup System,” Department of Computer Science, Princeton University, Princeton, NJ, from Proceedings of 6thUSENIX Security Conference, 1996.
Marvit David
Marvit Maclen
Rosema Keith David
Ubois Jeffrey
Baum Ronald
Becker Edward A.
Hickman Palermo & Truong & Becker LLP
Moazzami Nasser
Omniva Corporation
LandOfFree
Controlling and tracking access to disseminated information does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Controlling and tracking access to disseminated information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling and tracking access to disseminated information will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3804395