Distributed cryptographic object method

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 9, 380 21, 380 23, 380 25, 380 28, 380 49, 380 50, 34082531, 34082534, H04L 900

Patent

active

056804520

ABSTRACT:
A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute to other individuals multiple encrypted objects embedded in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved. Label attributes are used to restrict access to objects based on location, group, or other criteria and may specify personal access. Access type, such as read-only, write-only, and print-only may be specified. Nested embedded objects may be accessed directly through selection from a header array.

REFERENCES:
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4864616 (1989-09-01), Pond et al.
patent: 4955082 (1990-09-01), Hatoori et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5052040 (1991-09-01), Preston et al.
patent: 5065429 (1991-11-01), Lang
patent: 5191611 (1993-03-01), Lang
patent: 5204961 (1993-04-01), Barlow
patent: 5369702 (1994-11-01), Shanton
patent: 5369707 (1994-11-01), Follendore III

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Distributed cryptographic object method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Distributed cryptographic object method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Distributed cryptographic object method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1013102

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.