Cryptography – Key management
Reexamination Certificate
2008-04-22
2008-04-22
Sheikh, Ayaz (Department: 2131)
Cryptography
Key management
C713S165000
Reexamination Certificate
active
07362868
ABSTRACT:
A computer system (20) having a security domain (22), at least one client business domain (26), and a plurality of client terminals (34) utilizes a hidden link dynamic key manager (24, 84) and a database structure that includes encrypted data entities (30C,30D) and a security identification attribute (32) for storage of encrypted data. Methods for encrypting data and for storing, decrypting, and retrieving encrypted data operate on the computer system (20), which also includes an information database (62) and a key database (44). The key database (44) is isolated from the information database (62). The hidden link key manager is stored in the security domain (22) and includes a system key manager (84) operable to generate system keys with system key common names and an encryption key manager (24) operable to generate encryption keys having encryption key identifications. The key managers (24, 84) operate on a key server (40), which is mirrored by a secondary key server (42). A general security manager (82) also operates on the key server (40) to control access to the security domain (22). The security information attribute (32) is stored with a persistent data entity (30A) that is associated with the other encrypted data entities (30C,30D) by a database schema. The encryption key identification (112) for the encryption key used to encrypt the data entities (30C,30D) is encrypted by a system key and then stored as part of the security information attribute (32). The system key common name hash value (114) is also stored in the security information attribute (32). The information data entities (30) are stored on the information database (62), but the encryption key identification (153), encryption key (154), system key common name hash value (156, 157), and system key common name (158) are stored in the key database (44) inside the security domain (22). The system key itself is stored on a Smart Card reader (56) inside the security domain.
REFERENCES:
patent: 4423287 (1983-12-01), Zeidler
patent: 4578530 (1986-03-01), Zeidler
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4912762 (1990-03-01), Lee et al.
patent: 5301270 (1994-04-01), Steinberg et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5363507 (1994-11-01), Nakayama et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5530939 (1996-06-01), Mansfield et al.
patent: 5533123 (1996-07-01), Force et al.
patent: 5546304 (1996-08-01), Marschner et al.
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5625693 (1997-04-01), Rohatgi et al.
patent: 5680452 (1997-10-01), Shanton
patent: 5682524 (1997-10-01), Freund et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5748735 (1998-05-01), Ganesan
patent: 5757925 (1998-05-01), Faybishenko
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5778072 (1998-07-01), Samar
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5809497 (1998-09-01), Freund et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5870468 (1999-02-01), Harrison
patent: 5881225 (1999-03-01), Worth
patent: 5907618 (1999-05-01), Gennaro et al.
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 5949882 (1999-09-01), Angelo
patent: 6044154 (2000-03-01), Kelly
patent: 6052469 (2000-04-01), Johnson et al.
patent: 6058188 (2000-05-01), Chandersekaran et al.
patent: 6084969 (2000-07-01), Wright et al.
patent: 6148342 (2000-11-01), Ho
patent: 6160891 (2000-12-01), Al-Salqan
patent: 6199113 (2001-03-01), Alegre et al.
patent: 6249866 (2001-06-01), Brundrett et al.
patent: 6289451 (2001-09-01), Dice
patent: 6463155 (2002-10-01), Akiyama et al.
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6947556 (2005-09-01), Matyas et al.
patent: 2004/0143745 (2004-07-01), Margolus et al.
patent: 0 884 670 (1998-12-01), None
patent: 11143780 (1999-05-01), None
patent: 2810434 (2001-12-01), None
patent: WO 97/49211 (1997-12-01), None
patent: WO 00/04435 (2000-01-01), None
patent: WO 01/35226 (2001-05-01), None
patent: WO 02/29577 (2002-04-01), None
Churches, Tim; “A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers”; BMC Medical Research Methodology, Biomed Central, London, GB, vol. 3, No. 1; Jan. 6, 2003, pp. 1-13.
Ansari Suhail
Hu Jinhui
Khulusi Bassam
Madoukh Ashraf
Vasic Ognjen
Eruces, Inc.
Sheikh Ayaz
Sherkat Arezoo
Spencer Fane Britt & Browne LLP
LandOfFree
Hidden link dynamic key manager for use in computer systems... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hidden link dynamic key manager for use in computer systems..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hidden link dynamic key manager for use in computer systems... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2750565