Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2011-01-04
2011-01-04
Ustaris, Joseph G (Department: 2433)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C705S076000, C380S044000
Reexamination Certificate
active
07865742
ABSTRACT:
A capability key is generated that provides access to sensitive information within a selectively encrypted data unit created from an unencrypted data unit. A user specifies access rights as a monotone boolean relationship between a selection of a list of attributes related to the unencrypted data unit. This relationship is used to compute a key descriptor. Next one or more shares of a master secret is generated responsive to the monotone boolean relationship and a random number. Next a unique capability key is computed from one or more cryptosystem parameters, the one or more shares and the random number. The unique capability key and the key descriptor together enable decryption of sensitive information within a selectively encrypted data unit created from an unencrypted data unit. Finally, the unique capability key and the key descriptor are provided to allow decryption of sensitive information within the selectively encrypted data unit.
REFERENCES:
patent: 5903646 (1999-05-01), Rackman
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6889205 (2005-05-01), Lamm
patent: 6931532 (2005-08-01), Davis et al.
patent: 7010681 (2006-03-01), Fletcher et al.
patent: 7603553 (2009-10-01), Corbett et al.
patent: 2002/0016777 (2002-02-01), Seamons et al.
patent: 2002/0073313 (2002-06-01), Brown et al.
patent: 2002/0083079 (2002-06-01), Meier et al.
patent: 2002/0103799 (2002-08-01), Bradford et al.
patent: 2003/0091192 (2003-05-01), Chen et al.
patent: 2004/0088313 (2004-05-01), Torres
patent: 2004/0151310 (2004-08-01), Fu et al.
patent: 2005/0108351 (2005-05-01), Naick et al.
patent: 2005/0132070 (2005-06-01), Redlich et al.
patent: 2005/0138109 (2005-06-01), Redlich et al.
patent: 2005/0251514 (2005-11-01), Houle
patent: 2006/0075228 (2006-04-01), Black et al.
patent: 2006/0259983 (2006-11-01), Sperry
AccessData, Forensic Toolkit. Available on the Internet Dec. 4, 2006 at http://www.accessdata.com/products/ftk/.
Akl, Selim G., et al., “Cryptographic solution to a problem of access control in a hierarchy”, ACM Transactions on Computer Systems (TOCS), vol. 1, Issue 3, Aug. 1983, pp. 239-248.
Attenex Corporation E-Discovery Software. Available on the Internet on Dec. 4, 2006 at http://www.attenex.com/products/eDiscovery.
Asano, Tomoyuki, “A revocation scheme with minimal storage at receivers”, Lecture Notes in Computer Science, vol. 2501, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, 2002, pp. 433-450.
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing”, In SIAM J. of Computing, vol. 32, No. 3, 2003, pp. 586-615.
Computing Systems Innovations (CSI). Available on the Internet Dec. 4, 2006 at http://www.csisoft.com/applications/intellidact.php.
Goyal, V., et al., “Attribute-based encryption for fine-grained access control of encrypted data”, in the Proceedings of the 13thACM Conference on Computer and Communications Security, pp. 89-98, Oct. 30, 2006.
nMatrix e-Discovery Services. Available on the Internet Dec. 4, 2006 at http://www.nmatrix.com/e-discovery—services.php.
RenewData. Available on the Internet Dec. 4, 2006 at http://www.renewdata.com/ediscovery-now.php.
Rivest, R.L., et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, 1978, pp. 120-126.
Stratify, Inc, Stratify Legal DiscoveryTM 4.0. Available on the Internet Dec. 4, 2006 at http://www.stratify.com/legal/index.html.
Sweeney, L., “Datafly: A system for providing anonymity in medical data”, In Database Security XI: Status and Prospects, 11th International Conference on Database Security, 1997, pp. 356-381.
U.S. Appl. No. 11/202,549, entitled “Document Anonymization Apparatus and Method”, filed Aug. 12, 2005.
U.S. Appl. No. 11/282,780, entitled “System and Method For Controlling Access to Personal Identification Information Contained in Documents”, filed Nov. 18, 2005.
Golle Philippe Jean-Paul
Staddon Jessica N.
Fay Sharpe LLP
Palo Alto Research Center Incorporated
Richards Kevin
Ustaris Joseph G
LandOfFree
Method, apparatus, and program product for enabling access... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, apparatus, and program product for enabling access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, apparatus, and program product for enabling access... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2703928