Method, apparatus, and program product for revealing...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000, C380S277000, C713S165000, C713S167000

Reexamination Certificate

active

07861096

ABSTRACT:
A selectively encrypted data unit includes an encrypted version of sensitive information (capable of being decrypted to reveal the sensitive information), a plurality of auxiliary values, and an attribute vector associated with the encrypted version of the sensitive information. The selectively encrypted data unit and a unique capability key are accessed. The unique capability key is associated with a key descriptor and is responsive to one or more cryptosystem parameters, one or more random numbers and one or more shares of a master secret. Next the technology determines whether the attribute vector is filtered or enabled by the key descriptor. If so, a protection key is acquired that is responsive to the one or more cryptosystem parameters, the plurality of auxiliary values, the key descriptor and the unique capability key. Once acquired, the protection key is used to decrypt the encrypted version to generate the sensitive information which is presented.

REFERENCES:
patent: 5903646 (1999-05-01), Rackman
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6889205 (2005-05-01), Lamm
patent: 6931532 (2005-08-01), Davis et al.
patent: 7010681 (2006-03-01), Fletcher et al.
patent: 7603553 (2009-10-01), Corbett et al.
patent: 2002/0016777 (2002-02-01), Seamons et al.
patent: 2002/0073313 (2002-06-01), Brown et al.
patent: 2002/0083079 (2002-06-01), Meier et al.
patent: 2002/0103799 (2002-08-01), Bradford et al.
patent: 2003/0091192 (2003-05-01), Chen et al.
patent: 2004/0088313 (2004-05-01), Torres
patent: 2004/0151310 (2004-08-01), Fu et al.
patent: 2005/0108351 (2005-05-01), Naick et al.
patent: 2005/0132070 (2005-06-01), Redlich et al.
patent: 2005/0138109 (2005-06-01), Redlich et al.
patent: 2005/0251514 (2005-11-01), Houle
patent: 2006/0075228 (2006-04-01), Black et al.
patent: 2006/0259983 (2006-11-01), Sperry
AccessData, Forensic Toolkit. Available on the Internet Dec. 4, 2006 at http://www.accessdata.com/products/ftk/.
Akl, Selim G., et al., “Cryptographic solution to a problem of access control in a hierarchy”, ACM Transactions on Computer Systems (TOCS), vol. 1, Issue 3, Aug. 1983, pp. 239-248.
Attenex Corporation E-Discovery Software. Available on the Internet on Dec. 4, 2006 at http://www.attenex.com/products/eDiscovery.
Asano, Tomoyuki, “A revocation scheme with minimal storage at receivers”, Lecture Notes in Computer Science, vol. 2501, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology, 2002, pp. 433-450.
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing”, In SIAM J. of Computing, vol. 32, No. 3, 2003, pp. 586-615.
Computing Systems Innovations (CSI). Available on the Internet Dec. 4, 2006 at http://www.csisoft.com/applications/intellidact.php.
Goyal, V., et al., “Attribute-based encryption for fine-grained access control of encrypted data”, in the Proceedings of the 13thACM Conference on Computer and Communications Security, pp. 89-98, Oct. 30, 2006.
nMatrix e-Discovery Services. Available on the Internet Dec. 4, 2006 at http://www.nmatrix.com/e-discovery—services.php.
RenewData. Available on the Internet Dec. 4, 2006 at http://www.renewdata.com/ediscovery-now.php.
Rivest, R.L., et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, 1978, pp. 120-126.
Stratify, Inc, Stratify Legal DiscoveryTM 4.0. Available on the Internet Dec. 4, 2006 at http://www.stratify.com/legal/index.html.
Sweeney, L., “Datafly: A system for providing anonymity in medical data”, In Database Security XI: Status and Prospects, 11th International Conference on Database Security, 1997, pp. 356-381.
U.S. Appl. No. 11/202549, entitled “Document Anonymization Apparatus and Method”, filed Aug. 12, 2005.
U.S. Appl. No. 11/282780, entitled “System and Method for Controlling Access to Personal Identification Information Contained in Documents”, filed Nov. 18, 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, apparatus, and program product for revealing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, apparatus, and program product for revealing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, apparatus, and program product for revealing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4155623

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.