Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data
Reexamination Certificate
2005-09-06
2005-09-06
Wright, Norman M. (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Packet header designating cryptographically protected data
C713S152000, C380S044000
Reexamination Certificate
active
06941456
ABSTRACT:
Provided is a method, system, and program for encrypting files in a computer in communication with a volatile memory and non-volatile storage device. An encryption code is generated to encrypt a file and a decryption code is generated to decrypt one file encrypted with the encryption code. The decryption code is loaded into the volatile memory, wherein the decryption code is erased from the volatile memory when the computer reboots. Files written to the non-volatile storage device are encrypted using the encryption code and the decryption code in the non-volatile memory is used to decrypt files encrypted with the encryption code to transfer from the non-volatile storage device to the volatile memory.
REFERENCES:
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5293424 (1994-03-01), Holtey et al.
patent: 5388157 (1995-02-01), Austin
patent: 5412721 (1995-05-01), Rager et al.
patent: 5552776 (1996-09-01), Wade et al.
patent: 5954817 (1999-09-01), Janssen et al.
patent: 6061794 (2000-05-01), Angelo et al.
patent: 6694430 (2004-02-01), Zegelin et al.
patent: 2276965 (1994-12-01), None
Microsoft Corp., “Encrypting File System for Windows 2000,” pp. 1-28. Copyright 1998 Microsoft Corp.
Engelfriet, A. “Security: Filing Wiping”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from: http://www.stack.nl/˜galactus/remailers/index-wipe.html.
New Technologies, Inc. “Sensitive Data Identification and Elimination Guidelines”. [online] [Retrieved Mar. 24, 2001]. Retrieved from http://www.forensics-intl.com.
Thompson, S. “Windows 95 and the Swap File Controversy: A Lazy Man's Dream”. [online] [Retrieved Mar. 24, 2001]. Retrieved from http://www.aserve.net/faq/win_95_swap.html.
Adams, L. “Security software . . . ” [online] [Retrieved Mar. 24, 2001]. Can be currently found at http://www.light1998.com/CounterSpy/fs010.html.
New Technologies, Inc. “Windows Swap File Defined” [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.forensics-intl.com/def7.html.
ZD, Inc. “Swap File Overwriter”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from www.zdnet.com.
Mauro, J. “Swap Space Implementation, part one”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.unixinsider.com/swol-12-1997/swol-12-insidesolaris.html.
Mauro, J. “Swap Space Implementation, part one”. [online] [Retrieved on Mar. 24, 2001]. Retrieved from http://www.unixinsider.com/swol-01-1998/swol-01-insidesolaris.html.
“Wiping Swap Files”. [online] [Retrieved Mar. 24, 2001] Retrieved from http://security.tao.ca/wipeswap.shtml.
Park Vaughan & Fleming LLP
Sun Microsystems Inc.
Wright Norman M.
LandOfFree
Method, system, and program for encrypting files in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system, and program for encrypting files in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, and program for encrypting files in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3438388