Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2003-12-05
2008-08-12
Vu, Kimyen (Department: 2135)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C713S183000, C713S184000, C713S185000, C726S002000
Reexamination Certificate
active
07412603
ABSTRACT:
Systems and methods are disclosed for storing sensitive data in a database, such as an application database or a dedicated application security database or store. In accordance with one aspect of the invention, user passwords are not directly stored in a database; but instead, when a password is entered, a one-way hash of the password phrase is produced for storage and/or comparison purposes. In accordance with another aspect, individual authorized application users are each aligned with their own version of an application-wide security key such that it becomes unnecessary to directly store the key in its original form. The security key is used to process sensitive data. In accordance with another aspect, a user's version of the application-wide security reflects an encryption-based relationship to the user's password. Various embodiments also support flexible access to particular collections of sensitive data based on user account and/or user role information.
REFERENCES:
patent: 6038563 (2000-03-01), Bapat et al.
patent: 6446092 (2002-09-01), Sutter
patent: 6959394 (2005-10-01), Brickell et al.
patent: 6986039 (2006-01-01), Leah et al.
patent: 7000108 (2006-02-01), Yarsa et al.
patent: 7020645 (2006-03-01), Bisbee et al.
patent: 7080260 (2006-07-01), Johnson
patent: 7082414 (2006-07-01), Ohtsuka
patent: 7114080 (2006-09-01), Rahman et al.
patent: 7167564 (2007-01-01), Asano et al.
patent: 7170462 (2007-01-01), Ihara et al.
patent: 7171564 (2007-01-01), Kelley et al.
patent: 7178025 (2007-02-01), Scheidt et al.
patent: 7194621 (2007-03-01), Nguyen et al.
Bellare, Mihir. Et al. “Authenticated Key Exchange Secure Against Dictionary Attacks.”Advances in Crytology. vol. 1807, 2000. pp. 139-155.
Bellovin and Meritt, Steven M. and Michael. “Augmented Encrypted Key Exchange: {A} Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise”,Proceedings of the 1st {ACM} Conference on Computer and Communications Security. Nov. 1993. pp. 244-250.
Haller, Neil M., “The {S/Key} One-Time Password System”. 1992.
National Institute of Standards and Technology. {FIPS PUB 181} Standard for {Automated Password Generator (APG}); Oct. 1993. 1-9.
Rivest and Shamir, Ronald L. and Adi. “PayWord and MicroMint: Two Simple Micropyament Schemes” MIT Laboratory for Computer Science. Apr. 27, 2001, pp. 1-18.
Karp, Alan H. “Site-Specific Passwords”, abstract. May 2003. pp. 1-9.
Blackwood Kirk
Dournov Pavel
Yeates Anthony
Microsoft Corporation
Truvan Leynna T
Vu Kimyen
Westman Champlin & Kelly P.A.
LandOfFree
Methods and systems for enabling secure storage of sensitive... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for enabling secure storage of sensitive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for enabling secure storage of sensitive... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4014432