Saving and retrieving data based on symmetric key encryption

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000

Reexamination Certificate

active

07424612

ABSTRACT:
In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using a symmetric cipher, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with other aspects, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The integrity of the data is also verified, and the data is decrypted using a symmetric key. The data is returned to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.

REFERENCES:
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4827508 (1989-05-01), Shear
patent: 4908861 (1990-03-01), Brachtl et al.
patent: 4969189 (1990-11-01), Ohta et al.
patent: 4977594 (1990-12-01), Shear
patent: 5007082 (1991-04-01), Cummins
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5050213 (1991-09-01), Shear
patent: 5140634 (1992-08-01), Guillou et al.
patent: 5276311 (1994-01-01), Hennige
patent: 5283830 (1994-02-01), Hinsley et al.
patent: 5335334 (1994-08-01), Takahashi et al.
patent: 5349643 (1994-09-01), Cox
patent: 5365589 (1994-11-01), Gutowitz
patent: 5410598 (1995-04-01), Shear
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5448716 (1995-09-01), Hardell et al.
patent: 5473690 (1995-12-01), Grimonprez et al.
patent: 5473692 (1995-12-01), Davis
patent: 5483649 (1996-01-01), Kuznetsov et al.
patent: 5491827 (1996-02-01), Holtey
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5557518 (1996-09-01), Rosen
patent: 5557765 (1996-09-01), Lipner
patent: 5559957 (1996-09-01), Balk
patent: 5615263 (1997-03-01), Takahashi
patent: 5638446 (1997-06-01), Rubin
patent: 5654746 (1997-08-01), McMullan, Jr. et al.
patent: 5664016 (1997-09-01), Preneel et al.
patent: 5671280 (1997-09-01), Rosen
patent: 5721781 (1998-02-01), Deo et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 5724527 (1998-03-01), Karnik et al.
patent: 5745886 (1998-04-01), Rosen
patent: 5757919 (1998-05-01), Herbert et al.
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 5796824 (1998-08-01), Hasebe et al.
patent: 5812662 (1998-09-01), Hsu et al.
patent: 5841869 (1998-11-01), Merkling et al.
patent: 5844986 (1998-12-01), Davis
patent: 5870467 (1999-02-01), Imai et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5892902 (1999-04-01), Clark
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5919257 (1999-07-01), Trostle
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5937063 (1999-08-01), Davis
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5944821 (1999-08-01), Angelo
patent: 5949876 (1999-09-01), Ginter et al.
patent: 5953502 (1999-09-01), Helbig, Sr.
patent: 5958050 (1999-09-01), Griffin et al.
patent: 5963980 (1999-10-01), Coulier et al.
patent: 5982891 (1999-11-01), Ginter et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 5991876 (1999-11-01), Johnson et al.
patent: 6006332 (1999-12-01), Rabne et al.
patent: 6009274 (1999-12-01), Fletcher et al.
patent: 6009401 (1999-12-01), Horstmann
patent: 6026166 (2000-02-01), LeBourgeois
patent: 6032257 (2000-02-01), Olarig et al.
patent: 6092189 (2000-07-01), Fisher et al.
patent: 6105137 (2000-08-01), Graunke
patent: 6148083 (2000-11-01), Fieres
patent: 6185678 (2001-02-01), Arbaugh
patent: 6189100 (2001-02-01), Barr
patent: 6189103 (2001-02-01), Nevarez et al.
patent: 6230285 (2001-05-01), Sadowsky et al.
patent: 6237786 (2001-05-01), Ginter et al.
patent: 6327660 (2001-12-01), Patel
patent: 6401208 (2002-06-01), Davis et al.
patent: 6453334 (2002-09-01), Vinson et al.
patent: 6557104 (2003-04-01), Vu et al.
patent: 6735696 (2004-05-01), Hannah
patent: 7017188 (2006-03-01), Schmeidler et al.
patent: 7047414 (2006-05-01), Wheeler et al.
patent: 7103771 (2006-09-01), Grawrock
patent: 7188240 (2007-03-01), Berstis et al.
patent: 7194092 (2007-03-01), England et al.
patent: 7302709 (2007-11-01), England
patent: 2002/0007452 (2002-01-01), Traw et al.
patent: 2002/0069365 (2002-06-01), Howard et al.
patent: 2002/0107803 (2002-08-01), Lisanke et al.
patent: 2002/0120936 (2002-08-01), Del Beccaro et al.
patent: 2002/0152173 (2002-10-01), Rudd
patent: 2003/0056112 (2003-03-01), Vinson et al.
patent: 2003/0126454 (2003-07-01), Glew et al.
patent: 2003/0163711 (2003-08-01), Grawrock
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2004/0003273 (2004-01-01), Grawrock et al.
patent: 2007/0067624 (2007-03-01), England
patent: 2007/0086588 (2007-04-01), England
patent: 2007/0088949 (2007-04-01), England
patent: 2007/0104329 (2007-05-01), England
patent: 0695985 (1996-02-01), None
patent: 2260629 (1993-04-01), None
patent: WO9938070 (1999-07-01), None
“Authentication and Delegation with Smart-cards”, Abadi et al., Jul. 30, 1992, 30 pages.
“A Secure and Reliable Bootstrap Architecture”, Arbaugh et al., Distributed Systems Laboratory, Philadelphia, PA, 1997, pp. 65-71.
“Tamper-resistant software: An Implementation”, Aucsmith, D., Lecture Notes in Computer Science, 1996, vol 1174, pp. 317-333.
“On the (Im)possibility of Obfuscating Programs”, Barak et al., CRYPTO, 2001, LNCS 2139, pp. 1-18.
“Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm”, Bellare et al., Sep. 25, 2000, pp. 1-29.
“Keying Hash Functions for Message Authentication”, Bellare et al., Advances in Cryptology-CRYPTO, 1996, LNCS 1109, pp. 1-15.
“Bits: A Smartcard Protected Protected Operating System”, Clark et al. Communications of the ACM, vol. 37, No. 11, Nov. 1994, pp. 66-70, 94.
“Defending Systems Against Viruses through Cryptographic Authentication”, Davida et al., IEEE Computer Society Symposium on Security and Privacy, May 1-3, 1989, pp. 312-318.
“Department of Defense Trusted Computer System Evaluation Criteria”, Department of Defense Standard, Dec. 1985, pp. 1-79.
First Office Action from The Patent Office of the State Intellectual Property Office of the People's Republic of China in a counterpart foreign application, date of dispatch Nov. 4, 2005, including English translation, 11 pages.
“Handbook of Applied Cryptography”, CRC Press Series on Discrete Mathematics and its applications, 1997, XP-002265828, pp. 33, 493, 509, 510, 546-552.
“Internet Security: SanDisk Products and New Microsoft Technology Provide Copy Protected Music for Internet Music Player Market.(Product Announcement)”, Edge: Work Group Computing Report, Apr. 19, 1999, 2 pages.
“Personal Secure Booting”, Itoi et al., ACISP 2001, LNCS 2119, pp. 130-144.
Kuhn, M., “The TrustNo 1 Cryptoprocessor Concept”, Apr. 30, 1997, Purdue University, 3 pages.
“Authentication in Distributed Systems: Theory and Practice”, Lampson et al., Digital Equipment Corporation, ACM Transactions on Computer Systems, vol. 10, No. 4, Nov. 1992, pp. 265-310.
“Protection”, Lampson, B.W., in Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, Mar. 1971, pp. 437-443, reprinted in Operating Systems Review, 8, Jan. 1, 1974, pp. 18-24.
“Preventing Piracy: Authorization Software May Ease Hollywood's Fear of the Net”, Internet World Magazine, Apr. 1, 2000, 3 pages.
“Phoenix Technologies Partners with Secure Computing in Enterprise Security Marketplace”, Jul. 12, 2001, Business Wire, Courtesy of Dialog Text Search, p. 1-2.
“Applied Cryptography”, Schneier, B., Applied Cryptography, Protocols, Algorithms, and Source Code in C, 199

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Saving and retrieving data based on symmetric key encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Saving and retrieving data based on symmetric key encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Saving and retrieving data based on symmetric key encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3984458

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.