Secure data storage system and method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

06182222

ABSTRACT:

TECHNICAL FIELD OF THE INVENTION
The present invention relates generally to the field of data storage, and more particularly to a secure data storage system and method.
BACKGROUND OF THE INVENTION
Computer systems generally include one or more information or data storage systems. Data storage systems receive and store data for later recall and use by computer systems. A data storage system may include databases, spreadsheet files, text files and the like.
To prevent unauthorized access, manipulation, and/or use of stored data, data storage systems are often secured. Data storage systems have been secured by requiring a user to enter an ID and/or password to launch an application capable of accessing a data file. Entry of ID and/or password is time-consuming and burdensome in that the user must enter the ID and/or password each time the application is launched, whether or not an existing data file is to be accessed. Moreover, an unsecured application may be used to access the data file. This is particularly problematic in client/server systems where an unsecured application may access data files over a network.
SUMMARY OF THE INVENTION
Accordingly, a need has arisen in the art for improved data storage security. The present invention provides a secure data storage system and method that substantially reduces or eliminates problems associated with prior systems.
In accordance with the present invention, a secure data storage system may comprise a secured data file, a secured system file, and a data file application. The secured data file may include a verification system operable to allow access to the secured data file only upon receipt of a unique identifier matching a stored unique identifier. The data file application may be operable to communicate the unique identifier to the secured data file to access the secured data file in a secured session. The secured system file may be linked to the data file application to establish access privileges during the secured session.
More specifically, in accordance with one embodiment of the present invention, the verification system may include a supervisor-unique identifier and an operator-unique identifier. In this embodiment, the secured system file may include access privileges of the supervisor-unique identifier and the operator-unique identifier. A supervisor access module may be operable to communicate the supervisor-unique identifier to the data file application. An operator access module may be operable to communicate the operator-unique identifier to the data file application.
In accordance with another aspect of the present invention, the secure data storage system may include a default system file. The default system file may be linked to the data file application to allow unsecured access to the data file application.
Technical advantages of the present invention include providing a secure data storage system. In particular, a secured data file may be accessed only upon receipt of a unique identifier matching a stored unique identifier. Access privileges of the unique identifier may be stored in a secured systems file that may be linked to a data file application to establish access privileges during a secured session. Accordingly, an unsecured application may not access the secured data file.
Additional technical advantages of the present invention include providing a secure data storage system in which a data file application may be launched without entry of a user ID and/or password. In particular, a default system file may be linked to the data file application to allow unsecured access to the data file application. Accordingly, the data file application may be accessed without unnecessary and time-consuming entry of IDs and/or passwords when a secured data file is not to be accessed.
Other technical advantages of the present invention will be readily apparent to one skilled in the art from the following figures, descriptions, and claims.


REFERENCES:
patent: 3938091 (1976-02-01), Atalla et al.
patent: 4198619 (1980-04-01), Atalla
patent: 4203166 (1980-05-01), Ehrsam et al.
patent: 4588991 (1986-05-01), Atalla
patent: 5414852 (1995-05-01), Kramer et al.
patent: 5499297 (1996-03-01), Boebert
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5953419 (1999-09-01), Lohstroh et al.
Microsoft Access “Building Applications”, 1994.
“Microsoft ACCESS” User's Guide, by Microsoft Corporation, © 1994, Table of Contents and Chapter 14, Securing Your Application.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure data storage system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure data storage system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure data storage system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2498801

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.