Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2011-04-05
2011-04-05
Moazzami, Nasser (Department: 2436)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C380S277000, C380S284000
Reexamination Certificate
active
07921304
ABSTRACT:
Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
REFERENCES:
patent: 5940507 (1999-08-01), Cane et al.
patent: 6170058 (2001-01-01), Kausik
patent: 6249866 (2001-06-01), Brundrett et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6560719 (2003-05-01), Pham et al.
patent: 6574733 (2003-06-01), Langford
patent: 6754827 (2004-06-01), Cane et al.
patent: 6820136 (2004-11-01), Pham et al.
patent: 2001/0044910 (2001-11-01), Ricart et al.
patent: 2003/0046366 (2003-03-01), Pardikar et al.
patent: 2004/0098426 (2004-05-01), Ishii et al.
patent: 2004/0146163 (2004-07-01), Asokan et al.
patent: 2004/0181679 (2004-09-01), Dettinger et al.
patent: 2004/0236958 (2004-11-01), Teicher et al.
patent: 2005/0138468 (2005-06-01), Asare et al.
patent: 2005/0216685 (2005-09-01), Heden et al.
patent: 2005/0228994 (2005-10-01), Kasai et al.
patent: WO01/13293 (2001-02-01), None
patent: WO2005/091149 (2005-09-01), None
Coombs, Jason. “Detecting Man in the Middle Attacks with DNS”. Dr. Dobb's Journal. Dec. 18, 2003. Available at http://www.ddj.com/article/printableArticle.jhtml?articleID=184416896&dept—url=/windows/. Downloaded Jul. 1, 2009.
University of Delaware. “Encrypt Your Sensitive Data: Back up and Restore”. Aug. 17, 2005. Available at http://www.udel.edu/topics/encryption/backupwin.html. Downloaded Jun. 30, 2009.
Bott, Ed. “Windows XP Backup Made Easy” Jul. 14, 2003. Available at http://www.microsoft.com/windowsxp/using/setup/learnmore/bott—03july14.mspx. Downloaded Dec. 16, 2009.
“MCSE—EFS security”. Oct. 20-21, 2003. Available at http://www.velocityreviews.com/forums/t47214-efs-security.html. Downloaded Dec. 16, 2009.
Bott, Ed. Jun. 10, 2005. Available at http://www.edbott.com/weblog/archives/000770.html. Downloaded Dec 16, 2009.
Team, The Microsoft Windows. Microsoft Windows XP Professional Resource Kit Second Edition. New York: Microsoft, 2003. Print. Selections downloaded from http://proquest.safaribooksonline.com/0735619743/ on Dec. 16, 2009.
“MCSE—EFS security”. Oct. 20-21, 2003. Available at http://www.velocityreviews.com/forums/t47214-efs-security.html. Downloaded Dec. 16, 2009.
David Paul Maher “Crypto Backup and Key Escrow”, pp. 48-53 Mar. 1996/vol. 39, No. 3 Communications of the ACM http://delivery.acm.org/10.1145/230000/227241/p48maher.pdf?key1=227241&key2=421522231&coll=GUIDE&dI=ACM&CFID=58469224&CFTOKEN=20171019.
M. Kaczmarksi, T. Jiang and D.A. Pease “Beyond backup toward storage management”, pp. 1-16 IBM Systems Journal, vol. 42, No. 2, 2003 http://www.tectrade.co.uk/data/TIV%20WP%20t4.pdf.
S.M. Matyas and C.H. Meyer “Generation, distribution, and installation of cryptographic keys”, pp. 126-137 Copyright 1978, IBM Syst J. vol. 17 No. 2 1978. http://www.research.ibm.com/journal/sj/172/ibmsj1702D.pdf.
Brace Colin H.
Lees William B.
Muggli Nathan D.
Whalen William J.
Microsoft Corporation
Moazzami Nasser
Pogmore Travis
Workman Nydegger
LandOfFree
Securing data set images does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Securing data set images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securing data set images will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2739486