System and method for encrypting and decrypting files

Electrical computers and digital processing systems: support – System access control based on user identification by... – Pin/password generator device

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S183000, C713S193000, C726S005000, C380S044000

Reexamination Certificate

active

07373517

ABSTRACT:
A system and method distribute the task of decryption between a server and a client. To encrypt data, the client generates an encryption/decryption key. Namely, a user interface obtains a password, generally from a user. A hint generator generates a hint. A key generator generates the key based on the password and the hint. In one embodiment, the key generator hashes the password to generate a first secret, hashes the first secret to generate a second secret, hashes the first secret with the hint to generate an intermediate index, and hashes the second secret and the intermediate index to generate the key. An encryption engine can then use the key to encrypt data. The client then sends the encrypted data and possibly the hint for storage on the server. To decrypt the data, the key must be determined. Accordingly, the server knows some information and the user knows some information for decrypting the data. To generate the key, the decrypting client must first obtain rights to retrieve the hint from the server and must obtain the password from the user. Increased level of security is achieved.

REFERENCES:
patent: 4652698 (1987-03-01), Hale et al.
patent: 4831582 (1989-05-01), Miller et al.
patent: 4897781 (1990-01-01), Chang et al.
patent: 5048085 (1991-09-01), Abraham et al.
patent: 5218638 (1993-06-01), Matsumoto et al.
patent: 5220603 (1993-06-01), Parker
patent: 5263157 (1993-11-01), Janis
patent: 5388255 (1995-02-01), Pytlik et al.
patent: 5420927 (1995-05-01), Micali
patent: 5425102 (1995-06-01), Moy
patent: 5434918 (1995-07-01), Kung et al.
patent: 5491752 (1996-02-01), Kaufman et al.
patent: 5495533 (1996-02-01), Linehan
patent: 5510777 (1996-04-01), Pilc et al.
patent: 5544320 (1996-08-01), Konrad
patent: 5544322 (1996-08-01), Cheng et al.
patent: 5572643 (1996-11-01), Judson
patent: 5581749 (1996-12-01), Hossain et al.
patent: 5588132 (1996-12-01), Cardoza
patent: 5613012 (1997-03-01), Hoffman et al.
patent: 5623601 (1997-04-01), Vu
patent: 5627658 (1997-05-01), Connors et al.
patent: 5644354 (1997-07-01), Thompson et al.
patent: 5647002 (1997-07-01), Brunson
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5666530 (1997-09-01), Clark et al.
patent: 5666553 (1997-09-01), Crozier
patent: 5675782 (1997-10-01), Montague et al.
patent: 5682478 (1997-10-01), Watson et al.
patent: 5682524 (1997-10-01), Freund et al.
patent: 5684990 (1997-11-01), Boothby
patent: 5701423 (1997-12-01), Crozier
patent: 5706427 (1998-01-01), Tabuki
patent: 5706502 (1998-01-01), Foley et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5721779 (1998-02-01), Funk
patent: 5757916 (1998-05-01), MacDoran et al.
patent: 5764902 (1998-06-01), Rothrock
patent: 5778346 (1998-07-01), Frid-Nielsen et al.
patent: 5784463 (1998-07-01), Chen et al.
patent: 5784464 (1998-07-01), Akiyama et al.
patent: 5787172 (1998-07-01), Arnold
patent: 5799086 (1998-08-01), Sudia
patent: 5812773 (1998-09-01), Norin
patent: 5818935 (1998-10-01), Maa
patent: 5828840 (1998-10-01), Cowan et al.
patent: 5835601 (1998-11-01), Shimbo et al.
patent: 5862346 (1999-01-01), Kley et al.
patent: 5870544 (1999-02-01), Curtis
patent: 5924103 (1999-07-01), Ahmed et al.
patent: 5943676 (1999-08-01), Boothby
patent: 5951652 (1999-09-01), Ingrassia et al.
patent: 5974238 (1999-10-01), Chase, Jr.
patent: 5982898 (1999-11-01), Hsu
patent: 5999947 (1999-12-01), Zollinger et al.
patent: 6020885 (2000-02-01), Honda
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6212529 (2001-04-01), Boothby et al.
patent: 6343313 (2002-01-01), Salesky et al.
patent: 6360322 (2002-03-01), Grawrock
patent: 6470454 (2002-10-01), Challener et al.
patent: 2191505 (1997-06-01), None
patent: 2210763 (1999-01-01), None
patent: 0801478 (1997-10-01), None
patent: WO 01/44916 (2001-06-01), None
patent: WO 2006/123899 (2006-11-01), None
US 5,373,559, 12/1994, Kaufman et al. (withdrawn)
Young et al, Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage, 1997, IEEE, pp. 224-235.
Abel, Amee, E-mail anywhere, May 1998, Time, pp. 1-4.
Kohl, John T., et al.; “The Evolution of theKerberosAuthentication Service”; 1991; pp. 1-15; This paper is a revision of a paper presented at the Spring 1991 EurOpen Conference in Tromso, Norway.
Adams, Charlotte; “Multilevel Secure Networking Charges Ahead”; Federal Computer Week; Apr. 12, 1993; 5 pages.
Jaeger, Trent and Atul Prakash; “Implementation of a Discretionary Access Control Model for Script-based Systems”; IEEEE Jun. 1995; 15 pages.
Freier et al., entitled “The SSL Protocol, Version 3.0,” Netscape Communications, dated Nov. 18, 1996, pp. 1-59, Downloaded from URL=http://www.home.netscape.com/eng/ss13/draft302.txt.
Article by Bellovin et al., entitled: “Network Firewalls” Published by IEEE Communications Magazine Sep. 1994, pp. 50-57.
Article by Steffen Stempel, entitled: “IPAccess-An Internet Service Access System for Firewall Installations” Published by IEEE Communications Magazine Feb. 16, 1995, pp. 31-41.
Article by Braun et al., entitled: “Web Traffic Characterization: an assessment of the impact of caching documents from NCSA's web server” Published by Elsevier Science B.V. 1995 pp. 37-51.
Article by Nelson et al., entitled: “Security for Infinite Networks” Published by IEEE Communications Magazine on Aug. 22, 1995, pp. 11-19.
Article by Greenwald et al., entitled: “Designing an Academic Firewall: Policy, Practice, and Experience with SURF” Published by IEEE Communications Magazine on Feb. 22, 1996, pp. 79-92.
Article by Kiuchi et et al., entitled: “C-HTTP—The Development of a Secure, Closed HTTP-based Network on the Internet” Published by IEEE Proceedings of SNDSS on Feb. 22, 1996, pp. 64-75.
Article by S. Cobb, entitled: “Establishing Firewall Policy” Published by National Computer Security Assn. on Jun. 25-27, 1996, pp. 198-205.
Mark R. Brown et al. “Using Netscape 2”, Second Edition, QUE Corporation, 1995, Chapter 34 “SUN's JAVA and the Netscape Browser”, pp. 885-907.
Tanenbaum, Andrew S., “Computer Network”, Third Edition, Prentice-Hall 1996, ISBN 0-13-349945-6, Chapter 7, Sections 7.1.4 to 7.1.6, pp. 597-618.
Knudsen, Jonathan, “Java Cryptography”, First Edition, O'Reilly & Assoc. 1998, ISBN 1-56592-402-9, pp. 79-91.
Web page: www.verisign.com/press/product/isv.html, Verisign Press Release, “Verisign Enhances Digital IDS to Enable Universal Website Login and One-Step Registration”, Nov. 3, 1998, 3 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for encrypting and decrypting files does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for encrypting and decrypting files, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for encrypting and decrypting files will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3981348

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.