Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-01-04
2005-01-04
Vu, Kim (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S258000
Reexamination Certificate
active
06839843
ABSTRACT:
When an electronic document is made available for review by other entities, it is often convenient to store the document in a repository or database managed by a third party. A system is provided in which the originator of the document is able to ensure the integrity and security of its document filed with a third party repository without having to trust the administrator of the repository. Both the document originator and the repository administrator have vault environments which are secure extensions of their respective work spaces. The vault of the document originator encrypts a document that it receives from the originator, prior to forwarding it on to the vault of the repository. On receipt of the encrypted document, the repository's vault signs the encrypted document itself before storing the document in the electronic repository and returns to the originator's vault proof of deposit of the encrypted document in the form of a copy of the signed encrypted document. An access control list identifying access ownership privileges for the document are also stored in the repository. Updates to the access control list are under the control of document originator, or another computer designated by the document originator. When a request is made to view the document, it is made from the vault of the requesting party (a secure extension of the requesting party's work space) to the repository's vault. The repository's vault retrieves a copy of the encrypted document which it forwards, along with the requestor's identity to the originator's vault. The originator's vault verifies that the access control is valid, then verifies that the requestor is authorized to view the document from the access control list, then decrypts the document and forwards the decrypted document directly to the requestor's vault. The requestor provides proof of receipt of the decrypted document.
REFERENCES:
patent: 6105131 (2000-08-01), Carroll
patent: 6181336 (2001-01-01), Chiu et al.
patent: 08-084141 (1996-03-01), None
patent: 08-263441 (1996-10-01), None
patent: 10-091427 (1998-04-01), None
patent: 10-124398 (1998-05-01), None
Warwick Ford, Michael S. Baum, “Digital Signatures & Encripation” 1st Edition, Prentice Hall Press p82-96; p90-95; p259-288.
Bacha Hanid
Carroll Robert Bruce
Nirlas Lev
Tchao Sung Wei
Herzberg Louis
International Business Machines - Corporation
Truong T.
Vu Kim
LandOfFree
System for electronic repository of data enforcing access... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for electronic repository of data enforcing access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for electronic repository of data enforcing access... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3385584