CA2212813A1 - Method and apparatus for cryptographically protecting data - Google Patents

Method and apparatus for cryptographically protecting data

Info

Publication number
CA2212813A1
CA2212813A1 CA002212813A CA2212813A CA2212813A1 CA 2212813 A1 CA2212813 A1 CA 2212813A1 CA 002212813 A CA002212813 A CA 002212813A CA 2212813 A CA2212813 A CA 2212813A CA 2212813 A1 CA2212813 A1 CA 2212813A1
Authority
CA
Canada
Prior art keywords
database
protecting data
cryptographically protecting
information
certification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002212813A
Other languages
French (fr)
Other versions
CA2212813C (en
Inventor
Alexander Gibson Fraser
Srinivasan Keshav
Andrew M. Odlyzko
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fraser Research Inc
Original Assignee
AT&T Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Corp filed Critical AT&T Corp
Publication of CA2212813A1 publication Critical patent/CA2212813A1/en
Application granted granted Critical
Publication of CA2212813C publication Critical patent/CA2212813C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Abstract

A method and apparatus for transferring encrypted information to a database. First certification information is transferred from a first database to a second database. Second certification information is then transferred from the second database to the first database, where both the first certification information and the second certification information is authenticated. If both certifications are authenticated, the transfer of the encrypted information to the second database is enabled.
CA002212813A 1996-09-04 1997-08-12 Method and apparatus for cryptographically protecting data Expired - Fee Related CA2212813C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/707,691 US5835595A (en) 1996-09-04 1996-09-04 Method and apparatus for crytographically protecting data
US707,691 1996-09-04

Publications (2)

Publication Number Publication Date
CA2212813A1 true CA2212813A1 (en) 1998-03-04
CA2212813C CA2212813C (en) 2001-03-06

Family

ID=24842756

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002212813A Expired - Fee Related CA2212813C (en) 1996-09-04 1997-08-12 Method and apparatus for cryptographically protecting data

Country Status (4)

Country Link
US (1) US5835595A (en)
EP (1) EP0828210A3 (en)
JP (1) JPH10207755A (en)
CA (1) CA2212813C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112350732A (en) * 2020-11-09 2021-02-09 南京师范大学 Dark information composing method and dark information-based data compression method

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7562392B1 (en) 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US6005939A (en) * 1996-12-06 1999-12-21 International Business Machines Corporation Method and apparatus for storing an internet user's identity and access rights to world wide web resources
US6081893A (en) * 1997-05-28 2000-06-27 Symantec Corporation System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
WO2000007329A1 (en) * 1998-07-30 2000-02-10 Sony Corporation Content processing system
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6671803B1 (en) * 1998-10-06 2003-12-30 Koninklijke Philips Electronics N.V. Method and system for consumer electronic device certificate management
US20010016836A1 (en) * 1998-11-02 2001-08-23 Gilles Boccon-Gibod Method and apparatus for distributing multimedia information over a network
US6820204B1 (en) 1999-03-31 2004-11-16 Nimesh Desai System and method for selective information exchange
US20050192008A1 (en) * 1999-03-31 2005-09-01 Nimesh Desai System and method for selective information exchange
FI108389B (en) * 1999-04-15 2002-01-15 Sonera Smarttrust Oy Management of subscriber identity modules
US7565294B2 (en) * 1999-05-19 2009-07-21 Digimarc Corporation Methods and systems employing digital content
US6772331B1 (en) * 1999-05-21 2004-08-03 International Business Machines Corporation Method and apparatus for exclusively pairing wireless devices
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
US6925489B1 (en) * 1999-11-22 2005-08-02 Agere Systems Inc. Methods and apparatus for identification and purchase of broadcast digital music and other types of information
US6974076B1 (en) 2000-02-14 2005-12-13 Sony Corporation Portable music player with pay per play usage and method for purchase of credits for usage
US7194759B1 (en) 2000-09-15 2007-03-20 International Business Machines Corporation Used trusted co-servers to enhance security of web interaction
US20020057795A1 (en) * 2000-11-10 2002-05-16 Spurgat Jeffrey Jonathan Content protection through the audio and video decrypting and decoding device
US7210134B1 (en) 2001-09-06 2007-04-24 Sonic Solutions Deterring reverse-engineering of software systems by randomizing the siting of stack-based data
US20070277037A1 (en) * 2001-09-06 2007-11-29 Randy Langer Software component authentication via encrypted embedded self-signatures
US7386726B2 (en) * 2001-11-02 2008-06-10 Telefonaktiebolaget L M Ericsson (Publ) Personal certification authority device
US20040101141A1 (en) * 2002-11-27 2004-05-27 Jukka Alve System and method for securely installing a cryptographic system on a secure device
AU2002953325A0 (en) * 2002-12-13 2003-01-09 Executive Computing Holdings Pty Ltd Means for providing protection for digital assets
US20050066355A1 (en) * 2003-09-19 2005-03-24 International Business Machines Corporation System and method for satellite broadcasting and receiving encrypted television data signals
US20050091173A1 (en) * 2003-10-24 2005-04-28 Nokia Corporation Method and system for content distribution
US9020854B2 (en) * 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US20060130140A1 (en) * 2004-12-14 2006-06-15 International Business Machines Corporation System and method for protecting a server against denial of service attacks
RU2007127725A (en) 2004-12-20 2009-01-27 ПРОКСЕНС, ЭлЭлСи (US) PERSONAL DATA (PDK) AUTHENTICATION BY BIOMETRIC KEY
US8219129B2 (en) 2006-01-06 2012-07-10 Proxense, Llc Dynamic real-time tiered client access
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US7904718B2 (en) 2006-05-05 2011-03-08 Proxense, Llc Personal digital key differentiation for secure transactions
US9269221B2 (en) 2006-11-13 2016-02-23 John J. Gobbi Configuration of interfaces for a location detection system and application
US20080162354A1 (en) * 2006-12-29 2008-07-03 Nokia Corporation Method for determining the price of superdistributed recordings
WO2009062194A1 (en) 2007-11-09 2009-05-14 Proxense, Llc Proximity-sensor supporting multiple application services
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US9251332B2 (en) 2007-12-19 2016-02-02 Proxense, Llc Security system and method for controlling access to computing resources
US8508336B2 (en) 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
US20110113443A1 (en) * 2009-11-06 2011-05-12 Xudong Yu IP TV With DRM
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US9322974B1 (en) 2010-07-15 2016-04-26 Proxense, Llc. Proximity-based system for object tracking
US9265450B1 (en) 2011-02-21 2016-02-23 Proxense, Llc Proximity-based system for object tracking and automatic application initialization
WO2014183106A2 (en) 2013-05-10 2014-11-13 Proxense, Llc Secure element as a digital pocket
US9509670B2 (en) * 2014-08-19 2016-11-29 Google Technology Holdings LLC System and method for managing secure communications in an Ad-Hoc network

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
US4458109A (en) * 1982-02-05 1984-07-03 Siemens Corporation Method and apparatus providing registered mail features in an electronic communication system
US4578531A (en) * 1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus
US4825050A (en) * 1983-09-13 1989-04-25 Transaction Security Corporation Security transaction system for financial data
US5073933A (en) * 1989-12-01 1991-12-17 Sun Microsystems, Inc. X window security system
US5295188A (en) * 1991-04-04 1994-03-15 Wilson William J Public key encryption and decryption circuitry and method
US5249230A (en) * 1991-11-21 1993-09-28 Motorola, Inc. Authentication system
US5157726A (en) * 1991-12-19 1992-10-20 Xerox Corporation Document copy authentication
US5418854A (en) * 1992-04-28 1995-05-23 Digital Equipment Corporation Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system
US5497422A (en) * 1993-09-30 1996-03-05 Apple Computer, Inc. Message protection mechanism and graphical user interface therefor
US5668878A (en) * 1994-02-28 1997-09-16 Brands; Stefanus Alfonsus Secure cryptographic methods for electronic transfer of information
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5604803A (en) * 1994-06-03 1997-02-18 Sun Microsystems, Inc. Method and apparatus for secure remote authentication in a public network
US5535276A (en) * 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
EP0709760B1 (en) * 1994-10-27 2006-05-31 Intarsia Software LLC Data copyright management system
US5638446A (en) * 1995-08-28 1997-06-10 Bell Communications Research, Inc. Method for the secure distribution of electronic files in a distributed environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112350732A (en) * 2020-11-09 2021-02-09 南京师范大学 Dark information composing method and dark information-based data compression method

Also Published As

Publication number Publication date
JPH10207755A (en) 1998-08-07
EP0828210A2 (en) 1998-03-11
CA2212813C (en) 2001-03-06
EP0828210A3 (en) 1999-04-14
US5835595A (en) 1998-11-10

Similar Documents

Publication Publication Date Title
CA2212813A1 (en) Method and apparatus for cryptographically protecting data
AU3321795A (en) System and method for key escrow and data escrow encryption
AU6757596A (en) Secure cryptographic methods for electronic transfer of information
AU3034697A (en) Method for the encryption of data transfer
AU693655B2 (en) Process for encrypting a fingerprint onto an I.D. card
CA2246171A1 (en) Point-of-sale system including isolation layer between client and server software
EP1808999A8 (en) Data bus communication
CA2173252A1 (en) Device for processing data packets
WO1998027688A3 (en) Method and apparatus for simultaneous electronic exchange using a semi-trusted third party
WO1999027654A3 (en) Method and system for securely transferring a data set in a data communications system
WO2000067415A3 (en) Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment
CA2253102A1 (en) Method of and system for processing electronic document and recording medium for recording processing program
AU5218598A (en) Method and system for improving security in network applications
AU7102196A (en) An information encryption method
AU1680395A (en) Cryptographic system and method with key escrow feature
AU5448696A (en) Method and apparatus for routing confidential information
WO1999037056A3 (en) Method and apparatus for media data transmission
EP1122671A3 (en) System for secure distribution and playback of digital data
WO2001010095A3 (en) Protection of communications
AU7127496A (en) Computer system for data management and method for operating said system
TW357526B (en) Improved generation of encryption key
AU3203597A (en) Decryption of retransmitted data in an encrypted communication system
AU4824499A (en) Method and apparatus for authenticated secure access to computer networks
AU2427199A (en) Method and arrangement for ciphering information transfer
IL136745A0 (en) System and method of authenticating a key and transmitting secure data

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20130813