Secure accounting and operational control reporting system
First Claim
Patent Images
1. A method, comprising:
- providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample;
encrypting the process sample;
storing the encrypted process sample; and
subsequently validating reliability of the process, said validating comprising sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process, decrypting the stored encrypted process sample, comparing the current process sample to the decrypted stored process sample, and making a validation determination consistent with a result of the comparison.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure accounting and operational method, whereby process elements are provided to a process, selected process elements are manipulated, a scheduled condition of the process is sampled at a predetermined point in the process, and the process sample is encrypted to provide an encrypted output. As a result, an authorized recipient has a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.
109 Citations
94 Claims
-
1. A method, comprising:
-
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample;
encrypting the process sample;
storing the encrypted process sample; and
subsequently validating reliability of the process, said validating comprising sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process, decrypting the stored encrypted process sample, comparing the current process sample to the decrypted stored process sample, and making a validation determination consistent with a result of the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method, comprising:
-
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample, wherein the first scheduled condition involves a selected process element;
relating an element tag associated with the selected process element to at least one cryptographic label;
encrypting the process sample consistent with the at least one cryptographic label;
storing the encrypted process sample and the element tag; and
subsequently validating reliability of the process, said validating comprising sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process, decrypting the stored encrypted process sample consistent with the at least one cryptographic label, comparing the current process sample to the decrypted stored process sample, and making a validation determination consistent with a result of the comparison. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method, comprising:
-
providing, consistent with a data format, at least one object relating to a process;
selecting, from the at least one object, a first object, consistent with an object tag associated therewith;
referencing at least one cryptographic label consistent with the object tag;
encrypting at least a portion of the first object consistent with the at least one cryptographic label; and
storing the encrypted at least a portion of the first object and the object tag for subsequent use by an intended recipient. - View Dependent Claims (45, 46, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88)
-
-
47. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
-
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample;
encrypting the process sample;
storing the encrypted process sample; and
subsequently validating functionality of the process, said validating comprising sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process;
decrypting the stored encrypted process sample;
comparing the current process sample to the decrypted stored process sample; and
making a validation determination consistent with a result of the comparison.
-
-
68. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
-
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample, wherein the first scheduled condition involves a selected process element;
relating an element tag associated with the selected process element to at least one cryptographic label;
encrypting the process sample consistent with the at least one cryptographic label;
storing the encrypted process sample and the element tag; and
subsequently validating reliability of the process, said validating comprising sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process;
decrypting the stored encrypted process sample consistent with the at least one cryptographic label;
comparing the current process sample to the decrypted stored process sample; and
making a validation determination consistent with a result of the comparison.
-
-
89. The article of manufacture of claim 123, wherein at least one of the at least one encryption label is a role-based cryptographic label.
-
90. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
-
providing, consistent with a data format, at least one object relating to a process;
selecting, from the at least one object, a first object, consistent with an object tag associated with the first object;
referencing at least one cryptographic label consistent with the object tag;
encrypting at least a portion of the first object consistent with the at least one cryptographic label; and
storing the at least a portion of the first object and the object tag for subsequent use by an intended recipient. - View Dependent Claims (91, 92)
-
-
93. A method, comprising:
-
providing a first computer readable medium having stored thereon a first data set comprising at least one object and a respective tag associated therewith;
relating the respective tag to at least one cryptographic label;
encrypting the at least one object consistent with the at least one cryptographic label;
creating a second data set comprising the encrypted at least one object and the respective tag; and
storing said second data set on one of the first computer readable medium and a second computer readable medium.
-
-
94. A method, comprising:
-
providing a first computer readable medium having stored thereon a first data set comprising a plurality of objects and a tag for, and associated with, each of the plurality of objects; and
creating a second data set on one of said first computer readable medium and a second computer readable medium, said creating comprising for each of the plurality of objects, relating the respective tag associated with the respective object to at least one cryptographic label, encrypting the respective object consistent with the at least one cryptographic label, and storing the encrypted respective object and the respective tag in said second data set.
-
Specification