Method for the encryption and decryption of data by various users
First Claim
1. A method wherein users are assigned a data key for at least one of encrypting and decrypting data, comprising:
- performing a security check to ascertain an identity of a user;
assigning a data key, unviewable by the user, on the basis of a result of the security check, wherein the same data key is assignable to a plurality of users.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is for the encryption and decryption of data by various users, in which a user is assigned a data key for encrypting and decrypting data. A data processing facility is designed to carry out the method and a storage medium is designed to store information for carrying out the method on a data processing facility. A first step involves the performance of a security check in order to ascertain the identity of the user. A second step involves a data key which cannot be viewed by the user, being assigned on the basis of the result of the security check. In this case, various users who, by way of example, can be associated with a common user group, can be assigned the same data key.
23 Citations
32 Claims
-
1. A method wherein users are assigned a data key for at least one of encrypting and decrypting data, comprising:
-
performing a security check to ascertain an identity of a user;
assigning a data key, unviewable by the user, on the basis of a result of the security check, wherein the same data key is assignable to a plurality of users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 14, 15, 16, 17, 18, 19, 32)
-
-
8. An electronic data processing facility for at least one of encryption and decryption of data, wherein a data key for encrypting and decrypting data is assignable to a user, comprising:
-
security check means for performing a security check to ascertain an identity of the user; and
means for assigning a data key, unviewable by the user, on the basis of a result of the security check, wherein the same data key is assignable to various users. - View Dependent Claims (9, 10, 11, 12, 13, 20, 21)
-
-
22. A method for at least one of encryption and decryption of data, comprising:
-
assigning a user a data key for at least one of encrypting and decrypting data;
performing a security check to ascertain an identity of a user, wherein a data key, unviewable by the user, is assigned on the basis of a result of the security check, and wherein the same data key is assignable to a plurality of users. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. An electronic data processing facility for at least one of encryption and decryption of data, comprising:
-
means for assigning a user a data key for at least one of encrypting and decrypting data;
means for performing a security check to ascertain an identity of a user, wherein a data key, unviewable by the user, is assignable on the basis of a result of the security check, and wherein the same data key is assignable to a plurality of users.
-
Specification