Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
1 Assignment
0 Petitions
Accused Products
Abstract
An arrangement for the cipher controlled exploitation of data resources (e.g., securely storing and retrieving sensitive data or securely registering and logging on a computer system) includes the steps of providing a subscriber identity module carrying a security algorithm; generating at least one, e.g., two, random values; subjecting the random value to the at least one security algorithm to generate at least one, e.g., two, session keys; processing the session keys via a mixer function such as a hash function to produce a cipher key; and using the cipher key thus produced for exploiting the data resources.
-
Citations
46 Claims
-
1-23. -23. (canceled)
-
24. A method for the cipher controlled exploitation of data resources stored in a database associated with a computer system, comprising the steps of:
-
providing a subscriber identity module carrying at least one security algorithm;
producing a cipher key via said at least one security algorithm; and
using said cipher key for protecting said data resources. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 46)
-
-
39. A system for the cipher-controlled exploitation of data resources, comprising:
-
at least a subscriber identity module carrying at least one security algorithm;
at least a computer system comprising at least one processing module, said processing module being interfaced with said subscriber identity module to generate at least one cipher key via said at least one security algorithm and being configured to protect via said cipher key said data resources; and
a database associated with said computer system for storing said data resources protected by said cipher key. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
Specification