Method and apparatus for secure data transfer
First Claim
1. Apparatus adapted to securely provide filtering of data on a source device to produce filtered data, said filtering excluding substantially all portions of said data except for data authorized for transfer.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for secure transfer of electronic or optical data. In one exemplary aspect, a method is provided whereby data on a source computer is filtered to exclude all but data that is authorized for transfer, stored in a transport format, marked so that the source of the stored data can be authenticated, and transferred to a transfer device configured to only accept data marked with an acceptable authentication mark. In one embodiment, a control apparatus is provided whereby data can be analyzed to exclude harmful code, a storage apparatus is provided whereby the analyzed data can be stored, an authentication apparatus is provided whereby data so analyzed and stored can be marked to identify the trusted nature of the analyzing apparatus and a receiving apparatus is provided whereby the recipient of the data only accepts data identified as originating from a trusted source.
-
Citations
22 Claims
- 1. Apparatus adapted to securely provide filtering of data on a source device to produce filtered data, said filtering excluding substantially all portions of said data except for data authorized for transfer.
-
9. A method of processing source data being transferred from one device to a second device, comprising:
-
encrypting source data via a first apparatus to produce encrypted data;
transferring the encrypted data to a second apparatus;
evaluating the encrypted data to determine if at least one criterion is met;
decrypting and locally storing said encrypted data if said criterion is met; and
not decrypting and deleting said encrypted data if said criterion is not met. - View Dependent Claims (10, 11)
-
-
12. Computerized apparatus, comprising:
-
control apparatus adapted to analyze source data to exclude harmful code;
storage apparatus adapted to store the analyzed data;
authentication apparatus adapted to designate the trusted nature of the data analyzed by the control apparatus; and
receiving apparatus adapted to only receive data marked as trusted.
-
-
13. A method of processing source data, comprising:
-
encrypting said source data to create encrypted source data;
hashing said encrypted source data to create hashed data;
encrypting the hashed data to create an encrypted hash;
decrypting the encrypted hash to recover the hashed data;
generating a second hash based on the encrypted source data;
comparing the recovered hash data and the second hash; and
if said comparing meets at least one criterion, then performing further processing on at least said encrypted source data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification