ENCRYPTION PROGRAM OPERATION MANAGEMENT SYSTEM AND PROGRAM
First Claim
1. An encryption program operation management system comprising:
- a processing device configured to implement an encryption key table generator, the encryption key table generator configured to generate encryption keys and to generate an encryption key table comprising encrypted versions of the encryption keys and items of plain-text index information, the encrypted versions of the encryption keys being associated with the items of index information, the encryption key table generator being configured to encrypt the generated encryption keys by using a first encryption key shared by an administrator managing an encryption program and a client using a computer upon which the encryption program is to be installed,wherein the processing device is further configured to implement an installation package generator configured to generate an installation package for distribution, the installation package comprising the encryption program, the encryption key table, and an installation program configured to cause the computer to install the encryption program on the computer;
wherein the installation program is configured to cause the computer to select one of the encrypted versions of encryption keys in the encryption key table contained in the installation package used by the encryption program, and to generate and store an encryption key file comprising the selected one of the encrypted versions of encryption keys and one of the items of index information associated with the selected one of the encrypted versions of encryption keys when the installation program installs the encryption program on the computer, the installation program being configured to decrypt the selected one of the encrypted versions of encryption keys by using the first encryption key at the time of retrieving it from the encryption key table and to re-encrypt the selected one of the encrypted versions of encryption keys by using a second encryption key at the time of storing it in the encryption key file, the second encryption key being uniquely created by the client, the encryption key file being used for determination of the selected one of the encrypted versions of encryption keys, which is encrypted by using the second encryption key uniquely created by the client, by the administrator.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, an encryption program operation management system includes an encryption key table creation module which creates encryption keys and creates an encryption key table including encrypted versions of the encryption keys and items of plaintext index information for recognizing the encryption keys, and an installation package creation module which creates an installation package including an encryption program, the encryption key table, and an installation program for installing the encryption program into a computer. The installation program causes the computer to carry out an operation of selecting one of the encrypted versions of encryption keys and an operation of creating and storing encryption key information including the selected one of the encrypted versions of encryption key and one of the items of plaintext index information associated with the selected one of the encrypted versions of encryption keys.
-
Citations
6 Claims
-
1. An encryption program operation management system comprising:
-
a processing device configured to implement an encryption key table generator, the encryption key table generator configured to generate encryption keys and to generate an encryption key table comprising encrypted versions of the encryption keys and items of plain-text index information, the encrypted versions of the encryption keys being associated with the items of index information, the encryption key table generator being configured to encrypt the generated encryption keys by using a first encryption key shared by an administrator managing an encryption program and a client using a computer upon which the encryption program is to be installed, wherein the processing device is further configured to implement an installation package generator configured to generate an installation package for distribution, the installation package comprising the encryption program, the encryption key table, and an installation program configured to cause the computer to install the encryption program on the computer; wherein the installation program is configured to cause the computer to select one of the encrypted versions of encryption keys in the encryption key table contained in the installation package used by the encryption program, and to generate and store an encryption key file comprising the selected one of the encrypted versions of encryption keys and one of the items of index information associated with the selected one of the encrypted versions of encryption keys when the installation program installs the encryption program on the computer, the installation program being configured to decrypt the selected one of the encrypted versions of encryption keys by using the first encryption key at the time of retrieving it from the encryption key table and to re-encrypt the selected one of the encrypted versions of encryption keys by using a second encryption key at the time of storing it in the encryption key file, the second encryption key being uniquely created by the client, the encryption key file being used for determination of the selected one of the encrypted versions of encryption keys, which is encrypted by using the second encryption key uniquely created by the client, by the administrator. - View Dependent Claims (2, 3)
-
-
4. A computer-readable non-transitory storage medium comprising a program configured to cause a computer of an administrator that manages an encryption program that is to be distributed and installed to:
-
generate encryption keys and an encryption key table comprising encrypted versions of the encryption keys and items of plain-text index information, such that the encrypted versions of the encryption keys are associated with the items of index information, the generated encryption keys being encrypted by using a first encryption key shared by the administrator and a client using a computer upon which the encryption program is to be installed; and generate an installation package for distribution, the installation package comprising the encryption program, the encryption key table, and an installation program configured to cause the computer of the client to install the encryption program on the computer of the client, wherein the installation program is configured to cause the computer of the client to select one of the encrypted versions of encryption keys in the encryption key table contained in the installation package used by the encryption program, and to generate and store an encryption key file comprising the selected one of the encrypted versions of encryption keys and one of the items of index information associated with the selected one of the encrypted versions of encryption keys, when the installation program installs the encryption program on the computer of the client, the installation program being configured to decrypt the selected one of the encrypted versions of encryption keys by using the first encryption key at the time of retrieving it from the encryption key table and to re-encrypt the selected one of the encrypted versions of encryption keys by using a second encryption key at the time of storing it in the encryption key file, the second encryption key being uniquely created by the client. - View Dependent Claims (5, 6)
-
Specification