×

ENCRYPTION PROGRAM OPERATION MANAGEMENT SYSTEM AND PROGRAM

  • US 20110219241A1
  • Filed: 04/28/2011
  • Published: 09/08/2011
  • Est. Priority Date: 12/25/2008
  • Status: Active Grant
First Claim
Patent Images

1. An encryption program operation management system comprising:

  • a processing device configured to implement an encryption key table generator, the encryption key table generator configured to generate encryption keys and to generate an encryption key table comprising encrypted versions of the encryption keys and items of plain-text index information, the encrypted versions of the encryption keys being associated with the items of index information, the encryption key table generator being configured to encrypt the generated encryption keys by using a first encryption key shared by an administrator managing an encryption program and a client using a computer upon which the encryption program is to be installed,wherein the processing device is further configured to implement an installation package generator configured to generate an installation package for distribution, the installation package comprising the encryption program, the encryption key table, and an installation program configured to cause the computer to install the encryption program on the computer;

    wherein the installation program is configured to cause the computer to select one of the encrypted versions of encryption keys in the encryption key table contained in the installation package used by the encryption program, and to generate and store an encryption key file comprising the selected one of the encrypted versions of encryption keys and one of the items of index information associated with the selected one of the encrypted versions of encryption keys when the installation program installs the encryption program on the computer, the installation program being configured to decrypt the selected one of the encrypted versions of encryption keys by using the first encryption key at the time of retrieving it from the encryption key table and to re-encrypt the selected one of the encrypted versions of encryption keys by using a second encryption key at the time of storing it in the encryption key file, the second encryption key being uniquely created by the client, the encryption key file being used for determination of the selected one of the encrypted versions of encryption keys, which is encrypted by using the second encryption key uniquely created by the client, by the administrator.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×