Data Content Checking
First Claim
1. An automated method of data content checking comprising using a computer system to implement the steps of:
- a) encrypting data,b) applying multiple independent content checks to a decrypted copy of the data, andc) if the data passes a content check, applying a digital signature to it associated with that check and making it available in unencrypted form for passing on.
1 Assignment
0 Petitions
Accused Products
Abstract
A data content checker arrangement for protecting communication between a sensitive computer system (102) and an external computer system (104). The arrangement includes a store (108) connected to input and output sub-systems (106) and (114) and to content checkers (110) and (112) arranged in parallel. The input and output sub-systems (106) and (114) are connected to the external computer system (104) and the sensitive computer system (102) respectively. Data received from the external computer system (104) is encrypted by the input sub-system (106) using an encryption key to which the content checkers (110) and (112) have access. The content checkers (110) and (112) can therefore decrypt, read and check the data. If the data passes a content checker'"'"'s checks, the checker digitally signs and stores it, decrypted, in the store (108); if the checks are not passed, the checker discards the data. The output sub-system (114) delivers data to the sensitive computer system (102) if the data has received both content checkers'"'"' digital signatures indicating acceptability.
24 Citations
19 Claims
-
1. An automated method of data content checking comprising using a computer system to implement the steps of:
-
a) encrypting data, b) applying multiple independent content checks to a decrypted copy of the data, and c) if the data passes a content check, applying a digital signature to it associated with that check and making it available in unencrypted form for passing on. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. Apparatus for automated data content checking comprising a computer system arranged to implement the steps of:
-
a) encrypting data, b) applying multiple independent content checks to a decrypted copy of the data, and c) if the data passes a content check, applying a digital signature to it associated with that check and making it available in unencrypted form for passing on. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product comprising a computer readable medium containing computer readable instructions for controlling operation of a computer system to implement the steps of:
-
a) encrypting data, b) applying multiple independent content checks to a decrypted copy of the data, and c) if the data passes a content check, applying a digital signature to it associated with that check and making it available in unencrypted form for passing on.
-
Specification