×

Methods for providing secure access to shared information

  • US 5,719,938 A
  • Filed: 08/01/1994
  • Issued: 02/17/1998
  • Est. Priority Date: 08/01/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of controlling access to electronically-defined information among a plurality of users connected to a network having a server operable for assuring that the electronically-defined information is accessible by only at least a predetermined one of the plural users, each of said plural users having a unique first encryption key having a first portion and a second portion, said method comprising the steps of:

  • making said first portion known to both the server and said predetermined user;

    making said second portion known only to the server;

    encrypting the electronically-defined information using a second encryption key known only to the server to define encrypted information;

    storing the encrypted information in network-associated electronic storage accessible through the network to said plurality of users;

    encrypting the second encryption key using the first encryption key of the predetermined user to which access to the electronically-defined information is to be provided so as to define an encrypted second key;

    storing the encrypted second key in an electronic storage location accessible by said predetermine user; and

    attaining access by the predetermined user to the unencrypted electronically-defined information by;

    accessing the stored encrypted second key from a network-connected apparatus of the predetermined user;

    decrypting the accessed encrypted second key using the first key of the predetermined user at the apparatus of the predetermined user to recover the second encryption key;

    accessing the stored encrypted information from the network-connected apparatus of the predetermined user; and

    decrypting the accessed encrypted information using the recovered second encryption key to recover the electrically-defined information for examination of the recovered information by the predetermined user.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×