×

Cryptographic file labeling system for supporting secured access by multiple users

  • US 5,953,419 A
  • Filed: 05/06/1996
  • Issued: 09/14/1999
  • Est. Priority Date: 05/06/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A machine system for maintaining confidential information generally in encrypted form while allowing for intelligible access to such confidential information by multiple users, said machine system comprising:

  • (a) a first data conveyance means for conveying digitized first data representing said encrypted form of the confidential information and for further conveying digitized second data representing an associated label,(a.1) wherein said encrypted form of the confidential information is producible by a first encrypting process using a first encryption key,(a.2) wherein said second data contains two or more encrypted versions of a first decryption key, said first decryption key being a signal that is applicable to a first decrypting process for decrypting the encrypted form of the confidential information and for thereby producing a plaintext form of the confidential information,(a.2a) wherein a first of said two or more encrypted versions of the first decryption key is decipherable by a first user key, the first user key being associated with a first user among said multiple users;

    (a.2b) wherein a second of said two or more encrypted versions of the first decryption key is decipherable by a second user key, the second user key being associated with a second user among said multiple users;

    (b) a first decrypting mechanism, operatively coupled to the first data conveyance means, for receiving the first data and for, upon a supplying of said first decryption key to said first decrypting mechanism, decrypting the first data into digitized third data representing the plaintext form of the confidential information; and

    (c) a second decrypting mechanism, operatively coupled to the first data conveyance means, for receiving at least one portion of said second data and for, upon a supplying of a corresponding one of said first and second user keys to the second decrypting mechanism, decrypting the at least one portion of said second data into digitized fourth data in accordance with a second decryption process so that said fourth data includes the first decryption key,(c.1) wherein the second decrypting mechanism is operatively coupled to supply the first decryption key to the first decrypting mechanism;

    (c.2) wherein said second decrypting mechanism defines part of an asymmetric encryption/decryption system;

    (a.2c) wherein said first user key defines a private part of a first public-private key pair associated with said first user; and

    (a.2d) wherein said second user key defines a private part of a second public-private key pair associated with said second user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×