×

Access control and authorization system

  • US 6,490,680 B1
  • Filed: 12/04/1998
  • Issued: 12/03/2002
  • Est. Priority Date: 12/04/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A process of securing an object, comprising:

  • applying a cryptographic hash algorithm to the object to provide a hash value;

    storing the hash value on a token;

    generating a random key component;

    combining a first plurality of key components to form a first key;

    encrypting the object using the first key;

    combining a second plurality of key components to form a second key;

    encrypting the random key component using the second key to form an encrypted key component;

    encrypting the hash value according to a digital signature algorithm using a user private key, to provide a digital signature;

    encrypting the hash value according to a user algorithm using the first key;

    forming a header including information that can be used to decrypt the encrypted object, wherein the information includes the user algorithm, the encrypted key component, and decrypt read credentials;

    encrypting the header; and

    adding the encrypted header to the encrypted object;

    wherein the first plurality of key components includes the random key component, and the second plurality of key components does not include the random key component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×