×

Method for providing secure access to information held in a shared repository

  • US 7,203,839 B2
  • Filed: 02/21/2006
  • Issued: 04/10/2007
  • Est. Priority Date: 02/22/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for providing secure access to information held in a shared repository, comprising the steps of:

  • storing, on a data server, information provided by a data owner;

    providing, to the data owner, a data owner public key and a data owner private key, the data owner public key and the data owner private key being a first key pair of a public-key cryptography system;

    providing the data owner public key to the data server;

    providing, to a data user, a data user public key and a data user private key, the data user public key and the data user private key being a second key pair of the public-key cryptography system;

    providing the data user public key to the data server;

    sending the data user public key from the data user to the data owner;

    combining, by the data owner, the data user public key and a sequence number, to provide a combination;

    encrypting the combination by the data owner, using the data owner private key, to provide an encrypted combination;

    sending, by the data owner to the data server, the encrypted combination and a command that gives the data server permission to transfer the information to the data user;

    decrypting the encrypted combination, using the data owner public key, to provide a decrypted combination;

    parsing the decrypted combination to provide a check word and a check number;

    comparing the check word and the data user public key;

    comparing the check number and an expected sequence number;

    if the step of comparing the check word and the data user public key indicates that the check word end the data user public key match, and further if the step of comparing the check number and an expected sequence number indicates that the check number and the expected sequence number match, recording permission to transfer the information in an access list;

    encrypting the data owner public key, by the data user, using the data user private key, to provide an encrypted data owner public key;

    sending, from the data user to the data server, the encrypted data owner public key and a request to transfer the information to the data user;

    decrypting the encrypted data owner public key, using the data user public key, to provide a second check word;

    comparing the second check word and the data owner public key;

    if the step of comparing the second check word and the data owner public key indicates that the second check word and the data owner public key match, checking the access list to determine whether the data server has permission to transfer the information; and

    ,if the data server has permission, transferring the information from the data server to the data user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×