×

Saving and retrieving data based on symmetric key encryption

  • US 7,487,365 B2
  • Filed: 04/04/2003
  • Issued: 02/03/2009
  • Est. Priority Date: 04/17/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, implemented in a computing device, the method comprising:

  • receiving a bit string from a calling program;

    checking an identifier of the calling program to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string, the checking comprising;

    obtaining, from the bit string, identifiers of multiple target programs that are allowed to access the data;

    checking whether one of the identifiers of the multiple target programs is the same as the identifier of the calling program;

    determining that the calling program is allowed to access the data if one of the identifiers of the multiple target programs is the same as the identifier of the calling program; and

    determining that the calling program is not allowed to access the data if none of the identifiers of the multiple target programs is the same as the identifier of the calling program;

    verifying the integrity of the data;

    decrypting the data using a symmetric key; and

    returning the data to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×