×

Data security for digital data storage

  • US 7,526,795 B2
  • Filed: 03/27/2001
  • Issued: 04/28/2009
  • Est. Priority Date: 03/27/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of transferring data over a computer network from a network server to a first client computer system, the method comprising:

  • receiving a request by a requestor using a first client computer system for data from at least one network server storing data, at least some of the data stored by the network server being encrypted;

    verifying whether a public encryption key associated with the requestor is good;

    if verification fails, requesting user input from the requestor and generating a public encryption key and a private encryption key based at least in part on the user input and based at least in part on an identification code associated with the first client computer system;

    checking an attribute of the requested data stored on the network server to determine whether the requested data stored on the network server is encrypted with the public encryption key associated with the requestor;

    if the attribute stored on the network server indicates that the requested data stored on the network server is encrypted with the public encryption key associated with the requestor, automatically sending the encrypted data to the first client computer system;

    if the attribute stored on the network server indicates that the requested data is encrypted with a public encryption key that is different than the public encryption key associated with the requestor, automatically sending a message to the requestor indicating that the requested data is not encrypted with the public encryption key of the requestor;

    if the attribute stored on the network server indicates that the requested data is unencrypted, encrypting the requested data stored on the server with the public encryption key associated with the requestor automatically and without user intervention to create encrypted data; and

    sending the encrypted data to the first client computer system wherein the first client computer system automatically uses the private encryption key to decrypt the encrypted data without user intervention and sending the requested data to the first client computer system only if the requested data is encrypted and if the requestor is the owner of the encryption key.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×