×

Method for providing secure access to information held in a shared repository

  • US 7,698,746 B2
  • Filed: 09/26/2006
  • Issued: 04/13/2010
  • Est. Priority Date: 02/22/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for providing secure access to information held in a shared repository, comprising the steps of:

  • storing, on a data server, information provided by a data owner;

    providing, to the data owner, a data owner public key and a data owner private key, the data owner public key and the data owner private key being a first key pair of a public-key cryptography system;

    providing the data owner public key to the data server;

    providing, to a data user, a data user public key and a data user private key, the data user public key and the data user private key being a second key pair of the public-key cryptography system;

    providing the data user public key to the data server;

    sending the data user public key from the data user to the data owner;

    encrypting the data user public key by the data owner, using the data owner private key, to provide an encrypted data user public key;

    sending, by the data owner to the data server, the encrypted data user public key and a command that gives the data server permission to transfer the information to the data user;

    decrypting the encrypted data user public key, using the data owner public key, to provide a check word;

    comparing the check word and the data user public key;

    if the step of comparing the check word and the data user public key indicates that the check word and the data user public key match, recording permission to transfer the information in an access list;

    encrypting the data owner public key, by the data user, using the data user private key, to provide an encrypted data owner public key;

    sending, from the data user to the data server, the encrypted data owner public key and a request to transfer the information to the data user;

    decrypting the encrypted data owner public key using the data user public key, to provide a second check word;

    comparing the second check word and the data owner public key;

    if the step of comparing the second check word and the data owner public key indicates that the second check word and the data owner public key match, checking the access list to determine whether the data server has permission to transfer the information;

    if the data server has permission, transferring the information from the data server to the data user;

    receiving, by the data server, a request by the data user to transfer the information to the data user;

    responsive to receiving the request, checking the access list to determine whether the data server has permission to transfer the information;

    if the data server has permission, encrypting the information using the data user public key to provide encrypted information; and

    transferring the encrypted information to the data user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×