Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
First Claim
1. A method for cipher controlled exploitation of data resources stored in a remote database associated with a computer system, the method comprising the steps of:
- providing a subscriber identity module carrying at least one security algorithm, said subscriber identity module not used, either directly or indirectly, by said computer system for communication with a network;
producing a cipher key via said at least one security algorithm;
using said cipher key for protecting said data resources; and
storing said protected data resources in said remote database in an encrypted format,wherein producing the cipher key comprises generating at least two random values, subjecting said at least two random values to said at least one security algorithm to generate at least two session keys, and combining said at least two session keys via a mixer function to produce a cipher key.
1 Assignment
0 Petitions
Accused Products
Abstract
An arrangement for the cipher controlled exploitation of data resources (e.g., securely storing and retrieving sensitive data or securely registering and logging on a computer system) includes the steps of providing a subscriber identity module carrying a security algorithm; generating at least one, e.g., two, random values; subjecting the random value to the at least one security algorithm to generate at least one, e.g., two, session keys; processing the session keys via a mixer function such as a hash function to produce a cipher key; and using the cipher key thus produced for exploiting the data resources.
21 Citations
21 Claims
-
1. A method for cipher controlled exploitation of data resources stored in a remote database associated with a computer system, the method comprising the steps of:
-
providing a subscriber identity module carrying at least one security algorithm, said subscriber identity module not used, either directly or indirectly, by said computer system for communication with a network; producing a cipher key via said at least one security algorithm; using said cipher key for protecting said data resources; and storing said protected data resources in said remote database in an encrypted format, wherein producing the cipher key comprises generating at least two random values, subjecting said at least two random values to said at least one security algorithm to generate at least two session keys, and combining said at least two session keys via a mixer function to produce a cipher key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for cipher controlled exploitation of data resources stored in a remote database associated with a computer system, the method comprising the steps of:
-
providing a subscriber identity module carrying at least one security algorithm; producing a cipher key via said at least one security algorithm, wherein producing the cipher key comprises;
generating at least two random values, subjecting said at least two random values to said at least one security algorithm to generate at least two session keys, and combining said at least two session keys via a mixer function to produce the cipher key;using said cipher key for protecting said data resources; and storing said protected data resources in said remote database in an encrypted format.
-
-
15. A method for cipher controlled exploitation of data resources stored in a remote database associated with a computer system, the method comprising the steps of:
-
providing a subscriber identity module carrying at least one security algorithm; generating at least one random value; subjecting the at least one random value to the at least one security algorithm to generate at least one session key; providing a mixer function; inserting in the mixer function a user specific secret unrelated to said subscriber identity module security algorithm; processing the at least one session key via the mixer function to produce a cipher key, wherein the cipher key is a function of both the user specific secret and the at least one session key; using said cipher key for protecting said data resources; and storing said protected data resources in said remote database in an encrypted format.
-
-
16. A system for cipher-controlled exploitation of data resources, comprising:
-
at least one subscriber identity module carrying at least one security algorithm; at least one computer system comprising at least one processing module, said subscriber identity module not used, either directly or indirectly, by said at least one computer system for communication with a network and said at least one processing module being interfaced with said at least one subscriber identity module to generate a cipher key via said at least one security algorithm and being configured to protect via said cipher key said data resources; and a remote database associated with said at least one computer system for storing said protected data resources by said cipher key in an encrypted format, wherein generating the cipher key comprises generating at least two random values, subjecting said at least two random values to said at least one security algorithm to generate at least two session keys, and combining said at least two session keys via a mixer function to produce a cipher key. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification