×

Method and system for the cipher key controlled exploitation of data resources, related network and computer program products

  • US 7,913,096 B2
  • Filed: 12/30/2003
  • Issued: 03/22/2011
  • Est. Priority Date: 12/30/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for cipher controlled exploitation of data resources stored in a remote database associated with a computer system, the method comprising the steps of:

  • providing a subscriber identity module carrying at least one security algorithm, said subscriber identity module not used, either directly or indirectly, by said computer system for communication with a network;

    producing a cipher key via said at least one security algorithm;

    using said cipher key for protecting said data resources; and

    storing said protected data resources in said remote database in an encrypted format,wherein producing the cipher key comprises generating at least two random values, subjecting said at least two random values to said at least one security algorithm to generate at least two session keys, and combining said at least two session keys via a mixer function to produce a cipher key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×