Distributed cryptographic object method
DC CAFCFirst Claim
Patent Images
1. A method for providing multi-level multimedia security in a data network, comprising the steps of:
- A) accessing an object-oriented key manager;
B) selecting an object to encrypt;
C) selecting a label for the object;
D) selecting an encryption algorithm;
E) encrypting the object according to the encryption algorithm;
F) labelling the encrypted object;
G) reading the object label;
H) determining access authorization based on the object label; and
I) decrypting the object if access authorization is granted.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute multiple encrypted embedded objects to other individuals in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved.
382 Citations
15 Claims
-
1. A method for providing multi-level multimedia security in a data network, comprising the steps of:
-
A) accessing an object-oriented key manager; B) selecting an object to encrypt; C) selecting a label for the object; D) selecting an encryption algorithm; E) encrypting the object according to the encryption algorithm; F) labelling the encrypted object; G) reading the object label; H) determining access authorization based on the object label; and I) decrypting the object if access authorization is granted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for providing multi-level multimedia security in a data network, comprising:
-
A) digital logic means, the digital logic means comprising; 1) a system memory means for storing data; 2) an encryption algorithm module, comprising logic for converting unencrypted objects into encrypted objects, the encryption algorithm module being electronically connected to the system memory means for accessing data stored in the first system memory; 3) an object labelling subsystem, comprising logic means for limiting object access, subject to label conditions, the object labelling subsystem being electronically connected to the system memory means for accessing data stored in the system memory means and the object labelling subsystem being further electronically connected to the encryption algorithm module to accept inputs from the encryption algorithm module; 4) a decryption algorithm module, comprising logic for converting encrypted objects into unencrypted objects, the decryption algorithm module being electronically connected to the system memory means for accessing data stored in the system memory means; and 5) an object label identification subsystem, comprising logic for limiting object access, subject to label conditions, the object label identification subsystem being electronically connected to the system memory means for accessing data stored in the system memory means and the object label identification subsystem being further electronically connected to the decryption algorithm module to accept inputs from the decryption algorithm module; B) the encryption algorithm module working in conjunction with the object labelling subsystem to create an encrypted object such that the object label identification subsystem limits access to an encrypted object. - View Dependent Claims (9, 10, 11)
-
-
12. A system for providing multi-level multimedia security in a data network, comprising:
-
A) means for accessing an object-oriented key manager; B) means for selecting an object to encrypt; C) means for selecting a label for the object; D) means for selecting an encryption algorithm; E) means for encrypting the object; F) means for labelling the encrypted object; G) means for reading the object label; H) means for determining access authorization based on the label; and I) means for accessing the object if access authorization is granted. - View Dependent Claims (13, 14, 15)
-
Specification