Method and apparatus for creating a secure autonomous network entity of a network component system
First Claim
1. A method for creating an autonomous network entity configured to securely store sensitive information provided by a user of a computer coupled to a network having at least one network resource, the method comprising the steps of:
- creating an encapsulated entity component containing a reference to a location of the at least one network resource on the computer network;
cryptographically-transforming the sensitive information using a key generated in accordance with inputs used in a multi-stage key generation process; and
encapsulating the cryptographically-transformed information, along with the inputs of the key within the encapsulated entity to create the autonomous network entity, wherein the key is retrievable solely by subjecting the inputs contained within the encapsulated entity to the multi-stage key generation process, thereby allowing the sensitive information to be recovered.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique is provided for creating an autonomous network entity that stores sensitive information in a cryptographically secure manner. The autonomous entity comprises a data structure that encapsulates cryptographically-transformed information along with the inputs of a secret key used to reverse the transformation. Cryptographic storage of the sensitive information and its reversable key within the encapsulated entity makes the entity autonomous and capable of transfer among computer platforms and their processes without compromising the security of the information.
106 Citations
20 Claims
-
1. A method for creating an autonomous network entity configured to securely store sensitive information provided by a user of a computer coupled to a network having at least one network resource, the method comprising the steps of:
-
creating an encapsulated entity component containing a reference to a location of the at least one network resource on the computer network; cryptographically-transforming the sensitive information using a key generated in accordance with inputs used in a multi-stage key generation process; and encapsulating the cryptographically-transformed information, along with the inputs of the key within the encapsulated entity to create the autonomous network entity, wherein the key is retrievable solely by subjecting the inputs contained within the encapsulated entity to the multi-stage key generation process, thereby allowing the sensitive information to be recovered. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer coupled to a network, the computer comprising:
-
a memory for storing data and programs, including an operating system; a processing unit responsive to the programs for controlling and coordinating the operation of the computer; a software component layer coupled in cooperating relation with the operating system; and a data structure created by the software component layer, the data structure containing a reference to a location of a network resource on the computer network, the data structure further encapsulating cryptographically-transformed information along with inputs of a key used to reverse the transformation.
-
-
14. Apparatus for creating an autonomous network entity configured to securely store sensitive information provided by a user of a computer coupled to a network having at least one network resource, the apparatus comprising:
-
means for creating an encapsulated entity component containing a reference to a location of the at least one network resource on the computer network; means for cryptographically-transforming the sensitive information using a key generated in accordance with inputs used in a multi-stage key generation process; and means for encapsulating the cryptographically-transformed information, along with the inputs of the key within the encapsulated entity to create the autonomous network entity, wherein the kev is retrievable solely by subjecting the inputs contained within the encapsulated entity to the multi-stage key generation process, thereby allowing the sensitive information to be recovered. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification