US20070162767A1 - Method and system for controlling access to data stored on a data storage device - Google Patents
Method and system for controlling access to data stored on a data storage device Download PDFInfo
- Publication number
- US20070162767A1 US20070162767A1 US11/717,884 US71788407A US2007162767A1 US 20070162767 A1 US20070162767 A1 US 20070162767A1 US 71788407 A US71788407 A US 71788407A US 2007162767 A1 US2007162767 A1 US 2007162767A1
- Authority
- US
- United States
- Prior art keywords
- computer system
- puzzle
- file key
- key
- storage device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- the present invention relates generally to data encryption and decryption systems and methods and, more particularly, to a method and system for controlling access to a data storage device.
- Electronic data is typically stored on a data storage device.
- Known data storage devices include hard disk drives, tape drives, and optical disk drives, and may be situated in a computer system.
- Known computer systems include personal computers, or desktop computers, as well as networked computers.
- Unauthorized access to data stored on the storage device often results in tampering with the data.
- This data tampering may include deletion, corruption, or infection of the data with a computer virus, for example. Any of these may render the data inaccessible or unusable by an authorized user. Thus, the information that the electronic data represents is lost to the user.
- Data encryption/decryption is a long established means of controlling access to data. Similarly, systems and methods of data encryption/decryption are common in the prior art. Methods of data encryption and decryption are commonly configured as computer programs and are stored on a computer's storage device. Data encryption/decryption programs may be invoked by a user of the computer or may be invoked during boot up of the computer.
- the method of the present invention is installed in a computer system and stored on a data storage device, such as a hard disk drive or optical disk drive, of the computer system.
- a data storage device such as a hard disk drive or optical disk drive
- the computer system may comprise a known “stand-alone” computer, such as a known personal computer or desktop computer, or may comprise a plurality of networked computers.
- a unique token device is detachably coupled to a data port of the computer.
- the token device may include a processor running a data encryption/decryption program and a memory device for storing user data.
- Each token device is also provided with a unique string of information. This unique string of information, in combination with the encryption/decryption program running on the token's processor, enables the token to generate data that is unique to that token device.
- a copy of the unique string of information may reside at a remote location. The copy of the unique string of information is provided to enable boot up of the computer, if the token is lost or misplaced.
- a first 16-byte dynamic seed or puzzle S R is generated and stored in the token's memory.
- the first puzzle S R allows recovery of data stored on the storage device.
- the token's processor also uses S R to generate a Clear File Key (CFK).
- the CFK is a non-encrypted, symmetric file key that is used to encrypt and decrypt data stored on the computer's storage device, to allow access to the data by the user.
- the CFK is transmitted to the computer's memory and remains there until the computer is powered down. While residing in memory, CFK is used to decrypt data, as the data is transmitted from the storage device to the memory, and to encrypt data, as the data is transmitted from memory to the storage device.
- the CFK along with the data encryption/decryption program running on the computer's processor, filters the flow of data between the storage device and the computer's memory to prevent access to data on the storage device, since the data is in encrypted form.
- the token's processor outputs a first dynamic key K n , based on the value of a subsequent dynamic puzzle S n .
- the first dynamic key K n can function as a one-time password, since a new dynamic key K n is generated for each dynamic puzzle S n .
- the subsequent dynamic puzzle S n can be transmitted to an administrator that possess the copy of the unique string of information.
- the administrator may reside at a remote location and may be accessed via conventional methods, such as the Internet, a company's intranet, or other known methods.
- the administrator Upon receiving the subsequent dynamic puzzle S n , the administrator can generate K n , and forward K n to the user.
- CFK is fed into the computer's processor along with K n .
- the computer's processor which may be running an AES data encryption/decryption algorithm, generates a first Encrypted File Key (EKF n ), using CFK as the input and K n as the encryption key.
- EKF n is then stored on the computer's storage device along with S n .
- the encrypted file key (EKF n ) hides the true CFK, to prevent access to encrypted data on the storage device.
- the invented method is initialized when a user couples their unique token device to the data port and boots up the computer. Upon booting the computer, the invented method first reads the subsequent dynamic puzzle S n , then feeds S n into the token for processing. The token's processor again recognizes S n and outputs the first dynamic key K n . EKF n is then decrypted, using K n , to generate CFK.
- a next subsequent dynamic puzzle S n+1 is generated for the next boot up of the computer and initialization of the method.
- a new puzzle S n+1 is generated so that the puzzle, or seed, is dynamic.
- the next subsequent dynamic puzzle S n+1 is simultaneously transmitted to the token and stored on the computer's storage device and overwrites the previously stored puzzle S n.
- the token's processor Upon receiving the next subsequent dynamic puzzle S n+1 , the token's processor generates a subsequent dynamic key K n+1 .
- CFK is then encrypted using the subsequent dynamic key K n+1 to generate a new subsequent Encrypted File Key (EKF n+1 ).
- EKF n+1 is then stored on the storage device.
- the encrypted file key, EKF n+1 is the encrypted form of CFK and hides the true CFK, as previously discussed.
- the computer Upon initialization of the invented method, the computer will complete its boot up processes and the user operates the computer in a normal fashion. The user may remove the token from the computer's data port, upon the computer completing its boot up processes, if desired.
- the invented method has generated and saved the next subsequent dynamic puzzle S n+1 and subsequent encrypted file key EKF n+1 , so the method is ready for the next boot up of the computer and initialization thereof.
- the computer When the user has finished using the computer, the computer is powered down and CFK is erased from memory. The user may then remove their unique token device from the data port, if they have not previously done so. If an attempt is made to access data stored on the storage device, the computer will not completely boot up without the token device, and access to the data on the storage device will be prevented, since the data is in encrypted form. Additionally, if a user couples a different token device to the computer's data port, that token device would not output the correct dynamic key K n , since that token device has a different unique string of information. A different unique string of information results in an incorrect dynamic key K x being generated and the Encrypted File Key EKF n would not be decrypted.
- FIG. 2 is a flow chart showing an installation procedure of a preferred embodiment of the method of the present invention.
- FIG. 3 is a flow chart showing an operating procedure of the method of the present invention.
- the computer 10 includes a processor 14 for processing data, a memory 16 for temporarily storing data, and a data port 18 to allow coupling of external devices to the computer 10 .
- the computer's processor 14 is capable of running a 128-bit data encryption/decryption program.
- the computer's process 14 is capable of running a 128-bit Advanced Encryption Standard (AES) technology data encryption/decryption program or a similar data encryption/decryption program.
- AES Advanced Encryption Standard
- the token 20 is provided with a unique string of information.
- This unique string of information in combination with the encryption/decryption program running on the token's processor 22 , enables the token 20 to generate data that is unique to that token device.
- a copy of the unique string of information may be possessed an administrator (not shown) residing at a remote location. The copy of the unique string of information is provided to enable boot up of the computer 10 , if the token 20 is lost or misplaced.
- the administrator may reside at a remote location and may be accessed via conventional methods, such as the Internet, a company's intranet, or other known methods.
- the invented method continues in process block 110 where, when the first puzzle S R is stored in the token's memory 24 A, the puzzle S R is also fed into the token's processor 22 .
- a data encryption/decryption program such as an AES encryption program, running on its processor 22 , the token 20 generates and outputs a Clear File Key (CFK) in process block 112 .
- the Clear File Key (CFK) is based on the first puzzle S R received by the processor 22 .
- the CFK is a non-encrypted, symmetric file key that is used to encrypt and decrypt data stored on the computer's hard drive 12 , to allow access to the data by the user.
- CFK is transmitted to the computer's memory 16 and remains there until the computer 10 is powered down.
- a subsequent dynamic puzzle S n is then generated in process block 116 by the installation procedure 100 of the invented method.
- the subsequent dynamic puzzle S n is simultaneously fed into the token's memory 24 and stored on the hard drive 12 .
- the token's processor 22 recognizes the subsequent dynamic puzzle S m as a challenge. Using the AES program and the token's unique string of information, the processor 22 outputs a first dynamic key K n , based on the value of the subsequent dynamic puzzle S n .
- the first dynamic key K n can function as a one-time password, since a new dynamic key K n is generated for each subsequent dynamic puzzle S n . For example, if the user loses or misplaces their token, the subsequent dynamic puzzle S n can be transmitted to the administrator possessing the copy of the unique string of information. Upon receiving the subsequent dynamic puzzle S n , the administrator can generate K n , and forward K n to the user. The first dynamic key K n is then transmitted to the computer's memory 16 in process block 122 .
- CFK is fed into the computer's processor 14 along with K n .
- the computer's processor 14 running an AES data encryption/decryption algorithm, generates a first Encrypted File Key (EKF n ), using CFK as the input and K n as the encryption key, in process block 126 .
- EKF n is then stored on the hard drive 12 in process block 128 .
- the encrypted file key (EKF n ) hides the true CFK, to prevent access to data on the hard drive 12 .
- the data encryption/decryption program running on the computer's processor 14 then encrypts the data on the hard drive 12 using CFK in process block 130 .
- the CFK along with the encryption/decryption program running on the computer's processor 14 , filters the flow of data between the hard drive 12 and the computer's memory 16 to prevent access to data on the hard drive 12 , since the data is in encrypted form.
- Data is encrypted with CFK to prevent access to the stored data.
- the installation procedure 100 of the invented method terminates in end block 132 .
- a user may power down (turn off) the computer 10 or they may manipulate data stored on the hard drive 12 as they normally would.
- the user may remove the token 20 from the computer's data port 18 , upon the computer 10 completing its boot up processes, if desired. If the computer 10 is powered down, the user removes their token 20 from the data port 18 to prevent unauthorized access to data stored on the hard disk drive 12 , if they have not previously removed the token 20 .
- the token's processor 22 again recognizes the puzzle S n as a challenge, then using the AES encryption/decryption algorithm and the token's unique string of information, outputs the first dynamic key K n .
- the first dynamic key K n is then fed transmitted to the computer 10 in process block 210 .
- a new puzzle S n+1 , S n+n is generated so that the puzzle, or seed, is dynamic and cannot be readily duplicated.
- the new puzzle S n+1 is generated, it is simultaneously transmitted to the token 20 and stored on the computer's hard drive 12 in process block 220 .
- the new puzzle S n+1 overwrites any puzzle S n previously stored on the hard drive 12 .
- process block 222 upon receiving the next subsequent dynamic puzzle S n+1 , the token's processor 22 again recognizes the puzzle S n+1 as a challenge, and uses the value of S n+1 to generate a subsequent dynamic key K n+1 .
- process block 224 CFK and the subsequent dynamic key K n+1 , are fed into the computer's processor 14 , which is running the AES algorithm.
- the AES algorithm processes the two keys and outputs a new subsequent Encrypted File Key (EKF n+1 ) in process block 226 .
- EKF n+1 is stored on the hard drive 12 in process block 228 .
- the token 20 Upon coupling the token 20 to the computer 10 and rebooting the computer 10 , the token 20 outputs CFK, as previously discussed. The user then has access to data stored on the hard drive 12 . The invented method is then reinstalled via the previously discussed installation procedure 100 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
A system and method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive is provided. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to data stored on the data storage device.
Description
- 1. Field of the Invention
- The present invention relates generally to data encryption and decryption systems and methods and, more particularly, to a method and system for controlling access to a data storage device.
- 2. Background Information
- As electronic data becomes increasingly important, in both the business world and in personal lives, the need to protect such data similarly increases. Electronic data is typically stored on a data storage device. Known data storage devices include hard disk drives, tape drives, and optical disk drives, and may be situated in a computer system. Known computer systems include personal computers, or desktop computers, as well as networked computers.
- The importance of the data stored on storage devices cannot be under emphasized. Business accounting records, personnel records, research information, images, and personal information are stored as data on storage devices, and each is important for obvious reasons.
- Therefore, preventing unauthorized access to data is critical. Unauthorized access to data stored on the storage device, often results in tampering with the data. This data tampering may include deletion, corruption, or infection of the data with a computer virus, for example. Any of these may render the data inaccessible or unusable by an authorized user. Thus, the information that the electronic data represents is lost to the user.
- Data encryption/decryption is a long established means of controlling access to data. Similarly, systems and methods of data encryption/decryption are common in the prior art. Methods of data encryption and decryption are commonly configured as computer programs and are stored on a computer's storage device. Data encryption/decryption programs may be invoked by a user of the computer or may be invoked during boot up of the computer.
- U.S. patent application Ser. No. 09/562,385, to P. Lin, the first the named inventor of the subject application is incorporated herein, in its entirety, by reference. Disclosed therein is a method of authentication of a user by an exchange that includes an electronic serial number, a plurality of substring designations, and a calculated authentication string. A user and an authentication authority each possess an identification string associated with the electronic serial number. By applying one or more operations, some of which may be exchanged across a network and others of which may be associated with the electronic serial number, a different authentication string can be calculated each time authentication is requested, making the methods and devices practicing this invention resistant to efforts to compromise the authentication.
- The present invention provides a system and method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to the data storage device. The invented method filters the flow of data between the storage device and a memory. Further, the method utilizes a symmetrical key for decrypting data, as the data is transmitted from the storage device to the memory, and for encrypting data, as the data is transmitted from memory to the storage device.
- Preferably, the method of the present invention is installed in a computer system and stored on a data storage device, such as a hard disk drive or optical disk drive, of the computer system. The computer system may comprise a known “stand-alone” computer, such as a known personal computer or desktop computer, or may comprise a plurality of networked computers.
- A unique token device is detachably coupled to a data port of the computer. The token device may include a processor running a data encryption/decryption program and a memory device for storing user data. Each token device is also provided with a unique string of information. This unique string of information, in combination with the encryption/decryption program running on the token's processor, enables the token to generate data that is unique to that token device. A copy of the unique string of information may reside at a remote location. The copy of the unique string of information is provided to enable boot up of the computer, if the token is lost or misplaced.
- During installation of the invented method, a first 16-byte dynamic seed or puzzle SR is generated and stored in the token's memory. The first puzzle SR allows recovery of data stored on the storage device. The token's processor also uses SR to generate a Clear File Key (CFK). The CFK is a non-encrypted, symmetric file key that is used to encrypt and decrypt data stored on the computer's storage device, to allow access to the data by the user.
- The CFK is transmitted to the computer's memory and remains there until the computer is powered down. While residing in memory, CFK is used to decrypt data, as the data is transmitted from the storage device to the memory, and to encrypt data, as the data is transmitted from memory to the storage device. Thus, the CFK, along with the data encryption/decryption program running on the computer's processor, filters the flow of data between the storage device and the computer's memory to prevent access to data on the storage device, since the data is in encrypted form.
- Next, the token's processor outputs a first dynamic key Kn, based on the value of a subsequent dynamic puzzle Sn. The first dynamic key Kn can function as a one-time password, since a new dynamic key Kn is generated for each dynamic puzzle Sn. For example, if the user loses or misplaces their token, the subsequent dynamic puzzle Sn can be transmitted to an administrator that possess the copy of the unique string of information. The administrator may reside at a remote location and may be accessed via conventional methods, such as the Internet, a company's intranet, or other known methods. Upon receiving the subsequent dynamic puzzle Sn, the administrator can generate Kn, and forward Kn to the user.
- CFK is fed into the computer's processor along with Kn. The computer's processor, which may be running an AES data encryption/decryption algorithm, generates a first Encrypted File Key (EKFn), using CFK as the input and Kn as the encryption key. EKFn is then stored on the computer's storage device along with Sn. The encrypted file key (EKFn) hides the true CFK, to prevent access to encrypted data on the storage device.
- In use, the invented method is initialized when a user couples their unique token device to the data port and boots up the computer. Upon booting the computer, the invented method first reads the subsequent dynamic puzzle Sn, then feeds Sn into the token for processing. The token's processor again recognizes Sn and outputs the first dynamic key Kn. EKFn is then decrypted, using Kn, to generate CFK.
- Additionally, a next subsequent dynamic puzzle Sn+1 is generated for the next boot up of the computer and initialization of the method. Each time the invented method is invoked, a new puzzle Sn+1 is generated so that the puzzle, or seed, is dynamic. The next subsequent dynamic puzzle Sn+1 is simultaneously transmitted to the token and stored on the computer's storage device and overwrites the previously stored puzzle Sn.
- Upon receiving the next subsequent dynamic puzzle Sn+1, the token's processor generates a subsequent dynamic key Kn+1. CFK is then encrypted using the subsequent dynamic key Kn+1 to generate a new subsequent Encrypted File Key (EKFn+1). EKFn+1 is then stored on the storage device. The encrypted file key, EKFn+1 is the encrypted form of CFK and hides the true CFK, as previously discussed.
- Upon initialization of the invented method, the computer will complete its boot up processes and the user operates the computer in a normal fashion. The user may remove the token from the computer's data port, upon the computer completing its boot up processes, if desired. The invented method has generated and saved the next subsequent dynamic puzzle Sn+1 and subsequent encrypted file key EKFn+1, so the method is ready for the next boot up of the computer and initialization thereof.
- When the user has finished using the computer, the computer is powered down and CFK is erased from memory. The user may then remove their unique token device from the data port, if they have not previously done so. If an attempt is made to access data stored on the storage device, the computer will not completely boot up without the token device, and access to the data on the storage device will be prevented, since the data is in encrypted form. Additionally, if a user couples a different token device to the computer's data port, that token device would not output the correct dynamic key Kn, since that token device has a different unique string of information. A different unique string of information results in an incorrect dynamic key Kx being generated and the Encrypted File Key EKFn would not be decrypted.
- The objects and features of the present invention, which are believed to be novel, are set forth with particularity in the appended claims. The present invention, both as to its organization and manner of operation, together with further objects and advantages, may best be understood by reference to the following description, taken in connection with the accompanying drawings, in which:
-
FIG. 1 is a schematic diagram of a computer system and a token device of a preferred embodiment of the method of the present invention; -
FIG. 2 is a flow chart showing an installation procedure of a preferred embodiment of the method of the present invention; and -
FIG. 3 is a flow chart showing an operating procedure of the method of the present invention. - The following description is provided to enable any person skilled in the art to make and use the invention and sets forth the best modes presently contemplated by the inventors of carrying out the invention. Various modifications, however, will remain readily apparent to those skilled in the art, since the generic principles of the present invention have been defined herein.
- The present invention provides a method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to the data storage device. Further, the method utilizes a symmetrical key for decrypting data, as the data is transmitted from the storage device to the memory, and for encrypting data, as the data is transmitted from memory to the storage device.
- Referring now to
FIG. 1 of the drawings, a preferred embodiment of the method of the present invention is installed in acomputer system 10 and stored on adata storage device 12 of thecomputer system 10. For example, the invented method may be provided in the form of a computer program and uploaded onto thecomputer system 10 and stored on thestorage device 12, as is well known. Thedata storage device 12 may comprise any suitable known data storage device such as a hard disk drive or optical disk drive. For ease of reference only, thedata storage device 12 will be referred to hereinafter ashard drive 12. Thecomputer system 10, hereinafter computer, may comprise a known “stand-alone” computer, such as a personal computer or desktop computer, or may comprise a plurality of networked computers (not shown), for example. Thecomputer 10 includes aprocessor 14 for processing data, amemory 16 for temporarily storing data, and adata port 18 to allow coupling of external devices to thecomputer 10. Preferably, the computer'sprocessor 14 is capable of running a 128-bit data encryption/decryption program. Most preferably, the computer'sprocess 14 is capable of running a 128-bit Advanced Encryption Standard (AES) technology data encryption/decryption program or a similar data encryption/decryption program. - A unique token device, shown schematically at 20, is configured to be detachably coupled to the
computer 10 via itsdata port 18. The token 20 anddata port 18 may be configured in any desired mutually compatible form factor which affords coupling and decoupling of the token 20 with thedata port 18, and thus to thecomputer 10. For example, thedata port 18 may comprise a known USB (Universal Serial Bus) port or similar data port. - The token 20 preferably includes an on-
board processor 22 for processing data, amemory device 24 for storing data, and a coupling portion 26 for coupling the token 20 to thedata port 18. The on-board processor 22 is preferably capable of processing 128-bit data. Additionally, theprocessor 22 is capable of running a data encryption/decryption program, such as an Advanced Encryption Standard (AES) technology data encryption/decryption program. - The token's
memory device 24 includes asecure region 24A. Thememory device 24 is configured to maintain data in thesecure region 24A even when power to the token 20 is removed. Vital user data, such as a password for example, may be stored in thesecure region 24A of thememory device 24 to prevent loss of the data. - Additionally, the token 20 is provided with a unique string of information. This unique string of information, in combination with the encryption/decryption program running on the token's
processor 22, enables the token 20 to generate data that is unique to that token device. A copy of the unique string of information may be possessed an administrator (not shown) residing at a remote location. The copy of the unique string of information is provided to enable boot up of thecomputer 10, if the token 20 is lost or misplaced. The administrator may reside at a remote location and may be accessed via conventional methods, such as the Internet, a company's intranet, or other known methods. - Referring now to
FIG. 2 of the drawings, there is shown generally at 100, an installation procedure of a preferred embodiment of the invented method. Theinstallation procedure 100 begins atstart block 102. Theinstallation procedure 100 of the preferred embodiment of the invented method is initialized in process block 104 where a user couples their token 20 to the computer'sdata port 18 and begins uploading the invented method on to thecomputer 10. For example, prior to installation the invented method may be stored on a known portable data storage device such as a compact disk or floppy disk, shown schematically at 26. The disk 26 is inserted in a disk drive 28 of thecomputer 10. The disk drive 28 reads the data, comprising the invented method, stored on the disk 26 and begins transmitting the data to thecomputer 10, as is well known. - In
process block 106, the method generates a first dynamic seed or puzzle SR. The first puzzle SR is simultaneously stored in thesecure region 24A of the token'smemory 24 and on the computer'shard drive 12 inprocess block 108. The first puzzle SR functions as a rescue puzzle to allow recovery of data stored on the computer's hard drive 12 (more thoroughly discussed hereinafter). The dynamic puzzle SR may be a randomly generated 16-byte number that may be generated by any one of several well known methods. - The invented method continues in process block 110 where, when the first puzzle SR is stored in the token's
memory 24A, the puzzle SR is also fed into the token'sprocessor 22. Using a data encryption/decryption program, such as an AES encryption program, running on itsprocessor 22, the token 20 generates and outputs a Clear File Key (CFK) inprocess block 112. The Clear File Key (CFK) is based on the first puzzle SR received by theprocessor 22. The CFK is a non-encrypted, symmetric file key that is used to encrypt and decrypt data stored on the computer'shard drive 12, to allow access to the data by the user. In process block 114 CFK is transmitted to the computer'smemory 16 and remains there until thecomputer 10 is powered down. - A subsequent dynamic puzzle Sn is then generated in process block 116 by the
installation procedure 100 of the invented method. Inprocess block 118, the subsequent dynamic puzzle Sn is simultaneously fed into the token'smemory 24 and stored on thehard drive 12. In process block 120 the token'sprocessor 22 recognizes the subsequent dynamic puzzle Sm as a challenge. Using the AES program and the token's unique string of information, theprocessor 22 outputs a first dynamic key Kn, based on the value of the subsequent dynamic puzzle Sn. - The first dynamic key Kn can function as a one-time password, since a new dynamic key Kn is generated for each subsequent dynamic puzzle Sn. For example, if the user loses or misplaces their token, the subsequent dynamic puzzle Sn can be transmitted to the administrator possessing the copy of the unique string of information. Upon receiving the subsequent dynamic puzzle Sn, the administrator can generate Kn, and forward Kn to the user. The first dynamic key Kn is then transmitted to the computer's
memory 16 inprocess block 122. - In
process block 124, CFK is fed into the computer'sprocessor 14 along with Kn. The computer'sprocessor 14, running an AES data encryption/decryption algorithm, generates a first Encrypted File Key (EKFn), using CFK as the input and Kn as the encryption key, inprocess block 126. EKFn is then stored on thehard drive 12 inprocess block 128. The encrypted file key (EKFn) hides the true CFK, to prevent access to data on thehard drive 12. The data encryption/decryption program running on the computer'sprocessor 14 then encrypts the data on thehard drive 12 using CFK inprocess block 130. Thus, the CFK, along with the encryption/decryption program running on the computer'sprocessor 14, filters the flow of data between thehard drive 12 and the computer'smemory 16 to prevent access to data on thehard drive 12, since the data is in encrypted form. - Data is encrypted with CFK to prevent access to the stored data. The
installation procedure 100 of the invented method terminates inend block 132. Upon completion of installation of the invented method, a user may power down (turn off) thecomputer 10 or they may manipulate data stored on thehard drive 12 as they normally would. The user may remove the token 20 from the computer'sdata port 18, upon thecomputer 10 completing its boot up processes, if desired. If thecomputer 10 is powered down, the user removes their token 20 from thedata port 18 to prevent unauthorized access to data stored on thehard disk drive 12, if they have not previously removed the token 20. - Referring now to
FIG. 3 of the drawings, there is shown generally at 200, an operating procedure of the invented method. Theoperating procedure 200 begins in start block 202. Theoperating procedure 200 is initialized when a user couples their uniquetoken device 20 to thedata port 18 and starts up, or boots up, thecomputer 10 inprocess block 204. Upon booting thecomputer 10, inprocess block 206, theoperating procedure 200 of the invented method reads the subsequent dynamic puzzle Sn that is stored on thehard drive 12 and transmits the dynamic puzzle Sn to the token'sprocessor 22 for processing. Inprocess block 208, the token'sprocessor 22 again recognizes the puzzle Sn as a challenge, then using the AES encryption/decryption algorithm and the token's unique string of information, outputs the first dynamic key Kn. The first dynamic key Kn is then fed transmitted to thecomputer 10 inprocess block 210. - In
process block 212, EKFn is transmitted into the computer'sprocessor 14 for decryption using Kn. Using the AES algorithm, the computer'sprocessor 14 uses the first dynamic key Kn to decrypt EKFn and generate CFK inprocess block 214. While thecomputer 10 is in use, the CFK remains in the computer'smemory 16 to allow manipulation of data on thehard drive 12, as shown inprocess block 216. The CFK is transmitted to the computer'smemory 16 and remains there until thecomputer 10 is powered down. The data encryption/decryption program running on the computer'sprocessor 14 uses the CFK residing inmemory 16 to decrypt data, as the data is transmitted from thehard drive 12 to the computer'smemory 16, and to encrypt data, as the data is transmitted frommemory 16 to thehard drive 12. Thus, the CFK, along with the data encryption/decryption program running on the computer'sprocessor 14, filters the flow of data between thehard drive 12 and the computer'smemory 16 to prevent access to data on thehard drive 12, since the data is in encrypted form. Inprocess block 218, theoperating procedure 200 of the invented method automatically generates a next subsequent dynamic puzzle Sn+1 for the next boot up of thecomputer 10 and initialization of theoperating procedure 200 of the invented method. After installation, each time the invented method is invoked, a new puzzle Sn+1, Sn+n, is generated so that the puzzle, or seed, is dynamic and cannot be readily duplicated. Once the new puzzle Sn+1, is generated, it is simultaneously transmitted to the token 20 and stored on the computer'shard drive 12 inprocess block 220. The new puzzle Sn+1, overwrites any puzzle Sn previously stored on thehard drive 12. - In
process block 222, upon receiving the next subsequent dynamic puzzle Sn+1, the token'sprocessor 22 again recognizes the puzzle Sn+1 as a challenge, and uses the value of Sn+1 to generate a subsequent dynamic key Kn+1. Inprocess block 224, CFK and the subsequent dynamic key Kn+1, are fed into the computer'sprocessor 14, which is running the AES algorithm. The AES algorithm processes the two keys and outputs a new subsequent Encrypted File Key (EKFn+1) inprocess block 226. EKFn+1 is stored on thehard drive 12 inprocess block 228. The encrypted file key, EKFn+1 is the encrypted form of CFK and prevents decryption CFK to prevent access to data stored on thehard drive 12, as previously discussed. Theoperating procedure 200 of the invented method then terminates inend block 230. - Upon completion of the
operating procedure 200 of the invented method, thecomputer 10 will complete its boot up processes and the user can operate thecomputer 10 in a normal fashion. The user may then remove their uniquetoken device 20 from thedata port 18 if desired. The invented method has generated and saved the next subsequent dynamic puzzle S2+1 and subsequent encrypted file key EKFn+1, so the method is ready for the next subsequent boot up of thecomputer 10 and initialization thereof. - When the user has finished using the
computer 10, thecomputer 10 is powered down. EKFn+1 and Sn+1 are stored on thehard drive 12 and CFK is erased from the computer'smemory 16. The user removes their uniquetoken device 20 from the computer'sdata port 18, if they have not previously done so. Data stored on the computer'shard drive 12 is protected from unwanted access since the data is in encrypted form. If an attempt is made to access data stored on thehard drive 12, thecomputer 10 will not completely boot up without the token 20, and access to the data on thehard drive 12 will be prevented, since the data is encrypted. - Additionally, if a user couples a different token device to the computer's data port, that token device would not output the correct dynamic key Kn, since that token device has a different unique string of information. A different unique string of information results in an incorrect dynamic key Kx being generated and the Encrypted File Key EKFn would not be decrypted.
- While the
computer 10 is in use, any one of a number of varied circumstances may arise that may cause thecomputer 10, or it'shard drive 12 to fail, commonly referred to as “crash”. Such a failure may inhibit the user's access to Sn+1 and EKFn+1, due to corruption of data stored on thehard drive 12. However, since the rescue puzzle SR is stored in thesecure region 24A of the token'smemory 24, and SR directly generates CFK, the user may access recoverable data stored on thehard drive 12. - Upon coupling the token 20 to the
computer 10 and rebooting thecomputer 10, the token 20 outputs CFK, as previously discussed. The user then has access to data stored on thehard drive 12. The invented method is then reinstalled via the previously discussedinstallation procedure 100. - Those skilled in the art will appreciate that various adaptations and modifications of the just-described preferred embodiments can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.
Claims (15)
1. A method for controlling access to data stored on a storage device in a computer system, the method comprising the following steps:
(a) coupling a token device to the computer system;
(b) activating the computer system;
(c) reading a puzzle stored on the storage device;
(d) transmitting the puzzle to the token device, the token device generating a dynamic key responsive to receipt of the puzzle;
(e) transmitting the dynamic key to a processor of the computer system;
(f) reading an encrypted file key stored on the storage device and transmitting the encrypted file key to the processor;
(g) decrypting the encrypted file key using the dynamic key to generate a clear file key;
(h) storing the clear file key in memory;
(i) generating a subsequent puzzle and storing the subsequent puzzle on the storage device;
(j) transmitting the subsequent puzzle to the token device, the token device generating a subsequent dynamic key responsive to receipt of the subsequent puzzle;
(k) transmitting the subsequent dynamic key to the processor of the computer system and transmitting the clear file key to the processor of the computer system; and
(l) encrypting the clear file key with the subsequent dynamic key to generate a subsequent encrypted file key and storing the subsequent encrypted file key on the storage device.
2. The method of 1 wherein a subsequent puzzle and a subsequent dynamic key are generated each subsequent activation of the computer system to generate a subsequent encrypted file key for preventing decryption of the clear file key to prevent access to data stored on the storage device.
3. The method of 1 wherein a unique string of information is stored on the token device and a copy of the unique string of information resides with an administrator, the unique string of information residing with the administrator enabling generation of the dynamic key.
4. The method of 3 wherein if the token device cannot be located, then the method comprising the following steps:
transmitting the puzzle to the administrator, the administrator selecting a unique string of information corresponding to the puzzle;
generating the dynamic key; and
transmitting the dynamic key to the computer system.
5. A method for installing a method of controlling access to data stored on a storage device in a computer system, the installation method comprising the following steps:
(a) coupling a token device to the computer system;
(b) activating the computer system;
(c) generating a rescue puzzle and storing the rescue puzzle in a memory of the token device;
(d) generating a clear file key responsive to generation of the rescue puzzle;
(e) transmitting the clear file key to the computer system and storing the clear file key in a memory of the computer system;
(f) encrypting data stored on the storage device with the clear file key;
(g) generating a first puzzle and storing the first puzzle on the storage device;
(h) transmitting the first puzzle to the token device, the token device generating a first dynamic key responsive to receipt of the first puzzle;
(i) transmitting the clear file key and the first dynamic key to the processor of the computer system;
(j) encrypting the clear file key with the first dynamic key to generate a first encrypted file key; and
(k) storing the first encrypted file key on the storage device.
6. The method of claim 5 wherein if data stored on the storage device becomes inaccessible then providing a method of regaining access to data stored on the storage device comprising the following steps:
(1) if the computer system is activated, first deactivating the computer system, then coupling the token device to the computer system, and if the computer system is deactivated, then coupling the token device to the computer system;
(2) activating the computer system;
(3) generating the rescue puzzle and storing the rescue puzzle in the memory of the token device;
(4) generating the clear file key responsive to generation of the rescue puzzle;
(5) transmitting the clear file key to the computer system and storing the clear file key in computer system's memory; and
(6) repeating step (f) through step (k) of claim 3 to regain access to data stored on the storage device and to reinstall the method of controlling access to data stored on a storage device in a computer system.
7. The method of 5 wherein the rescue puzzle is stored in a portion of the memory of the token device configured to maintain data when power is not supplied to the token device.
8. A method for installing a method of controlling access to data stored on a storage device in a computer system, the installation method comprising the following steps:
(a) coupling a token device to the computer system, the token device including a processor and a memory, the processor running a data encryption/decryption program;
(b) activating the computer system;
(c) generating a rescue puzzle and storing the rescue puzzle in the memory of the token device;
(d) generating a clear file key with the token device's processor responsive to the token device receiving the rescue puzzle;
(e) transmitting the clear file key to the computer system and storing the clear file key in a memory of the computer system;
(f) encrypting data stored on the storage device with the clear file key, the clear file key encrypting and decrypting data on the storage device to control access to the data;
(g) generating a first puzzle;
(h) simultaneously transmitting the first puzzle to the token device and storing the first puzzle on the storage device, the token device's processor generating a first dynamic key responsive to receipt of the first puzzle;
(i) transmitting the clear file key and the first dynamic key to a processor of the computer system; and
(j) encrypting the clear file key with the first dynamic key to generate a first encrypted file key; and
(k) storing the first encrypted file key on the storage device, the first encrypted file key preventing decryption of the clear file key to prevent access to data encrypted and decrypted by the clear file key.
9. The method of 8 wherein the rescue puzzle is stored in a portion of the memory of the token device configured to maintain data when power is not supplied to the token device.
10. A method for controlling access to data stored on a storage device in a computer system, the method comprising the following steps:
(a) installing the method on a storage device in the computer system, the installation method comprising the following steps:
(1) coupling a token device to the computer system, the token device including a processor and a memory,
(2) activating the computer system;
(3) generating a rescue puzzle and storing the rescue puzzle in the memory of the token device;
(4) generating a clear file key with the token device's processor responsive to the token device receiving the rescue puzzle;
(5) transmitting the clear file key to the computer system and storing the clear file key in a memory of the computer system;
(6) encrypting data stored on the storage device with the clear file key, the clear file key encrypting and decrypting data on the storage device to control access to the data;
(7) generating a first puzzle;
(8) simultaneously transmitting the first puzzle to the token device and storing the first puzzle on the storage device, the token device's processor generating a first dynamic key responsive to receipt of the first puzzle;
(9) transmitting the clear file key and the first dynamic key to a processor of the computer system;
(10) encrypting the clear file key with the first dynamic key to generate a first encrypted file key;
(11) storing the first encrypted file key on the storage device, the first encrypted file key preventing decryption of the clear file key to prevent access to data encrypted and decrypted by the clear file key; and
(12) allowing the computer system to complete a boot up process, whereby upon the computer system completing the boot up process access to data stored on the storage device is allowed and whereby when access to data stored on the storage device is no longer desired, the computer system is deactivated and the token device is removed from the computer system; and
(b) controlling access to data stored on a storage device in a computer system comprising the following steps:
(13) coupling the token device to the computer system;
(14) activating the computer system;
(15) reading the first puzzle stored on the storage device;
(16) transmitting the first puzzle to the token device, the token device's processor generating the first dynamic key responsive to receipt of the first puzzle;
(17) transmitting the first dynamic key to the computer system's processor;
(18) reading the first encrypted file key stored on the storage device and transmitting the first encrypted file key to the computer system's processor;
(19) decrypting the first encrypted file key using the first dynamic key to generate the clear file key;
(20) storing the clear file key in the computer system's memory, the clear file key encrypting and decrypting data stored on the storage device to control access to the data while the computer system is activated;
(21) generating a subsequent puzzle and storing the subsequent puzzle on the storage device;
(22) transmitting the subsequent puzzle to the token device, the token device generating a subsequent dynamic key responsive to receipt of the subsequent puzzle;
(23) transmitting the clear file key and the subsequent dynamic key to the computer system's processor;
(24) encrypting the clear file key with the subsequent dynamic key to generate a subsequent encrypted file key; and
(25) storing the subsequent encrypted file key on the storage device, whereby storing the subsequent encrypted file key and storing the subsequent puzzle initialize the method for a subsequent activation of the computer.
11. The method of claim 10 wherein if data stored on the storage device becomes inaccessible then providing a method of regaining access to data stored on the storage device comprising the following steps:
(a) if the computer system is activated, first deactivating the computer system, then coupling the token device to the computer system, and if the computer system is deactivated, then coupling the token device. to the computer system;
(b) activating the computer system;
(c) generating the rescue puzzle and storing the rescue puzzle in the memory of the token device;
(d) generating the clear file key responsive to generation of the rescue puzzle;
(e) transmitting the clear file key to the computer system and storing the clear file key in computer system's memory; and
(f) repeating step (10) through step (12) of claim 8 to regain access to data stored on the storage device and to reinstall the method of controlling access to data stored on a storage device in a computer system.
12. The method of 11 wherein the rescue puzzle is stored in a portion of the memory of the token device configured to maintain data when power is not supplied to the token device.
13. The method of 10 wherein a subsequent puzzle and a subsequent dynamic key are generated each subsequent activation of the computer system to generate a subsequent encrypted file key for preventing decryption of the clear file key to prevent access to data stored on the storage device.
14. The method of 10 wherein a unique string of information is stored on the token device and a copy of the unique string of information resides with an administrator, the unique string of information residing with the administrator enabling generation of the dynamic key.
15. The method of 14 wherein if the token device cannot be located, then the method comprising the following steps:
transmitting the puzzle to the administrator, the administrator selecting a unique string of information corresponding to the puzzle;
generating the dynamic key; and
transmitting the dynamic key to the computer system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/717,884 US20070162767A1 (en) | 2002-08-08 | 2007-03-13 | Method and system for controlling access to data stored on a data storage device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/215,981 US7191344B2 (en) | 2002-08-08 | 2002-08-08 | Method and system for controlling access to data stored on a data storage device |
US11/717,884 US20070162767A1 (en) | 2002-08-08 | 2007-03-13 | Method and system for controlling access to data stored on a data storage device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/215,981 Continuation US7191344B2 (en) | 2002-08-08 | 2002-08-08 | Method and system for controlling access to data stored on a data storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070162767A1 true US20070162767A1 (en) | 2007-07-12 |
Family
ID=31494983
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/215,981 Expired - Lifetime US7191344B2 (en) | 2002-08-08 | 2002-08-08 | Method and system for controlling access to data stored on a data storage device |
US11/717,884 Abandoned US20070162767A1 (en) | 2002-08-08 | 2007-03-13 | Method and system for controlling access to data stored on a data storage device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/215,981 Expired - Lifetime US7191344B2 (en) | 2002-08-08 | 2002-08-08 | Method and system for controlling access to data stored on a data storage device |
Country Status (1)
Country | Link |
---|---|
US (2) | US7191344B2 (en) |
Families Citing this family (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7113900B1 (en) * | 2000-10-24 | 2006-09-26 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
US7606898B1 (en) * | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7337323B2 (en) * | 2002-09-20 | 2008-02-26 | Safenet, Inc. | Boot-up and hard drive protection using a USB-compliant token |
US7890543B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US20040210623A1 (en) * | 2003-03-06 | 2004-10-21 | Aamer Hydrie | Virtual network topology generation |
US7689676B2 (en) * | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7590736B2 (en) * | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US7636917B2 (en) * | 2003-06-30 | 2009-12-22 | Microsoft Corporation | Network load balancing with host status information |
US7606929B2 (en) * | 2003-06-30 | 2009-10-20 | Microsoft Corporation | Network load balancing with connection manipulation |
US7681046B1 (en) | 2003-09-26 | 2010-03-16 | Andrew Morgan | System with secure cryptographic capabilities using a hardware specific digital secret |
TWI237768B (en) * | 2003-10-27 | 2005-08-11 | Inst Information Industry | Method using multiple control pipe to assist digital version management in USB storage device |
US7694151B1 (en) | 2003-11-20 | 2010-04-06 | Johnson Richard C | Architecture, system, and method for operating on encrypted and/or hidden information |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
US20050246529A1 (en) * | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US8042163B1 (en) * | 2004-05-20 | 2011-10-18 | Symatec Operating Corporation | Secure storage access using third party capability tokens |
CN1716852B (en) * | 2004-07-01 | 2010-05-05 | 谈子晨 | Formula cipher combined graph prompting interactive dynamic cipher checking mode |
US20060090083A1 (en) * | 2004-10-27 | 2006-04-27 | Kwok-Yan Leung | Data protection system |
US7475247B2 (en) * | 2004-12-16 | 2009-01-06 | International Business Machines Corporation | Method for using a portable computing device as a smart key device |
US8108693B2 (en) | 2005-04-01 | 2012-01-31 | Ged-I Ltd. | Method for data storage protection and encryption |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US20090187770A1 (en) * | 2006-02-09 | 2009-07-23 | Atmel Corporation | Data Security Including Real-Time Key Generation |
US9860055B2 (en) * | 2006-03-22 | 2018-01-02 | Synopsys, Inc. | Flexible architecture for processing of large numbers and method therefor |
CN100555939C (en) * | 2006-09-20 | 2009-10-28 | 北京飞天诚信科技有限公司 | A kind of based on network method for protecting software |
US20090077390A1 (en) * | 2007-09-14 | 2009-03-19 | Particio Lucas Cobelo | Electronic file protection system having one or more removable memory devices |
US7991949B2 (en) * | 2007-10-12 | 2011-08-02 | Microsoft Corporation | Embedded virtual media |
WO2009069326A1 (en) * | 2007-11-26 | 2009-06-04 | Co-Conv, Corp. | Network boot system |
US8005227B1 (en) * | 2007-12-27 | 2011-08-23 | Emc Corporation | Key information consistency checking in encrypting data storage system |
US8103844B2 (en) | 2008-02-01 | 2012-01-24 | Donald Rozinak Beaver | Secure direct platter access |
US20100031057A1 (en) * | 2008-02-01 | 2010-02-04 | Seagate Technology Llc | Traffic analysis resistant storage encryption using implicit and explicit data |
FR2929788B1 (en) * | 2008-04-08 | 2011-11-04 | Eads Secure Networks | SECURE USE OF TERMINAL MANAGEMENT |
US8037295B2 (en) * | 2008-04-15 | 2011-10-11 | Authenex, Inc. | Hardware-bonded credential manager method and system |
US9432342B1 (en) | 2011-03-08 | 2016-08-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US8694646B1 (en) * | 2011-03-08 | 2014-04-08 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9300637B1 (en) * | 2011-03-08 | 2016-03-29 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US11228566B1 (en) | 2011-03-08 | 2022-01-18 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9231920B1 (en) | 2011-12-13 | 2016-01-05 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9413526B1 (en) | 2011-03-08 | 2016-08-09 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9292696B1 (en) | 2011-03-08 | 2016-03-22 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9338220B1 (en) | 2011-03-08 | 2016-05-10 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9852311B1 (en) | 2011-03-08 | 2017-12-26 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US8726398B1 (en) | 2011-12-13 | 2014-05-13 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9667741B1 (en) | 2011-03-08 | 2017-05-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9356993B1 (en) | 2011-03-08 | 2016-05-31 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
KR20120129038A (en) * | 2011-05-18 | 2012-11-28 | 엘지전자 주식회사 | Display device, server, device authentication method |
CN103269483B (en) * | 2013-06-03 | 2015-09-23 | 上海众人网络安全技术有限公司 | A kind of OOAC handset token multi-mode activation system and method |
CN103269273B (en) * | 2013-06-03 | 2016-03-23 | 上海众人网络安全技术有限公司 | A kind of dynamic password login system of independent account seamless access and method |
US10152530B1 (en) | 2013-07-24 | 2018-12-11 | Symantec Corporation | Determining a recommended control point for a file system |
CN103841199B (en) * | 2014-03-10 | 2017-07-14 | 飞天诚信科技股份有限公司 | A kind of method for realizing browser countdown |
US9887978B2 (en) | 2015-06-23 | 2018-02-06 | Veritas Technologies Llc | System and method for centralized configuration and authentication |
US10757104B1 (en) | 2015-06-29 | 2020-08-25 | Veritas Technologies Llc | System and method for authentication in a computing system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4856062A (en) * | 1984-11-30 | 1989-08-08 | Kenneth Weiss | Computing and indicating device |
US5023908A (en) * | 1984-11-30 | 1991-06-11 | Kenneth Weiss | Method and apparatus for personal identification |
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5361062A (en) * | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
US5485519A (en) * | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
US6075860A (en) * | 1997-02-19 | 2000-06-13 | 3Com Corporation | Apparatus and method for authentication and encryption of a remote terminal over a wireless link |
US6351813B1 (en) * | 1996-02-09 | 2002-02-26 | Digital Privacy, Inc. | Access control/crypto system |
US6895583B1 (en) * | 2000-03-10 | 2005-05-17 | Wind River Systems, Inc. | Task control block for a computing environment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6985583B1 (en) * | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
-
2002
- 2002-08-08 US US10/215,981 patent/US7191344B2/en not_active Expired - Lifetime
-
2007
- 2007-03-13 US US11/717,884 patent/US20070162767A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4856062A (en) * | 1984-11-30 | 1989-08-08 | Kenneth Weiss | Computing and indicating device |
US5023908A (en) * | 1984-11-30 | 1991-06-11 | Kenneth Weiss | Method and apparatus for personal identification |
US5485519A (en) * | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5361062A (en) * | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
US6351813B1 (en) * | 1996-02-09 | 2002-02-26 | Digital Privacy, Inc. | Access control/crypto system |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
US6075860A (en) * | 1997-02-19 | 2000-06-13 | 3Com Corporation | Apparatus and method for authentication and encryption of a remote terminal over a wireless link |
US6895583B1 (en) * | 2000-03-10 | 2005-05-17 | Wind River Systems, Inc. | Task control block for a computing environment |
Also Published As
Publication number | Publication date |
---|---|
US20040030908A1 (en) | 2004-02-12 |
US7191344B2 (en) | 2007-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7191344B2 (en) | Method and system for controlling access to data stored on a data storage device | |
US7899186B2 (en) | Key recovery in encrypting storage devices | |
US6292899B1 (en) | Volatile key apparatus for safeguarding confidential data stored in a computer system memory | |
US6199163B1 (en) | Hard disk password lock | |
US10318750B2 (en) | Unlocking a storage device | |
US8332650B2 (en) | Systems and methods for setting and resetting a password | |
US7080260B2 (en) | System and computer based method to automatically archive and retrieve encrypted remote client data files | |
US7343493B2 (en) | Encrypted file system using TCPA | |
JP5362114B2 (en) | Secure USB storage medium generation and decoding method, and medium on which a program for generating a secure USB storage medium is recorded | |
EP1953669A2 (en) | System and method of storage device data encryption and data access via a hardware key | |
US20090210722A1 (en) | System for and method of locking and unlocking a secret using a fingerprint | |
US20060179309A1 (en) | Systems and methods for managing multiple keys for file encryption and decryption | |
JP2004201038A (en) | Data storage device, information processing apparatus mounted therewith, and data processing method and program thereof | |
US6330624B1 (en) | Access limiting to only a planar by storing a device public key only within the planar and a planar public key only within the device | |
KR20100133953A (en) | System and method for securing data | |
US20080077807A1 (en) | Computer Hard Disk Security | |
WO2007112023A2 (en) | Secure biometric processing system and method of use | |
CN110674525A (en) | Electronic equipment and file processing method thereof | |
JP2003195758A (en) | Data processor, interface board and data concealing method | |
JPH11265318A (en) | Mutual certification system, its method and recording medium | |
JP2004023122A (en) | Encryption system utilizing ic card | |
WO2007099716A1 (en) | Date communication system, and portable memory | |
US20050086528A1 (en) | Method for hiding information on a computer | |
KR20200082187A (en) | Secure usb dongle for usb memory without security | |
JP4265156B2 (en) | Information leakage prevention device and information leakage prevention method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AUTHENEX, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIN, PAUL;HON, HENRY;REEL/FRAME:019883/0813 Effective date: 20020808 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |