US Patent Application No: 2002/0129,261

Number of patents in Portfolio can not be more than 2000

Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A number of client systems receive a common secure transfer key pair from a server during initialization. The secure transfer private key is encrypted in the server with a platform public key sent to the server from the client system. Each client system is then able to encrypt data, using a secure transfer public key, to be recorded on a computer readable medium, and subsequently to decrypt such data using a secure transfer private key. Preferably, each client system includes an embedded security subsystem (ESS) performing cryptographic processes and providing secure key storage. Then, the secure transfer private key is stored as encrypted, and is decrypted using a private key within the ESS. Preferably, the platform private key is also stored encrypted, to be decrypted within the ESS using a hardware private key.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY40098

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Cromer, Daryl Carvis Apex, NC 196 3107
Locker, Howard Jeffrey Cary, NC 146 1846
Trotter, Andy Lloyd Raleigh, NC 20 314
Ward, James Peter Raleigh, NC 110 2482

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 4,817,140 Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor 375 1986
 
CERTCO, LLC (1)
* 5,799,086 Enhanced cryptographic system and method with key escrow feature 225 1997
 
Other [Check patent profile for assignment information] (1)
* 4,747,139 Software security method and systems 279 1986
 
EMC CORPORATION (1)
* 6,189,098 Client/server protocol for proving authenticity 317 2000
 
NOT APPLICABLE (1)
* 5,889,941 System and apparatus for smart card personalization 189 1996
 
MICROSOFT TECHNOLOGY LICENSING, LLC (1)
* 6,230,269 Distributed authentication system and method 161 1998
 
COMCAST CABLE COMMUNICATIONS, LLC (1)
* 5,787,172 Apparatus and method for establishing a cryptographic link between elements of a system 227 1994
 
Hush Communications Corporation (1)
* 6,154,543 Public key cryptosystem with roaming user capability 70 1998
 
PLANO ENCRYPTION TECHNOLOGIES LLC (1)
* 5,991,399 Method for securely distributing a conditional use private key to a trusted entity on a remote system 502 1997
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2009/0083,539 Method for Securely Creating an Endorsement Certificate in an Insecure Environment 4 2007
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (10)
* 7,890,758 Apparatus and method for generating keys in a network computing environment 1 2003
* 2004/0190,724 Apparatus and method for generating keys in a network computing environment 0 2003
* 2005/0108,528 Computer network and method for transmitting and authenticating data in the computer network 2 2003
* 7,751,568 Method for securely creating an endorsement certificate utilizing signing key pairs 7 2003
* 2005/0149,733 Method for securely creating an endorsement certificate utilizing signing key pairs 12 2003
* 2006/0210,071 Encryption of security-sensitive data 23 2005
8,495,361 Securely creating an endorsement certificate in an insecure environment 0 2007
8,200,972 Encryption of security-sensitive data by re-using a connection 0 2010
* 2011/0055,563 ENCRYPTION OF SECURITY-SENSITIVE DATA BY RE-USING A CONNECTION 3 2010
9,111,123 Firmware for protecting data from software threats 0 2013
 
FELICA NETWORKS, INC. (2)
* 7,882,208 Information management apparatus, information management method, and program for managing an integrated circuit 0 2005
* 2006/0101,136 Information management apparatus, information management method, and program 15 2005
 
LENOVO PC INTERNATIONAL (1)
* 8,024,579 Authenticating suspect data using key tables 2 2006
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
* 2005/0015,602 Method and apparatus for passing data securely between parties 1 2004
 
DynaSig Corporation (1)
* 2009/0060,183 PRIVATE LOCK INFRASTRUCTURE 1 2008
 
NOKIA TECHNOLOGIES OY (2)
* 9,032,215 Management of access control in wireless networks 0 2005
* 2006/0288,227 Management of access control in wireless networks 8 2005
 
PFU LIMITED (1)
* 2010/0316,222 IMAGE PROCESSING SYSTEM 2 2010
 
FUJI XEROX CO., LTD. (2)
* 7,770,026 Document management system, information processing device and method, and computer program 1 2005
* 2006/0190,742 Document management system, information processing device and method, and computer program 3 2005
 
NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNO (2)
* 7,565,554 Method and system for a service process to provide a service to a client 58 2002
* 2004/0221,045 Method and system for a service process to provide a service to a client 24 2004
 
NXP B.V. (2)
* 7,925,892 Method to grant modification rights for a smart card 1 2004
* 2006/0280,299 Method to grant modification rights for a smart card 5 2004
 
INTEL CORPORATION (5)
* 7,318,235 Attestation using both fixed token and portable token 18 2002
* 2004/0117,625 Attestation using both fixed token and portable token 8 2002
7,809,957 Trusted platform module for generating sealed data 7 2005
8,885,819 Fuse attestation to secure the provisioning of secret keys during integrated circuit manufacturing 0 2012
8,938,792 Device authentication using a physically unclonable functions based key generation system 0 2012
 
SPYRUS, INC. (2)
* 2008/0263,363 Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption 87 2008
9,049,010 Portable data encryption device with configurable security functionality and method for file encryption 31 2012
 
MICROSOFT TECHNOLOGY LICENSING, LLC (6)
* 8,284,942 Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store 2 2004
* 2006/0059,350 Strong names 4 2004
* 7,562,395 System and method for accessing protected content in a rights-management architecture 2 2005
* 2005/0188,228 System and method for accessing protected content in a rights-management architecture 11 2005
8,032,943 Accessing protected content in a rights-management architecture 5 2009
* 2009/0293,116 Accessing Protected Content In A Rights-Management Architecture 32 2009
 
BROADCOM CORPORATION (2)
* 8,826,039 Apparatus and method for providing hardware security 0 2010
* 2011/0191,599 Apparatus and method for providing hardware security 7 2010
 
Condel International Technologies Inc. (1)
* 2012/0042,173 Digital Content and Right Object Management Systems and Methods 2 2010
 
SAFENET, INC. (1)
* 2006/0149,962 Network attached encryption 19 2003
 
CANON KABUSHIKI KAISHA (1)
* 2004/0186,997 Encrypted data sharing system and encrypted data sharing method 6 2004
* Cited By Examiner