US Patent No: 5,717,755

Number of patents in Portfolio can not be more than 2000

Distributed cryptographic object method

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute multiple encrypted embedded objects to other individuals in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
TECSEC, INCORPORATEDVIENNA, VA42

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Shanton, M Greg Manassas, VA 7 506

Cited Art Landscape

Patent Info (Count) # Cites Year
 
LANRALD DATA MGMT. NV, LLC (2)
5,065,429 Method and apparatus for protecting material on storage media 236 1990
5,191,611 Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients 450 1991
 
TECSEC, INCORPORATED (2)
5,369,707 Secure network method and apparatus 182 1993
5,369,702 Distributed cryptographic object method 235 1993
 
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITY (2)
4,218,582 Public key cryptographic apparatus and method 501 1977
4,424,414 Exponentiation cryptographic apparatus and method 326 1978
 
Bell Telephone Laboratories, Incorporated (1)
4,984,272 Secure file handling in a computer operating system 105 1988
 
Digital Corporation (1)
5,204,961 Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols 238 1990
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (1)
4,405,829 Cryptographic communications system and method 1033 1977
 
MICRONYX, INC. (1)
4,864,616 Cryptographic labeling of electronically stored data 134 1987
 
SECURE COMPUTING CORPORATION (1)
4,713,753 Secure data processing system architecture with format control 313 1985
 
SYMANTEC CORPORATION (1)
5,052,040 Multiple user stored data cryptographic labeling system and method 197 1990
 
TEXAS INSTRUMENTS INCORPORATED (1)
4,962,533 Data protection for computer systems 84 1989
 
The Tokyo Electric Power Co., Ltd. (1)
4,955,082 Mobile communication system 83 1989

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTELLECTUAL VENTURES I LLC (33)
7,950,066 Method and system for restricting use of a clipboard application 32 2001
8,065,713 System and method for providing multi-location access management to secured items 16 2002
7,783,765 System and method for providing distributed access control to secured documents 15 2002
7,681,034 Method and apparatus for securing electronic data 28 2002
7,921,288 System and method for providing different levels of key security for controlling access to secured items 22 2002
7,631,184 System and method for imposing security on copies of secured items 26 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 28 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 31 2002
7,729,995 Managing secured files in designated locations 22 2002
7,562,232 System and method for providing manageability to security information for secured items 26 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 31 2002
8,006,280 Security system for generating keys from access rules in a decentralized manner and methods therefor 9 2002
8,176,334 Document security system that permits external users to gain access to secured files 5 2002
7,836,310 Security system that uses indirect password-based encryption 7 2002
7,921,450 Security system using indirect key generation from access rules and methods therefor 14 2002
7,890,990 Security system with staging capabilities 5 2002
7,577,838 Hybrid systems for securing digital assets 6 2002
7,930,756 Multi-level cryptographic transformations for securing digital assets 9 2003
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 20 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 19 2003
8,127,366 Method and apparatus for transitioning between states of security policies used to secure electronic documents 6 2003
7,703,140 Method and system for securing digital assets using process-driven security policies 25 2003
7,707,427 Multi-level file digests 19 2004
RE41546 Method and system for managing security tiers 10 2007
7,913,311 Methods and systems for providing access control to electronic data 17 2007
8,543,827 Methods and systems for providing access control to secured data 1 2008
RE43906 Method and apparatus for securing digital assets 1 2008
8,307,067 Protecting encrypted files transmitted over a network 56 2009
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,327,138 Method and system for securing digital assets using process-driven security policies 2 2010
8,301,896 Multi-level file digests 0 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 1 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
 
TECSEC, INCORPORATED (6)
5,898,781 Distributed cryptographic object method 61 1997
6,694,433 XML encryption scheme 13 1999
7,095,852 Cryptographic key split binder for use with tagged data elements 34 2001
7,079,653 Cryptographic key split binding process and apparatus 10 2002
8,077,870 Cryptographic key split binder for use with tagged data elements 1 2010
8,712,046 Cryptographic key split combiner 0 2012
 
INTELLECTUAL VENTURES I LLC (5)
7,380,120 Secured data format for access control 78 2002
7,260,555 Method and architecture for providing pervasive security to digital assets 63 2002
8,707,034 Method and system for using remote headers to secure electronic files 1 2003
8,613,102 Method and system for providing document retention using cryptography 3 2004
8,739,302 Method and apparatus for transitioning between states of security policies used to secure electronic documents 1 2012
 
MICROSOFT CORPORATION (4)
8,661,332 Method and apparatus for document processing 0 2004
7,392,533 System and method for management of a componentized electronic document retrievable over a network 5 2004
8,127,133 Labeling of data objects to apply and enforce policies 0 2007
8,122,350 Packages that contain pre-paginated documents 1 2008
 
INFOASSURE, INC. (3)
7,739,501 Cryptographic key construct 3 2005
7,715,565 Information-centric security 9 2005
7,711,120 Cryptographic key management 4 2005
 
PROTEGRITY CORPORATION (3)
6,321,201 Data security system for a database having multiple encryption levels applicable on a data element value level 35 1998
8,443,426 Method and system for preventing impersonation of a computer system user 1 2008
8,402,281 Data security system for a database 3 2010
 
InterTrust Technologies Corp. (2)
8,528,097 Trusted and secure techniques for item delivery and execution 0 2007
8,443,198 Trusted and secure techniques for item delivery and execution 0 2007
 
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA (2)
8,086,662 Distributed hypermedia method and system for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document 1 2006
8,082,293 Distributed hypermedia method and system for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document 0 2006
 
ADOBE SYSTEMS INCORPORATED (1)
8,176,410 System and/or method for content cropping 1 2005
 
FUJITSU LIMITED (1)
7,975,291 Network node machine and information network system 1 2007
 
LOCKHEED MARTIN CORPORATION (1)
5,991,877 Object-oriented trusted application framework 217 1997
 
PERVASIVE SECURITY SYSTEM, INC. (1)
7,921,284 Method and system for protecting electronic data in enterprise environment 14 2002
 
The United States of America as represented by the Secretary of Commerce (1)
6,023,765 Implementation of role-based access control in multi-level secure systems 165 1997