US20020184511A1 - Secure accounting and operational control reporting system - Google Patents

Secure accounting and operational control reporting system Download PDF

Info

Publication number
US20020184511A1
US20020184511A1 US10/194,742 US19474202A US2002184511A1 US 20020184511 A1 US20020184511 A1 US 20020184511A1 US 19474202 A US19474202 A US 19474202A US 2002184511 A1 US2002184511 A1 US 2002184511A1
Authority
US
United States
Prior art keywords
article
manufacture
encrypted
sample
environmental data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/194,742
Inventor
James Kolouch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=31190488&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20020184511(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Priority to US10/194,742 priority Critical patent/US20020184511A1/en
Publication of US20020184511A1 publication Critical patent/US20020184511A1/en
Priority to US13/189,362 priority patent/US20120204036A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface

Definitions

  • cryptographic systems are used to prevent unauthorized disclosure of information during transmission and/or storage of data.
  • the process of encryption involves the manipulation of data so that it is unreadable, in effect making the content inaccessible, to an unauthorized entity.
  • the process of decryption involves the manipulation of encrypted data so as to recreate the original scheduled condition of the data, or to transform the encrypted data into readable data that corresponds to the original unencrypted data.
  • Secrecy is not the only advantage provided by encryption.
  • the process of encryption ensures data integrity, as encrypted data that has been modified does not decrypt properly unless the proper, that is, authorized, procedures are followed. It is the integrity property provided by encryption that is used by the present invention, as well as its security properties.
  • An original paper document carries a degree of presumption of authenticity that cannot currently be attributed to an electronic file. Changes can be virtually impossible to detect in the electronic world.
  • electronic data interchange a company uses computers, computer programs, and transmission links to automatically transact business with customers and suppliers.
  • image processing systems documents are scanned and converted to digital images. The original documents may not be retained. Some electronic information may exist for only a short time and may not be retrievable if files are updated and backup files do not exist.
  • a company may have many information and control systems.
  • a system is the entire combination, or a logical sub-part, of tangible and intangible elements that, acting together, protect assets and provide reliable data, or the assurance thereof.
  • the tangible part of the system includes, but is not limited to, paper documents and the markings and signatures made thereon, as well as the physical processes and procedures used to safeguard assets.
  • System intangibles include policies and procedures providing instructions and structure to the business process.
  • Management and other interested parties must determine that policies, procedures, and instructions are carried out to a sufficient degree in a timely fashion.
  • Information and control systems provide this assurance.
  • Authorized recipients review information and control systems to determine if the design of each meets stated objectives. They also review the synergistic effect of all relevant systems to determine their overall effectiveness. If the sum of all system designs are deemed to be effective in producing stated objectives, authorized recipients then must perform tests of these systems in order to prove the systems actually exist and are functioning as represented by management.
  • Tests include those steps necessary to verify that stated control elements exist and are functioning as intended. Tests also include the examination of particular transactions to provide operational assurance on a statistical basis.
  • the tests of both controls and transactions may include the examination of documents produced both within the company and by outside entities. For some audit objectives, such as confirmation of balances, activities, agreements, etc., evidence will be obtained from parties independent of the company.
  • the authorized recipient's goal is to reduce to an acceptable level the risk of not discovering a material misstatement or system control deficiency. If an authorized recipient cannot reduce detection risk to an acceptable level, it may be impossible to render an unqualified opinion.
  • An objective of the present invention is to use encryption and encrypted objects to record and authenticate inputs, processes, scheduled conditions, and virtual environments of electronic accounting and operational systems, and to provide a means to distribute these encrypted objects to designated locations for access by designated individuals or entities.
  • Inputs in this context can be any individual action or sum of actions having any effect on a control or accounting system.
  • Outputs in this context can be the result of any process or action of a control or accounting system.
  • These actions may be transactional in nature, directly entered by a human being as the first electronically recorded action, or may be a result of computations within the system, or may be passed to the system by another system.
  • FIG. 1 is a flow diagram of a system using encryption as a tool for checking the integrity of a process
  • FIG. 2 is a flow diagram showing encryption used in an output context
  • FIG. 3 shows a process by which selected process elements provided as inputs to the process are manipulated
  • FIG. 4 shows how scheduled conditions may be sampled in a system
  • FIG. 5 shows virtual environmental data collected and embedded within an encrypted object
  • FIG. 6 is a flow diagram showing use of XML to identify, copy, and encrypt input objects in a SAOCRS;
  • FIG. 7 is a flow diagram showing use of XML to identify, copy, and encrypt copied output objects in a SAOCRS.
  • FIG. 8 is a flow diagram showing use of XML to identify, copy and encrypt copied objects in a SAOCRS that in their entirety present a scheduled condition check.
  • FIG. 1 is a flow diagram of a system using encryption as a tool for checking the integrity of a process.
  • An input 2 is provided to a system, which is intended to be manipulated by a process 4 . However, this input 2 first undergoes a copy process 6 to provide identical inputs 8 and 10 .
  • the input 8 is passed on to be processed 4 , while the input 10 is encrypted by an encryption process 12 .
  • the result of the encryption process 12 is an encrypted copy input 14 .
  • An authorized recipient will consider this encrypted copy input 14 to be reliable, due to the integrity provided by the encryption process 12 .
  • FIG. 2 shows encryption used in an output context.
  • a process 16 of the system produces an output 18 .
  • This output undergoes a copy process to produce two identical outputs 22 and 24 .
  • the output 22 continues to its normal destination as determined by the functionality of the system.
  • the output 24 is provided to an encryption process 26 , which manipulates the output 24 to generate an encrypted copy output 28 .
  • An authorized recipient will consider this encrypted copy output 28 to be reliable, due to the integrity provided by the encryption process 26 .
  • Processes in this context are the manipulation of data according to a set of defined procedures in order to produce a desired result.
  • the result of a process may be used as an input to another process, either within or outside the subsystem, or may be for use outside of the electronic system, such as for display on a screen or other presentation device for direct human use.
  • FIG. 3 shows a process 32 by which selected process elements 30 , provided as inputs to the process 32 , are manipulated.
  • the process 32 may be sampled and encrypted by the encryption module 36 to provide an encrypted output 38 .
  • an authorized recipient examining a decrypted version of the encrypted output 38 would have a high level of confidence in the reliability of the process sample due to the integrity provided by the encryption module 36 .
  • Scheduled conditions in this context are the status of all or designated processes, registers, and other conditions within a system at specific times. A review of chronological records of this status information provides evidence of how the system functioned during a specific time period.
  • FIG. 4 shows how scheduled conditions may be sampled in a system, so that they may be encrypted to provide a secure, reliable “snapshot” of the system at particular points in time.
  • selected balances, status, and other processes are sampled at different points in time 42 , 44 , 46 .
  • the processes 40 were sampled to provide a reading of the scheduled condition of the system at that point in time 42 .
  • This scheduled condition sample was then encrypted to provide a characteristic encrypted output 43 at the first selected point in time 42 .
  • the processes 40 were sampled to provide a reading of the scheduled condition of the system at that point in time 44 .
  • This scheduled condition sample was then encrypted to provide a second characteristic encrypted output 46 at the second selected point in time 44 .
  • the processes 40 are sampled to provide a reading of the present scheduled condition of the system.
  • This scheduled condition sample is then encrypted to provide a characteristic encrypted output 47 of the present scheduled condition of the system. Future samples may be taken and encrypted outputs generated.
  • an authorized recipient examining a decrypted version of the encrypted outputs 43 , 45 , 47 would have a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.
  • Virtual environments in this context are the conditions and influences that were present in the system at the time of encryption.
  • virtual environmental information in the scope of encryption, the nature and effect of all influences on encrypted objects can be recorded and analyzed.
  • Virtual environmental information would include, but not be limited to, such things as the order of processing as compared to similar or other items; preprocessing of data, such as data. conversion and reformatting; status of other active processes or threads; operating system control information; identity of users logged on; network monitoring information; and other active control processes.
  • FIG. 5 shows how virtual environmental data 50 may be collected and embedded within an encrypted object 52 .
  • Other related unencrypted objects 54 may also be embedded within the same encrypted object 52 , as may be another encrypted object 56 .
  • the collected virtual environment data 50 may be encrypted prior to being embedded within the encrypted object 52
  • the inner encrypted object 56 may contain other encrypted and/or unencrypted objects.
  • An authorized recipient examining an extracted virtual environment data object would have a high level of confidence in the reliability of the corresponding data due to the integrity provided by the encryption process used to create the container for the object.
  • the system can be viewed as an encryption process used to protect and control related objects, or it can be viewed as an audit and control tool to ensure the integrity of the process.
  • a process such as XML, extends management flow control ability over objects within or retrieved from databases.
  • XML Extensible Markup Language
  • XML is a method that is used to structure and describe data so that it can be understood by different software applications, including database and electronic commerce applications.
  • XML uses tags to label data objects as to meaning, preferably using a specific common industry-wide convention, so that software applications with different purposes and created by different vendors can pass data objects between and among them without the need to restructure the data.
  • XML allows applications to use tagged data objects for input.
  • XML can be used for information that is transferred from one application to another.
  • Applications include, but are not limited to, business transactions, financial statements, purchase orders, product catalogs, medical histories, database retrieval, etc.
  • XML tags are used by application, and perhaps operating system, software to identify accounting and operational control system objects.
  • Secure accounting and operational control and reporting system (SAOCRS) application software examines selected tagged data objects and, if appropriate, encrypts a copy of the tagged object or groups of objects.
  • encrypted objects may be embedded within other objects, encrypted or otherwise, to provide an access hierarchy for users of a system, as described in U.S. Pat. No. 5,369,702 to Shanton.
  • XML labels may be directly related to or may be grouped or converted in order to relate to referenced process.
  • the encrypted objects are then either passed directly on a real-time basis to authorized recipients for immediate decryption and further processing, or they are stored and forwarded at a later time.
  • FIG. 6 is a flow diagram showing use of XML to identify, copy, and encrypt input objects in a SAOCRS.
  • input objects 600 may or may not be related to XML tags; if so, the XML-tagged input objects 601 are provided directly to the selection and copy process 603 .
  • an XML object-tagging application 602 applies appropriate XML tags to the input objects 600 .
  • the SAOCRS 604 using XML tags to identify object attributes, selects certain objects 605 according to control requirements and causes identical copies to be made.
  • Original tagged input objects 606 are allowed to pass to their intended processes 607 .
  • the XML tags of each copy of selected input objects 605 are related 608 to labels within the encrypted access hierarchy 609 to determine the appropriate role-based access label or labels to be used to encrypt each object.
  • Role-based labels are descriptors of a type or category of access, rather than the identity of a particular person or device allowed access.
  • Each input object copy is encrypted 610 and passed to or stored 611 for appropriate persons, devices, or other systems, including other SAOCRSs.
  • FIG. 7 is a flow diagram showing use of XML to identify, copy, and encrypt copied output objects in a SAOCRS.
  • output objects 704 of a process 700 , 701 may or may not be related to XML tags; if so, the XML-tagged output objects 702 are provided directly to the selection and copy process 703 .
  • an XML object-tagging application 705 applies appropriate XML tags to output objects 704 .
  • the SAOCRS 706 using XML tags to identify object attributes, selects certain objects 707 according to control requirements and causes identical copies to be made.
  • Original tagged output objects 708 are allowed to pass to their intended processes 709 .
  • the XML tags of each copy of selected output objects 707 are related 711 to labels within the encrypted access hierarchy 710 to determine the appropriate role-based label or labels to be used to encrypt 712 each object.
  • Each output object copy is encrypted 713 and passed to or stored 714 for appropriate persons, devices, or other systems, including other SAOCRSs.
  • FIG. 8 is a flow diagram showing use of XML to identify, copy, and encrypt copied objects in a SAOCRS that in their entirety present a scheduled condition check.
  • the SAOCRS from time to time as required, selects input and output objects 800 - 805 that, when considered in their entirety, fairly represent the condition of a system and in turn assist in affirming the veracity of objects that form the basis for operational or audit activity.
  • Selected objects 800 - 805 may or may not have related XML tags that assist in object selection. They each may be either an input or an output of one of multiple separate processes. They may be encrypted input and output objects from other SAOCRSs.
  • the SAOCRS 806 where possible using XML tags to identify objects attributes, selects certain objects according to control requirements and causes identical copies to be made 807 .
  • Original objects 808 are allowed to pass to their intended processes 809 .
  • the XML tags of each copy 810 of a selected object are related to labels 811 within the encrypted access hierarchy to determine the appropriate role-based label or labels to be used to encrypt 812 each object 810 .
  • Each selected object 810 without XML tags is related to labels 811 within the encrypted access hierarchy to determine the appropriate role-based label or labels to be used to encrypt 812 each object.
  • the SAOCRS 806 determines the appropriate label or labels 811 to be used to encrypt 814 all objects within one overall object 813 .
  • This inclusive encrypted object 814 containing encrypted objects verifying the system condition, is then passed to or stored 815 for appropriate persons, devices, or other systems, including other SAOCRSs.

Abstract

A secure accounting and operational method, whereby process elements are provided to a process, selected process elements are manipulated, a scheduled condition of the process is sampled at a predetermined point in the process, and the process sample is encrypted to provide an encrypted output. As a result, an authorized recipient has a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.

Description

    CROSS-REFERENCE TO RELATED DOCUMENTS
  • This is a continuation of U.S. patent application Ser. No. 09/421,293, which was a continuation-in-part of U.S. patent application Ser. No. 09/0741649, filed on May 8, 1998, now abandoned, which in turn claimed priority under 35 U.S.C. §119 of U.S. provisional patent application ser. No. 09/045,935, filed on May 8, 1997.[0001]
  • FIELD OF THE INVENTION
  • Generally, cryptographic systems are used to prevent unauthorized disclosure of information during transmission and/or storage of data. The process of encryption involves the manipulation of data so that it is unreadable, in effect making the content inaccessible, to an unauthorized entity. The process of decryption involves the manipulation of encrypted data so as to recreate the original scheduled condition of the data, or to transform the encrypted data into readable data that corresponds to the original unencrypted data. Secrecy is not the only advantage provided by encryption. The process of encryption ensures data integrity, as encrypted data that has been modified does not decrypt properly unless the proper, that is, authorized, procedures are followed. It is the integrity property provided by encryption that is used by the present invention, as well as its security properties. [0002]
  • BACKGROUND OF THE INVENTION
  • The corporate world used to depend solely on paper to operate. Hard copy documents were used to provide corporate governance, settle disputes at law, and formed the basis for audits by tax and regulatory authorities, internal authorized recipients, and independent accountants. In many instances, this is no longer the case. As business moves to electronic operational and accounting systems, hard copy documents in many cases either do not exist or are merely incidental to electronic records. This lack of hard copy affects the ability of management and other interested parties to manage and audit corporate systems. [0003]
  • An original paper document carries a degree of presumption of authenticity that cannot currently be attributed to an electronic file. Changes can be virtually impossible to detect in the electronic world. With electronic data interchange, a company uses computers, computer programs, and transmission links to automatically transact business with customers and suppliers. With image processing systems, documents are scanned and converted to digital images. The original documents may not be retained. Some electronic information may exist for only a short time and may not be retrievable if files are updated and backup files do not exist. [0004]
  • A company may have many information and control systems. In this context, a system is the entire combination, or a logical sub-part, of tangible and intangible elements that, acting together, protect assets and provide reliable data, or the assurance thereof. The tangible part of the system includes, but is not limited to, paper documents and the markings and signatures made thereon, as well as the physical processes and procedures used to safeguard assets. System intangibles include policies and procedures providing instructions and structure to the business process. [0005]
  • Management and other interested parties must determine that policies, procedures, and instructions are carried out to a sufficient degree in a timely fashion. Information and control systems provide this assurance. Authorized recipients review information and control systems to determine if the design of each meets stated objectives. They also review the synergistic effect of all relevant systems to determine their overall effectiveness. If the sum of all system designs are deemed to be effective in producing stated objectives, authorized recipients then must perform tests of these systems in order to prove the systems actually exist and are functioning as represented by management. [0006]
  • Based on the volume of information involved, authorized recipients and others reviewing corporate activities cannot directly examine all activities and data produced by a company. They must devise tests for evaluating the activities and data that they can directly examine, in order to provide a reliable indication of the overall well-being of the corporation. The nature, timing, and extent of these tests are based on professional judgment. Tests include those steps necessary to verify that stated control elements exist and are functioning as intended. Tests also include the examination of particular transactions to provide operational assurance on a statistical basis. [0007]
  • The tests of both controls and transactions may include the examination of documents produced both within the company and by outside entities. For some audit objectives, such as confirmation of balances, activities, agreements, etc., evidence will be obtained from parties independent of the company. The authorized recipient's goal is to reduce to an acceptable level the risk of not discovering a material misstatement or system control deficiency. If an authorized recipient cannot reduce detection risk to an acceptable level, it may be impossible to render an unqualified opinion. [0008]
  • As more businesses adopt electronic systems and interact electronically with vendors, and customers, the ability to reliably audit both controls and transactions is greatly diminished, perhaps, in some cases, to the point that serious adverse control and audit consequences will become common. [0009]
  • SUMMARY OF THE INVENTION
  • An objective of the present invention is to use encryption and encrypted objects to record and authenticate inputs, processes, scheduled conditions, and virtual environments of electronic accounting and operational systems, and to provide a means to distribute these encrypted objects to designated locations for access by designated individuals or entities. [0010]
  • Inputs in this context can be any individual action or sum of actions having any effect on a control or accounting system. Outputs in this context can be the result of any process or action of a control or accounting system. These actions may be transactional in nature, directly entered by a human being as the first electronically recorded action, or may be a result of computations within the system, or may be passed to the system by another system.[0011]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a flow diagram of a system using encryption as a tool for checking the integrity of a process; [0012]
  • FIG. 2 is a flow diagram showing encryption used in an output context; [0013]
  • FIG. 3 shows a process by which selected process elements provided as inputs to the process are manipulated; [0014]
  • FIG. 4 shows how scheduled conditions may be sampled in a system; [0015]
  • FIG. 5 shows virtual environmental data collected and embedded within an encrypted object; [0016]
  • FIG. 6 is a flow diagram showing use of XML to identify, copy, and encrypt input objects in a SAOCRS; [0017]
  • FIG. 7 is a flow diagram showing use of XML to identify, copy, and encrypt copied output objects in a SAOCRS; and [0018]
  • FIG. 8 is a flow diagram showing use of XML to identify, copy and encrypt copied objects in a SAOCRS that in their entirety present a scheduled condition check.[0019]
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 is a flow diagram of a system using encryption as a tool for checking the integrity of a process. An [0020] input 2 is provided to a system, which is intended to be manipulated by a process 4. However, this input 2 first undergoes a copy process 6 to provide identical inputs 8 and 10. The input 8 is passed on to be processed 4, while the input 10 is encrypted by an encryption process 12. The result of the encryption process 12 is an encrypted copy input 14. An authorized recipient will consider this encrypted copy input 14 to be reliable, due to the integrity provided by the encryption process 12.
  • Similarly, FIG. 2 shows encryption used in an output context. A [0021] process 16 of the system produces an output 18. This output undergoes a copy process to produce two identical outputs 22 and 24. The output 22 continues to its normal destination as determined by the functionality of the system. The output 24 is provided to an encryption process 26, which manipulates the output 24 to generate an encrypted copy output 28. An authorized recipient will consider this encrypted copy output 28 to be reliable, due to the integrity provided by the encryption process 26.
  • Processes in this context are the manipulation of data according to a set of defined procedures in order to produce a desired result. The result of a process may be used as an input to another process, either within or outside the subsystem, or may be for use outside of the electronic system, such as for display on a screen or other presentation device for direct human use. [0022]
  • For example, FIG. 3 shows a [0023] process 32 by which selected process elements 30, provided as inputs to the process 32, are manipulated. At a predetermined point 34 in the process 32, the process 32 may be sampled and encrypted by the encryption module 36 to provide an encrypted output 38. Thus, an authorized recipient examining a decrypted version of the encrypted output 38 would have a high level of confidence in the reliability of the process sample due to the integrity provided by the encryption module 36.
  • Scheduled conditions in this context are the status of all or designated processes, registers, and other conditions within a system at specific times. A review of chronological records of this status information provides evidence of how the system functioned during a specific time period. [0024]
  • For example, FIG. 4 shows how scheduled conditions may be sampled in a system, so that they may be encrypted to provide a secure, reliable “snapshot” of the system at particular points in time. As the system operates, selected balances, status, and other processes are sampled at different points in [0025] time 42, 44, 46. As shown, at a first point in time 42, the processes 40 were sampled to provide a reading of the scheduled condition of the system at that point in time 42. This scheduled condition sample was then encrypted to provide a characteristic encrypted output 43 at the first selected point in time 42. Likewise, at a second point in time 44, the processes 40 were sampled to provide a reading of the scheduled condition of the system at that point in time 44. This scheduled condition sample was then encrypted to provide a second characteristic encrypted output 46 at the second selected point in time 44. Finally, at the present time 46, the processes 40 are sampled to provide a reading of the present scheduled condition of the system. This scheduled condition sample is then encrypted to provide a characteristic encrypted output 47 of the present scheduled condition of the system. Future samples may be taken and encrypted outputs generated. Thus, an authorized recipient examining a decrypted version of the encrypted outputs 43, 45,47 would have a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.
  • Virtual environments in this context are the conditions and influences that were present in the system at the time of encryption. By including virtual environmental information in the scope of encryption, the nature and effect of all influences on encrypted objects can be recorded and analyzed. Virtual environmental information would include, but not be limited to, such things as the order of processing as compared to similar or other items; preprocessing of data, such as data. conversion and reformatting; status of other active processes or threads; operating system control information; identity of users logged on; network monitoring information; and other active control processes. [0026]
  • By bonding virtual environmental information to selected data objects with encryption, not only is the integrity of the data object assured, but also the nature and extent of the environment that produced the object can be verified. Further, encrypted objects may be embedded within other objects, encrypted or otherwise, to provide an access hierarchy for users of a system, as described in U.S. Pat. No. 5,369,702 to Shanton. Encrypted objects within the context of the present invention provide verification of the electronic control hierarchy for management and other parties. [0027]
  • FIG. 5 shows how virtual [0028] environmental data 50 may be collected and embedded within an encrypted object 52. Other related unencrypted objects 54 may also be embedded within the same encrypted object 52, as may be another encrypted object 56. Of course, the collected virtual environment data 50 may be encrypted prior to being embedded within the encrypted object 52, and the inner encrypted object 56 may contain other encrypted and/or unencrypted objects. An authorized recipient examining an extracted virtual environment data object would have a high level of confidence in the reliability of the corresponding data due to the integrity provided by the encryption process used to create the container for the object.
  • Management, taxing jurisdictions, regulatory authorities, internal authorized recipients, independent accountants, and other parties, can use these features to monitor and audit control systems, as well as the interaction of control systems—a significant benefit as business moves to an electronic world. With this technology, control systems that allow for substantive procedures can provide evidence that other control systems are operating as designed. [0029]
  • Thus, the system can be viewed as an encryption process used to protect and control related objects, or it can be viewed as an audit and control tool to ensure the integrity of the process. A process, such as XML, extends management flow control ability over objects within or retrieved from databases. [0030]
  • The invention will now be described in terms of a particular process, that is, the Extensible Markup Language (XML), for ease of explanation. It is important to note, however, that the invention is not limited to use of this exemplary process, and is intended to be used as broadly as described elsewhere herein. XML is a method that is used to structure and describe data so that it can be understood by different software applications, including database and electronic commerce applications. XML uses tags to label data objects as to meaning, preferably using a specific common industry-wide convention, so that software applications with different purposes and created by different vendors can pass data objects between and among them without the need to restructure the data. XML allows applications to use tagged data objects for input. [0031]
  • XML can be used for information that is transferred from one application to another. Applications include, but are not limited to, business transactions, financial statements, purchase orders, product catalogs, medical histories, database retrieval, etc. [0032]
  • In this example, XML tags are used by application, and perhaps operating system, software to identify accounting and operational control system objects. Secure accounting and operational control and reporting system (SAOCRS) application software examines selected tagged data objects and, if appropriate, encrypts a copy of the tagged object or groups of objects. Further, encrypted objects may be embedded within other objects, encrypted or otherwise, to provide an access hierarchy for users of a system, as described in U.S. Pat. No. 5,369,702 to Shanton. XML labels may be directly related to or may be grouped or converted in order to relate to referenced process. [0033]
  • The encrypted objects are then either passed directly on a real-time basis to authorized recipients for immediate decryption and further processing, or they are stored and forwarded at a later time. [0034]
  • FIG. 6 is a flow diagram showing use of XML to identify, copy, and encrypt input objects in a SAOCRS. Initially, input objects [0035] 600 may or may not be related to XML tags; if so, the XML-tagged input objects 601 are provided directly to the selection and copy process 603. If required, an XML object-tagging application 602 applies appropriate XML tags to the input objects 600. The SAOCRS 604, using XML tags to identify object attributes, selects certain objects 605 according to control requirements and causes identical copies to be made. Original tagged input objects 606 are allowed to pass to their intended processes 607.
  • Within the [0036] SAOCRS 604, the XML tags of each copy of selected input objects 605 are related 608 to labels within the encrypted access hierarchy 609 to determine the appropriate role-based access label or labels to be used to encrypt each object. Role-based labels are descriptors of a type or category of access, rather than the identity of a particular person or device allowed access. Each input object copy is encrypted 610 and passed to or stored 611 for appropriate persons, devices, or other systems, including other SAOCRSs.
  • FIG. 7 is a flow diagram showing use of XML to identify, copy, and encrypt copied output objects in a SAOCRS. Initially, output objects [0037] 704 of a process 700, 701 may or may not be related to XML tags; if so, the XML-tagged output objects 702 are provided directly to the selection and copy process 703. If required, an XML object-tagging application 705 applies appropriate XML tags to output objects 704. The SAOCRS 706, using XML tags to identify object attributes, selects certain objects 707 according to control requirements and causes identical copies to be made. Original tagged output objects 708 are allowed to pass to their intended processes 709.
  • Within the [0038] SAOCRS 706, the XML tags of each copy of selected output objects 707 are related 711 to labels within the encrypted access hierarchy 710 to determine the appropriate role-based label or labels to be used to encrypt 712 each object. Each output object copy is encrypted 713 and passed to or stored 714 for appropriate persons, devices, or other systems, including other SAOCRSs.
  • FIG. 8 is a flow diagram showing use of XML to identify, copy, and encrypt copied objects in a SAOCRS that in their entirety present a scheduled condition check. The SAOCRS, from time to time as required, selects input and output objects [0039] 800-805 that, when considered in their entirety, fairly represent the condition of a system and in turn assist in affirming the veracity of objects that form the basis for operational or audit activity.
  • Selected objects [0040] 800-805 may or may not have related XML tags that assist in object selection. They each may be either an input or an output of one of multiple separate processes. They may be encrypted input and output objects from other SAOCRSs.
  • The [0041] SAOCRS 806, where possible using XML tags to identify objects attributes, selects certain objects according to control requirements and causes identical copies to be made 807. Original objects 808 are allowed to pass to their intended processes 809.
  • Within the [0042] SAOCRS 806, the XML tags of each copy 810 of a selected object are related to labels 811 within the encrypted access hierarchy to determine the appropriate role-based label or labels to be used to encrypt 812 each object 810. Each selected object 810 without XML tags is related to labels 811 within the encrypted access hierarchy to determine the appropriate role-based label or labels to be used to encrypt 812 each object. Based on the labels 811 used to encrypt 812 each set of objects 810, the SAOCRS 806 determines the appropriate label or labels 811 to be used to encrypt 814 all objects within one overall object 813. This inclusive encrypted object 814, containing encrypted objects verifying the system condition, is then passed to or stored 815 for appropriate persons, devices, or other systems, including other SAOCRSs.

Claims (94)

What is claimed is:
1. A method, comprising:
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample;
encrypting the process sample;
storing the encrypted process sample; and
subsequently validating reliability of the process, said validating comprising
sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process,
decrypting the stored encrypted process sample,
comparing the current process sample to the decrypted stored process sample, and
making a validation determination consistent with a result of the comparison.
2. The method of claim 1, wherein the at least one process element is a process input.
3. The method of claim 1, wherein the at least one process element is a process output.
4. The method of claim 1, further comprising collecting environmental data related to the process sample.
5. The method of claim 4, wherein encrypting the process sample includes encrypting the environmental data related to the process sample.
6. The method of claim 5, wherein encrypting the process sample includes encrypting the environmental data and embedding the encrypted environmental data within the encrypted related process sample.
7. The method of claim 6, further comprising decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
8. The method of claim 4, wherein encrypting the process sample includes encrypting the environmental data with the related process sample.
9. The method of claim 8, further comprising decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
10. The method of claim 4, wherein encrypting the process sample includes embedding the environmental data within the encrypted related process sample.
11. The method of claim 10, further comprising verifying the environmental data, before decrypting the stored encrypted process sample.
12. The method of claim 1, further comprising manipulating at least one of the at least one process element.
13. The method of claim 1, further comprising tagging at least one of the at least one process element.
14. The method of claim 1, wherein the process interacts with formatted data comprising at least one object having an associated tag.
15. The method of claim 1, wherein at least two process elements are provided to the process.
16. The method of claim 1, wherein the current scheduled condition of the process is sampled at the first predetermined point in the process.
17. The method of claim 1, wherein the current scheduled condition of the process is sampled at the second predetermined point in the process.
18. The method of claim 1, wherein sampling the first scheduled condition comprises sampling a selected process element.
19. The method of claim 1, wherein the first predetermined point occurs before execution of the process is initiated.
20. The method of claim 1, wherein the first predetermined point occurs after execution of the process is initiated.
21. The method of claim 1, wherein the first predetermined point occurs as execution of the process is initiated.
22. A method, comprising:
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample, wherein the first scheduled condition involves a selected process element;
relating an element tag associated with the selected process element to at least one cryptographic label;
encrypting the process sample consistent with the at least one cryptographic label;
storing the encrypted process sample and the element tag; and
subsequently validating reliability of the process, said validating comprising
sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process,
decrypting the stored encrypted process sample consistent with the at least one cryptographic label,
comparing the current process sample to the decrypted stored process sample, and
making a validation determination consistent with a result of the comparison.
23. The method of claim 22, wherein the at least one process element is a process input.
24. The method of claim 22, wherein the at least one process element is a process output.
25. The method of claim 22, further comprising collecting environmental data related to the process sample.
26. The method of claim 25, wherein encrypting the process sample includes encrypting the environmental data.
27. The method of claim 26, wherein encrypting the process sample includes encrypting the environmental data and embedding the encrypted environmental data within the encrypted related process sample.
28. The method of claim 27, further comprising decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
29. The method of claim 25, wherein encrypting the process sample includes encrypting the environmental data with the related process sample.
30. The method of claim 29, further comprising decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
31. The method of claim 25, wherein encrypting the process sample includes embedding the environmental data within the encrypted related process sample.
32. The method of claim 31, further comprising verifying the environmental data, before decrypting the stored encrypted process sample.
33. The method of claim 25, further comprising manipulating at least one of the at least one process element.
34. The method of claim 22, further comprising tagging at least one of the at least one process element.
35. The method of claim 22, wherein the process interacts with formatted data comprising at least one object having an associated object tag.
36. The method of claim 22, wherein at least two process elements are provided to the process.
37. The method of claim 22, wherein the current scheduled condition of the process is sampled at the first predetermined point in the process.
38. The method of claim 22, wherein the current scheduled condition of the process is sampled at the second predetermined point in the process.
39. The method of claim 22, wherein the element tag includes an attribute.
40. The method of claim 22, wherein the first predetermined point occurs before execution of the process is initiated.
41. The method of claim 22, wherein the first predetermined point occurs after execution of the process is initiated.
42. The method of claim 22, wherein the first predetermined point occurs as execution of the process is initiated.
43. The method of claim 22, wherein the at least one cryptographic label is a role-based cryptographic label.
44. A method, comprising:
providing, consistent with a data format, at least one object relating to a process;
selecting, from the at least one object, a first object, consistent with an object tag associated therewith;
referencing at least one cryptographic label consistent with the object tag;
encrypting at least a portion of the first object consistent with the at least one cryptographic label; and
storing the encrypted at least a portion of the first object and the object tag for subsequent use by an intended recipient.
45. The method of claim 44, wherein the at least one cryptographic label is a role-based cryptographic label.
46. The method of claim 44, wherein the object tag includes an attribute.
47. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample;
encrypting the process sample;
storing the encrypted process sample; and
subsequently validating functionality of the process, said validating comprising
sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process;
decrypting the stored encrypted process sample;
comparing the current process sample to the decrypted stored process sample; and
making a validation determination consistent with a result of the comparison.
48. The article of manufacture of claim 47, wherein the at least one process element is a process input.
49. The article of manufacture of claim 47, wherein the at least one process element is a process output.
50. The article of manufacture of claim 47, wherein the method further comprises collecting environmental data related to the process sample.
51. The article of manufacture of claim 50, wherein encrypting the process sample includes encrypting the environmental data related to the process sample.
52. The article of manufacture of claim 51, wherein encrypting the process sample includes encrypting the environmental data and embedding the encrypted environmental data within the encrypted related process sample.
53. The article of manufacture of claim 52, wherein the method further comprises decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
54. The article of manufacture of claim 50, wherein encrypting the process sample includes encrypting the environmental data with the related process sample.
55. The article of manufacture of claim 54, wherein the method further comprises decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
56. The article of manufacture of claim 50, wherein encrypting the process sample includes embedding the environmental data within the encrypted related process sample.
57. The article of manufacture of claim 56, wherein the method further comprises verifying the environmental data, before decrypting the stored encrypted process sample.
58. The article of manufacture of claim 47, wherein the method further comprises manipulating at least one of the at least one process element.
59. The article of manufacture of claim 47, wherein the method further comprises tagging at least one of the at least one process element.
60. The article of manufacture of claim 47, wherein the process interacts with formatted data comprising at least one object having an associated object tag.
61. The article of manufacture of claim 47, wherein at least two process elements are provided to the process.
62. The article of manufacture of claim 47, wherein the current scheduled condition of the process is sampled at the first predetermined point in the process.
63. The article of manufacture of claim 47, wherein the current scheduled condition of the process is sampled at the second predetermined point in the process.
64. The article of manufacture of claim 47, wherein sampling the first scheduled condition comprises sampling a selecting process element.
65. The article of manufacture of claim 47, wherein the first predetermined point occurs before execution of the process is initiated.
66. The article of manufacture of claim 47, wherein the first predetermined point occurs after execution of the process is initiated.
67. The article of manufacture of claim 47, wherein the first predetermined point occurs as execution of the process is initiated.
68. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
providing at least one process element relating to a process;
at a first predetermined point in the process, sampling a first scheduled condition of the process to provide a process sample, wherein the first scheduled condition involves a selected process element;
relating an element tag associated with the selected process element to at least one cryptographic label;
encrypting the process sample consistent with the at least one cryptographic label;
storing the encrypted process sample and the element tag; and
subsequently validating reliability of the process, said validating comprising
sampling a current scheduled condition of the process at one of the first predetermined point in the process and a second predetermined point in the process;
decrypting the stored encrypted process sample consistent with the at least one cryptographic label;
comparing the current process sample to the decrypted stored process sample; and
making a validation determination consistent with a result of the comparison.
69. The article of manufacture of claim 68, wherein the at least one process element is a process input.
70. The article of manufacture of claim 68, wherein the at least one process element is a process output.
71. The article of manufacture of claim 68, wherein the method further comprises collecting environmental data related to the process sample.
72. The article of manufacture of claim 71, wherein encrypting the process sample includes encrypting the environmental data.
73. The article of manufacture of claim 72, wherein encrypting the process sample includes encrypting the environmental data and embedding the encrypted environmental data within the encrypted related process sample.
74. The article of manufacture of claim 73, wherein the method further comprises decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
75. The article of manufacture of claim 74, wherein encrypting the process sample includes encrypting the environmental data with the related process sample.
76. The article of manufacture of claim 75, wherein the method further comprises decrypting the encrypted environmental data, and verifying the environmental data, after decrypting the stored encrypted process sample.
77. The article of manufacture of claim 71, wherein encrypting the process sample includes embedding the environmental data within the encrypted related process sample.
78. The article of manufacture of claim 77, wherein the method further comprises verifying the environmental data, before decrypting the stored encrypted process sample.
79. The article of manufacture of claim 68, wherein the method further comprises manipulating at least one of the at least one process element.
80. The article of manufacture of claim 68, further comprising tagging at least one of the at least one process element.
81. The article of manufacture of claim 68, wherein the process interacts with formatted data comprising at least one object having an associated object tag.
82. The article of manufacture of claim 68, wherein at least two process elements are provided to the process.
83. The article of manufacture of claim 68, wherein the current scheduled condition of the process is sampled at the first predetermined point in the process.
84. The article of manufacture of claim 68, wherein the current scheduled condition of the process is sampled at the second predetermined point in the process.
85. The article of manufacture of claim 68, wherein the element tag includes an attribute.
86. The article of manufacture of claim 68, wherein the first predetermined point occurs before execution of the process is initiated.
87. The article of manufacture of claim 68, wherein the first predetermined point occurs after execution of the process is initiated.
88. The article of manufacture of claim 68, wherein the first predetermined point occurs as execution of the process is initiated.
89. The article of manufacture of claim 123, wherein at least one of the at least one encryption label is a role-based cryptographic label.
90. An article of manufacture comprising a program storage medium tangibly embodying one or more programs of instructions executable by a computer to perform a method, the method comprising:
providing, consistent with a data format, at least one object relating to a process;
selecting, from the at least one object, a first object, consistent with an object tag associated with the first object;
referencing at least one cryptographic label consistent with the object tag;
encrypting at least a portion of the first object consistent with the at least one cryptographic label; and
storing the at least a portion of the first object and the object tag for subsequent use by an intended recipient.
91. The article of manufacture of claim 90, wherein the at least one encryption label is a role-based cryptographic label.
92. The article of manufacture of claim 90, wherein the object tag comprises an attribute.
93. A method, comprising:
providing a first computer readable medium having stored thereon a first data set comprising at least one object and a respective tag associated therewith;
relating the respective tag to at least one cryptographic label;
encrypting the at least one object consistent with the at least one cryptographic label;
creating a second data set comprising the encrypted at least one object and the respective tag; and
storing said second data set on one of the first computer readable medium and a second computer readable medium.
94. A method, comprising:
providing a first computer readable medium having stored thereon a first data set comprising a plurality of objects and a tag for, and associated with, each of the plurality of objects; and
creating a second data set on one of said first computer readable medium and a second computer readable medium, said creating comprising
for each of the plurality of objects,
relating the respective tag associated with the respective object to at least one cryptographic label,
encrypting the respective object consistent with the at least one cryptographic label, and
storing the encrypted respective object and the respective tag in said second data set.
US10/194,742 1997-05-08 2002-07-12 Secure accounting and operational control reporting system Abandoned US20020184511A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/194,742 US20020184511A1 (en) 1997-05-08 2002-07-12 Secure accounting and operational control reporting system
US13/189,362 US20120204036A1 (en) 1997-05-08 2011-07-22 Encryption Scheme

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US4593597P 1997-05-08 1997-05-08
US7464998A 1998-05-08 1998-05-08
US09/421,293 US6694433B1 (en) 1997-05-08 1999-10-20 XML encryption scheme
US10/194,742 US20020184511A1 (en) 1997-05-08 2002-07-12 Secure accounting and operational control reporting system

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US7464998A Continuation-In-Part 1997-05-08 1998-05-08
US09/421,293 Continuation US6694433B1 (en) 1997-05-08 1999-10-20 XML encryption scheme

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/189,362 Continuation-In-Part US20120204036A1 (en) 1997-05-08 2011-07-22 Encryption Scheme

Publications (1)

Publication Number Publication Date
US20020184511A1 true US20020184511A1 (en) 2002-12-05

Family

ID=31190488

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/421,293 Expired - Lifetime US6694433B1 (en) 1997-05-08 1999-10-20 XML encryption scheme
US10/194,742 Abandoned US20020184511A1 (en) 1997-05-08 2002-07-12 Secure accounting and operational control reporting system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/421,293 Expired - Lifetime US6694433B1 (en) 1997-05-08 1999-10-20 XML encryption scheme

Country Status (1)

Country Link
US (2) US6694433B1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050039034A1 (en) * 2003-07-31 2005-02-17 International Business Machines Corporation Security containers for document components
CN105406963A (en) * 2015-12-09 2016-03-16 中国联合网络通信集团有限公司 Encryption method, encryption device, decryption method and decryption device for user account
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US10717264B2 (en) 2015-09-30 2020-07-21 Sigma Labs, Inc. Systems and methods for additive manufacturing operations
US11135654B2 (en) 2014-08-22 2021-10-05 Sigma Labs, Inc. Method and system for monitoring additive manufacturing processes
US11267047B2 (en) 2015-01-13 2022-03-08 Sigma Labs, Inc. Material qualification system and methodology
US11478854B2 (en) 2014-11-18 2022-10-25 Sigma Labs, Inc. Multi-sensor quality inference and control for additive manufacturing processes
US11931956B2 (en) 2022-09-13 2024-03-19 Divergent Technologies, Inc. Multi-sensor quality inference and control for additive manufacturing processes

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7212632B2 (en) 1998-02-13 2007-05-01 Tecsec, Inc. Cryptographic key split combiner
US8077870B2 (en) * 1998-02-13 2011-12-13 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
JP3730498B2 (en) * 2000-09-19 2006-01-05 株式会社東芝 Signature storage medium
US7480857B2 (en) * 2004-09-10 2009-01-20 Igt Method and apparatus for data communication in a gaming system
EP1215547B1 (en) * 2000-12-15 2007-01-03 Siemens Aktiengesellschaft Encryption of control programs
EP1225499A3 (en) * 2001-01-19 2004-03-24 Matsushita Electric Industrial Co., Ltd. Data processor for processing data with a digital signature
US7103773B2 (en) * 2001-10-26 2006-09-05 Hewlett-Packard Development Company, L.P. Message exchange in an information technology network
US20040059945A1 (en) * 2002-09-25 2004-03-25 Henson Kevin M. Method and system for internet data encryption and decryption
JP3945708B2 (en) * 2004-01-23 2007-07-18 インターナショナル・ビジネス・マシーンズ・コーポレーション Information processing system, conversion processing system, inverse conversion processing system, conversion method, conversion program, and recording medium
US20060053285A1 (en) * 2004-07-29 2006-03-09 Kimmel Gerald D Object access level
US20060282681A1 (en) * 2005-05-27 2006-12-14 Scheidt Edward M Cryptographic configuration control
WO2009017910A2 (en) * 2007-06-25 2009-02-05 Vuance, Inc. Emergency responder credentialing system and method
EP2710514A4 (en) 2011-05-18 2015-04-01 Nextgenid Inc Multi-biometric enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems
US9256720B2 (en) 2011-05-18 2016-02-09 Nextgenid, Inc. Enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems
USD760711S1 (en) 2012-05-18 2016-07-05 NexgenID, Inc. Kiosk
USD818464S1 (en) 2014-04-11 2018-05-22 Nextgenid, Inc. Kiosk
EP2974223A2 (en) 2013-03-15 2016-01-20 Assa Abloy AB Digital credential with embedded authentication instructions
USD751061S1 (en) 2014-04-11 2016-03-08 Nextgenid, Inc. Kiosk

Citations (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3956615A (en) * 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications
US4145568A (en) * 1963-10-18 1979-03-20 Gretag Aktiengesellschaft Method and apparatus for ciphering and deciphering messages
US4218582A (en) * 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4424414A (en) * 1978-05-01 1984-01-03 Board Of Trustees Of The Leland Stanford Junior University Exponentiation cryptographic apparatus and method
US4757537A (en) * 1985-04-17 1988-07-12 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US4984272A (en) * 1988-11-30 1991-01-08 At&T Bell Laboratories Secure file handling in a computer operating system
US5052040A (en) * 1990-05-25 1991-09-24 Micronyx, Inc. Multiple user stored data cryptographic labeling system and method
US5065429A (en) * 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media
US5142674A (en) * 1988-03-08 1992-08-25 International Business Machines Corporation Interchange object data base index which eliminates the need for private copies of interchange documents files by a plurality of application programs
US5168371A (en) * 1990-12-14 1992-12-01 Fuji Xerox Co., Ltd. Image processing system for generating, storing, and transmitting image datafiles associated with enciphered identification information
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5222018A (en) * 1985-07-18 1993-06-22 Pitney Bowes Inc. System for centralized processing of accounting and payment functions
US5276738A (en) * 1992-12-17 1994-01-04 Bull Hn Information Systems Inc. Software data protection mechanism
US5315655A (en) * 1992-12-16 1994-05-24 Notable Technologies, Inc. Method and apparatus for encoding data objects on a computer system
US5319562A (en) * 1991-08-22 1994-06-07 Whitehouse Harry T System and method for purchase and application of postage using personal computer
US5369702A (en) * 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5369707A (en) * 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5375169A (en) * 1993-05-28 1994-12-20 Tecsec, Incorporated Cryptographic key management method and apparatus
US5499297A (en) * 1992-04-17 1996-03-12 Secure Computing Corporation System and method for trusted path communications
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5513245A (en) * 1994-08-29 1996-04-30 Sony Corporation Automatic generation of private authentication key for wireless communication systems
US5532920A (en) * 1992-04-29 1996-07-02 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
US5535279A (en) * 1994-12-15 1996-07-09 Pitney Bowes Inc. Postage accounting system including means for transmitting a bit-mapped image of variable information for driving an external printer
US5535297A (en) * 1993-12-16 1996-07-09 Honeywell Inc. Micro-alignment method
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5550976A (en) * 1992-12-08 1996-08-27 Sun Hydraulics Corporation Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5557765A (en) * 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5568639A (en) * 1993-11-24 1996-10-22 Menai Corporation Method and apparatus for providing an object-oriented file structuring system on a computer
US5574898A (en) * 1993-01-08 1996-11-12 Atria Software, Inc. Dynamic software version auditor which monitors a process to provide a list of objects that are accessed
US5602921A (en) * 1994-12-15 1997-02-11 Pitney Bowes Inc. Postage accounting system including means for transmitting ASCII encoded variable information for driving an external printer
US5604802A (en) * 1993-10-29 1997-02-18 International Business Machines Corporation Transaction processing system
US5627894A (en) * 1990-03-30 1997-05-06 Gao Gesellschaft Fur Automation Und Organisation Mbh Random number generator
US5664177A (en) * 1988-04-13 1997-09-02 Digital Equipment Corporation Data processing system having a data structure with a single, simple primitive
US5680452A (en) * 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
US5684705A (en) * 1994-08-12 1997-11-04 Neopost Limited Mailing system
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5696829A (en) * 1995-11-21 1997-12-09 Pitney Bowes, Inc. Digital postage meter system
US5710815A (en) * 1995-06-07 1998-01-20 Vtech Communications, Ltd. Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data
US5713753A (en) * 1996-07-12 1998-02-03 Bayer; Thomas K. Plug connector
US5749078A (en) * 1996-08-23 1998-05-05 Pitney Bowes Inc. Method and apparatus for storage of accounting information in a value dispensing system
US5751808A (en) * 1995-03-09 1998-05-12 Anshel; Michael M. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
US5754939A (en) * 1994-11-29 1998-05-19 Herz; Frederick S. M. System for generation of user profiles for a system for customized electronic identification of desirable objects
US5754659A (en) * 1995-12-22 1998-05-19 General Instrument Corporation Of Delaware Generation of cryptographic signatures using hash keys
US5778066A (en) * 1995-11-22 1998-07-07 F.M.E. Corporation Method and apparatus for authentication of postage accounting reports
US5778069A (en) * 1996-04-10 1998-07-07 Microsoft Corporation Non-biased pseudo random number generator
US5794234A (en) * 1996-08-14 1998-08-11 The Ec Company Method and system for providing electronic commerce between incompatible data processing systems
US5796826A (en) * 1995-01-16 1998-08-18 Lg Electronics Inc. Apparatus for limiting reproducible number of magnetic recording medium
US5805589A (en) * 1993-03-04 1998-09-08 International Business Machines Corporation Central shared queue based time multiplexed packet switch with deadlock avoidance
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
US5850443A (en) * 1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments
US5864616A (en) * 1996-06-28 1999-01-26 Intel Corporation System and method for providing call statistics in real time
US5870479A (en) * 1993-10-25 1999-02-09 Koninklijke Ptt Nederland N.V. Device for processing data packets
US5953419A (en) * 1996-05-06 1999-09-14 Symantec Corporation Cryptographic file labeling system for supporting secured access by multiple users
US5955082A (en) * 1997-01-29 1999-09-21 Her Majesty The Queen In Right Of Canada, As Represented By Agriculture And Agri-Food Canada Insecticidal factor from field peas
US5962533A (en) * 1996-02-06 1999-10-05 University Of Florida Research Foundation, Inc. Hydroxy polyamines
US5999623A (en) * 1997-11-05 1999-12-07 Globalstar L.P. Broadcast data access controller communication system
US6009177A (en) * 1994-01-13 1999-12-28 Certco Llc Enhanced cryptographic system and method with key escrow feature
US6011847A (en) * 1995-06-01 2000-01-04 Follendore, Iii; Roy D. Cryptographic access and labeling system
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US6055634A (en) * 1995-03-14 2000-04-25 Gec-Marconi Limited Secure internal communication system
US6098071A (en) * 1995-06-05 2000-08-01 Hitachi, Ltd. Method and apparatus for structured document difference string extraction
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6169805B1 (en) * 1997-02-28 2001-01-02 International Business Machines Corporation System and method of operation for providing user's security on-demand over insecure networks
US6185685B1 (en) * 1997-12-11 2001-02-06 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US6223287B1 (en) * 1998-07-24 2001-04-24 International Business Machines Corporation Method for establishing a secured communication channel over the internet
US20010050990A1 (en) * 1997-02-19 2001-12-13 Frank Wells Sudia Method for initiating a stream-oriented encrypted communication
US6363154B1 (en) * 1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes
US6370516B1 (en) * 1998-03-16 2002-04-09 John P Reese Computer based device to report the results of codified methodologies of financial advisors applied to a single security or element
US20020051540A1 (en) * 2000-10-30 2002-05-02 Glick Barry J. Cryptographic system and method for geolocking and securing digital information
US6385552B1 (en) * 1999-08-10 2002-05-07 Tyco Telecommunications (Us) Inc. Method for collecting test measurements
US20020076045A1 (en) * 1997-02-13 2002-06-20 Scheidt Edward M. Cryptographic key split combiner
US6463440B1 (en) * 1999-04-08 2002-10-08 International Business Machines Corporation Retrieval of style sheets from directories based upon partial characteristic matching
US20020150250A1 (en) * 2000-06-15 2002-10-17 Yoshimichi Kitaya System and method for processing information using encryption key block
US20030039358A1 (en) * 1998-02-13 2003-02-27 Scheidt Edward M. Cryptographic key split binding process and apparatus
US20030084332A1 (en) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Method for binding a software data domain to specific hardware
US6585778B1 (en) * 1999-08-30 2003-07-01 International Business Machines Corporation Enforcing data policy using style sheet processing
US6598161B1 (en) * 1999-08-09 2003-07-22 International Business Machines Corporation Methods, systems and computer program products for multi-level encryption
US20030188156A1 (en) * 2002-03-27 2003-10-02 Raju Yasala Using authentication certificates for authorization
US6671805B1 (en) * 1999-06-17 2003-12-30 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents
US20040091114A1 (en) * 2002-08-23 2004-05-13 Carter Ernst B. Encrypting operating system
US6763460B1 (en) * 1998-07-13 2004-07-13 International Business Machines Corporation Method of transmitting information data from a sender to a receiver via a transcoder, method of transcoding information data, method for receiving transcoded information data, sender, transcoder and receiver
US6931532B1 (en) * 1999-10-21 2005-08-16 International Business Machines Corporation Selective data encryption using style sheet processing
US6983366B1 (en) * 2000-02-14 2006-01-03 Safenet, Inc. Packet Processor
US7010681B1 (en) * 1999-01-29 2006-03-07 International Business Machines Corporation Method, system and apparatus for selecting encryption levels based on policy profiling
US7039805B1 (en) * 1998-05-20 2006-05-02 Messing John H Electronic signature method
US7069448B2 (en) * 2001-12-05 2006-06-27 Tecsec, Inc. Context oriented crypto processing on a parallel processor array

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4713753A (en) 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
JPH0622345B2 (en) 1988-01-14 1994-03-23 東京電力株式会社 Mobile communication system
US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems
CA2158290A1 (en) * 1994-09-29 1996-03-30 Leon A. Pintsov Postage evidencing system with secure summary reports

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4145568A (en) * 1963-10-18 1979-03-20 Gretag Aktiengesellschaft Method and apparatus for ciphering and deciphering messages
US3956615A (en) * 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications
US4218582A (en) * 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4424414A (en) * 1978-05-01 1984-01-03 Board Of Trustees Of The Leland Stanford Junior University Exponentiation cryptographic apparatus and method
US4757537A (en) * 1985-04-17 1988-07-12 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
US5222018A (en) * 1985-07-18 1993-06-22 Pitney Bowes Inc. System for centralized processing of accounting and payment functions
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US5142674A (en) * 1988-03-08 1992-08-25 International Business Machines Corporation Interchange object data base index which eliminates the need for private copies of interchange documents files by a plurality of application programs
US5664177A (en) * 1988-04-13 1997-09-02 Digital Equipment Corporation Data processing system having a data structure with a single, simple primitive
US4984272A (en) * 1988-11-30 1991-01-08 At&T Bell Laboratories Secure file handling in a computer operating system
US5065429A (en) * 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5627894A (en) * 1990-03-30 1997-05-06 Gao Gesellschaft Fur Automation Und Organisation Mbh Random number generator
US5052040A (en) * 1990-05-25 1991-09-24 Micronyx, Inc. Multiple user stored data cryptographic labeling system and method
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5168371A (en) * 1990-12-14 1992-12-01 Fuji Xerox Co., Ltd. Image processing system for generating, storing, and transmitting image datafiles associated with enciphered identification information
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5319562A (en) * 1991-08-22 1994-06-07 Whitehouse Harry T System and method for purchase and application of postage using personal computer
US5499297A (en) * 1992-04-17 1996-03-12 Secure Computing Corporation System and method for trusted path communications
US5532920A (en) * 1992-04-29 1996-07-02 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
US5550976A (en) * 1992-12-08 1996-08-27 Sun Hydraulics Corporation Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5315655A (en) * 1992-12-16 1994-05-24 Notable Technologies, Inc. Method and apparatus for encoding data objects on a computer system
US5276738A (en) * 1992-12-17 1994-01-04 Bull Hn Information Systems Inc. Software data protection mechanism
US5574898A (en) * 1993-01-08 1996-11-12 Atria Software, Inc. Dynamic software version auditor which monitors a process to provide a list of objects that are accessed
US5369707A (en) * 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5805589A (en) * 1993-03-04 1998-09-08 International Business Machines Corporation Central shared queue based time multiplexed packet switch with deadlock avoidance
US5375169A (en) * 1993-05-28 1994-12-20 Tecsec, Incorporated Cryptographic key management method and apparatus
US5898781A (en) * 1993-10-18 1999-04-27 Tecsec Incorporated Distributed cryptographic object method
US5680452A (en) * 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
US5717755A (en) * 1993-10-18 1998-02-10 Tecsec,Inc. Distributed cryptographic object method
US5369702A (en) * 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5870479A (en) * 1993-10-25 1999-02-09 Koninklijke Ptt Nederland N.V. Device for processing data packets
US5604802A (en) * 1993-10-29 1997-02-18 International Business Machines Corporation Transaction processing system
US5568639A (en) * 1993-11-24 1996-10-22 Menai Corporation Method and apparatus for providing an object-oriented file structuring system on a computer
US5535297A (en) * 1993-12-16 1996-07-09 Honeywell Inc. Micro-alignment method
US6009177A (en) * 1994-01-13 1999-12-28 Certco Llc Enhanced cryptographic system and method with key escrow feature
US5557765A (en) * 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5684705A (en) * 1994-08-12 1997-11-04 Neopost Limited Mailing system
US5513245A (en) * 1994-08-29 1996-04-30 Sony Corporation Automatic generation of private authentication key for wireless communication systems
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5754939A (en) * 1994-11-29 1998-05-19 Herz; Frederick S. M. System for generation of user profiles for a system for customized electronic identification of desirable objects
US5535279A (en) * 1994-12-15 1996-07-09 Pitney Bowes Inc. Postage accounting system including means for transmitting a bit-mapped image of variable information for driving an external printer
US5602921A (en) * 1994-12-15 1997-02-11 Pitney Bowes Inc. Postage accounting system including means for transmitting ASCII encoded variable information for driving an external printer
US5796826A (en) * 1995-01-16 1998-08-18 Lg Electronics Inc. Apparatus for limiting reproducible number of magnetic recording medium
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5751808A (en) * 1995-03-09 1998-05-12 Anshel; Michael M. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
US6055634A (en) * 1995-03-14 2000-04-25 Gec-Marconi Limited Secure internal communication system
US6011847A (en) * 1995-06-01 2000-01-04 Follendore, Iii; Roy D. Cryptographic access and labeling system
US6098071A (en) * 1995-06-05 2000-08-01 Hitachi, Ltd. Method and apparatus for structured document difference string extraction
US5710815A (en) * 1995-06-07 1998-01-20 Vtech Communications, Ltd. Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data
US5696829A (en) * 1995-11-21 1997-12-09 Pitney Bowes, Inc. Digital postage meter system
US5778066A (en) * 1995-11-22 1998-07-07 F.M.E. Corporation Method and apparatus for authentication of postage accounting reports
US5754659A (en) * 1995-12-22 1998-05-19 General Instrument Corporation Of Delaware Generation of cryptographic signatures using hash keys
US5962533A (en) * 1996-02-06 1999-10-05 University Of Florida Research Foundation, Inc. Hydroxy polyamines
US5778069A (en) * 1996-04-10 1998-07-07 Microsoft Corporation Non-biased pseudo random number generator
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
US5953419A (en) * 1996-05-06 1999-09-14 Symantec Corporation Cryptographic file labeling system for supporting secured access by multiple users
US5864616A (en) * 1996-06-28 1999-01-26 Intel Corporation System and method for providing call statistics in real time
US5713753A (en) * 1996-07-12 1998-02-03 Bayer; Thomas K. Plug connector
US5794234A (en) * 1996-08-14 1998-08-11 The Ec Company Method and system for providing electronic commerce between incompatible data processing systems
US5850443A (en) * 1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments
US5749078A (en) * 1996-08-23 1998-05-05 Pitney Bowes Inc. Method and apparatus for storage of accounting information in a value dispensing system
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US5955082A (en) * 1997-01-29 1999-09-21 Her Majesty The Queen In Right Of Canada, As Represented By Agriculture And Agri-Food Canada Insecticidal factor from field peas
US6606386B2 (en) * 1997-02-13 2003-08-12 Tecsec Inc Cryptographic key split combiner
US6542608B2 (en) * 1997-02-13 2003-04-01 Tecsec Incorporated Cryptographic key split combiner
US6885747B1 (en) * 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6608901B2 (en) * 1997-02-13 2003-08-19 Tecsec, Inc. Cryptographic key split combiner
US6549623B1 (en) * 1997-02-13 2003-04-15 Tecsec, Incorporated Cryptographic key split combiner
US20020076045A1 (en) * 1997-02-13 2002-06-20 Scheidt Edward M. Cryptographic key split combiner
US20020085711A1 (en) * 1997-02-13 2002-07-04 Scheidt Edward M. Cryptographic key split combiner
US20010050990A1 (en) * 1997-02-19 2001-12-13 Frank Wells Sudia Method for initiating a stream-oriented encrypted communication
US6169805B1 (en) * 1997-02-28 2001-01-02 International Business Machines Corporation System and method of operation for providing user's security on-demand over insecure networks
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
US5999623A (en) * 1997-11-05 1999-12-07 Globalstar L.P. Broadcast data access controller communication system
US6185685B1 (en) * 1997-12-11 2001-02-06 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US20030039358A1 (en) * 1998-02-13 2003-02-27 Scheidt Edward M. Cryptographic key split binding process and apparatus
US7079653B2 (en) * 1998-02-13 2006-07-18 Tecsec, Inc. Cryptographic key split binding process and apparatus
US6370516B1 (en) * 1998-03-16 2002-04-09 John P Reese Computer based device to report the results of codified methodologies of financial advisors applied to a single security or element
US7039805B1 (en) * 1998-05-20 2006-05-02 Messing John H Electronic signature method
US6763460B1 (en) * 1998-07-13 2004-07-13 International Business Machines Corporation Method of transmitting information data from a sender to a receiver via a transcoder, method of transcoding information data, method for receiving transcoded information data, sender, transcoder and receiver
US6223287B1 (en) * 1998-07-24 2001-04-24 International Business Machines Corporation Method for establishing a secured communication channel over the internet
US6363154B1 (en) * 1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes
US7010681B1 (en) * 1999-01-29 2006-03-07 International Business Machines Corporation Method, system and apparatus for selecting encryption levels based on policy profiling
US6463440B1 (en) * 1999-04-08 2002-10-08 International Business Machines Corporation Retrieval of style sheets from directories based upon partial characteristic matching
US6671805B1 (en) * 1999-06-17 2003-12-30 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents
US6598161B1 (en) * 1999-08-09 2003-07-22 International Business Machines Corporation Methods, systems and computer program products for multi-level encryption
US6385552B1 (en) * 1999-08-10 2002-05-07 Tyco Telecommunications (Us) Inc. Method for collecting test measurements
US6585778B1 (en) * 1999-08-30 2003-07-01 International Business Machines Corporation Enforcing data policy using style sheet processing
US6931532B1 (en) * 1999-10-21 2005-08-16 International Business Machines Corporation Selective data encryption using style sheet processing
US6983366B1 (en) * 2000-02-14 2006-01-03 Safenet, Inc. Packet Processor
US20020150250A1 (en) * 2000-06-15 2002-10-17 Yoshimichi Kitaya System and method for processing information using encryption key block
US20020051540A1 (en) * 2000-10-30 2002-05-02 Glick Barry J. Cryptographic system and method for geolocking and securing digital information
US20030084332A1 (en) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Method for binding a software data domain to specific hardware
US7069448B2 (en) * 2001-12-05 2006-06-27 Tecsec, Inc. Context oriented crypto processing on a parallel processor array
US20030188156A1 (en) * 2002-03-27 2003-10-02 Raju Yasala Using authentication certificates for authorization
US20040091114A1 (en) * 2002-08-23 2004-05-13 Carter Ernst B. Encrypting operating system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080215897A1 (en) * 2003-07-31 2008-09-04 International Business Machines Corporation Security Containers for Document Components
US7515717B2 (en) 2003-07-31 2009-04-07 International Business Machines Corporation Security containers for document components
US7685645B2 (en) * 2003-07-31 2010-03-23 International Business Machines Corporation Security containers for document components
US20050039034A1 (en) * 2003-07-31 2005-02-17 International Business Machines Corporation Security containers for document components
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US11176536B2 (en) 2012-12-07 2021-11-16 Visa International Service Association Token generating component
US11858207B2 (en) 2014-08-22 2024-01-02 Sigma Additive Solutions, Inc. Defect detection for additive manufacturing systems
US11607875B2 (en) 2014-08-22 2023-03-21 Sigma Additive Solutions, Inc. Method and system for monitoring additive manufacturing processes
US11135654B2 (en) 2014-08-22 2021-10-05 Sigma Labs, Inc. Method and system for monitoring additive manufacturing processes
US11478854B2 (en) 2014-11-18 2022-10-25 Sigma Labs, Inc. Multi-sensor quality inference and control for additive manufacturing processes
US11267047B2 (en) 2015-01-13 2022-03-08 Sigma Labs, Inc. Material qualification system and methodology
US10717264B2 (en) 2015-09-30 2020-07-21 Sigma Labs, Inc. Systems and methods for additive manufacturing operations
US11674904B2 (en) 2015-09-30 2023-06-13 Sigma Additive Solutions, Inc. Systems and methods for additive manufacturing operations
CN105406963A (en) * 2015-12-09 2016-03-16 中国联合网络通信集团有限公司 Encryption method, encryption device, decryption method and decryption device for user account
US11931956B2 (en) 2022-09-13 2024-03-19 Divergent Technologies, Inc. Multi-sensor quality inference and control for additive manufacturing processes

Also Published As

Publication number Publication date
US6694433B1 (en) 2004-02-17

Similar Documents

Publication Publication Date Title
US6694433B1 (en) XML encryption scheme
US6289460B1 (en) Document management system
Appelbaum Securing big data provenance for auditors: The big data provenance black box as reliable evidence
US11373192B2 (en) Apparatus for customer authentication of an item
US20230059806A1 (en) Apparatus and Methods for Producing Data Structures Having Internal Self-References Suitable for Immutably Representing and Verifying Data
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
Hasan et al. Preventing history forgery with secure provenance
US8613107B2 (en) System, method and apparatus for electronically protecting data associated with RFID tags
US8359271B2 (en) Apparatus for customer authentication of an item
US20100005509A1 (en) System, method and apparatus for electronically protecting data and digital content
CA2396811A1 (en) Method and apparatus for documentation, analysis, auditing, accounting, protection, registration, and verification of trade secrets
Casey et al. Digital transformation risk management in forensic science laboratories
US20120204036A1 (en) Encryption Scheme
Choi et al. Forensic recovery of SQL server database: Practical approach
JP3843405B2 (en) Personal information recording method, personal information recording system and recording medium
Accorsi Automated privacy audits to complement the notion of control for identity management
Politou et al. The “right to be forgotten” in the GDPR: implementation challenges and potential solutions
CN113742745A (en) Audit process evidence obtaining link management system and management method
US20090012972A1 (en) System for Processing Unstructured Data
Allinson Information systems audit trails in legal proceedings as evidence
US20230259640A1 (en) Data storage systems and methods of an enforceable non-fungible token having linked custodial chain of property transfers prior to minting using a token-based encryption determination process
Rhahla et al. A framework for GDPR compliance in big data systems
Whittington Wiley CPAexcel Exam Review 2015 Study Guide (January): Business Environment and Concepts
Haris Hamidovic An Introduction to Digital Records Management
Sheikh et al. Forensics, Legal Issues, and Privacy

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION