Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

186 results about "Keyfile" patented technology

A keyfile (or key-file) is a file on a computer which contains encryption or license keys. A common use is web server software running secure socket layer (SSL) protocols. Server-specific keys issued by trusted authorities are merged into the keyfile along with the trusted root certificates. By this method keys can be updated without recompiling software or rebooting the server.

Method and apparatus for automatic database encryption

One embodiment of the present invention provides a system for managing encryption within a database system that is managed by a database administrator, and wherein a user administrator not otherwise associated with the database system, manages users of the database system. This system performs encryption automatically and transparently to a user of the database system. The system operates by receiving a request to store data in a column of the database system. If a user has designated the column as an encrypted column, the system automatically encrypts the data using an encryption function. This encryption function uses a key stored in a keyfile managed by the security administrator. After encrypting the data, the system stores the data in the database system using a storage function of the database system.
Owner:ORACLE INT CORP

Point of sale product authorization

A method for authorizing a sale of a product, comprising: sending a first key from a point of sale device to a key management system; determining if the first key is found in the key management system; determining whether the first key is associated with a valid merchant identifier and terminal identifier; and authorizing a sale at a point of sale of the product if the first key is found in the key management system and if the first key is associated with a valid merchant identifier and terminal identifier, wherein a purchaser receives a copy of a second key associated with the first key at time of purchase. The system has a Key Management System (KMS) with databases. The system also has a first key file and associated second key(s) file in said databases. The system also has an input device at a retail-outlet terminal that inputs an identifier during a sale at the point of sale, wherein the KMS compares the identifier with the first key file and key attributes to determine if the first key is found and if its associated attributes are favorable. The KMS permits or denies the sale of the product based on these attributes. The KMS subsequently permits or denies the installation of the product on target devices based on vendor rules and product attributes.
Owner:IDT CORPORATION

Backup service and appliance with single-instance storage of encrypted data

One implementation of a method for providing backup storage services for encrypted data includes receiving signatures of convergently encrypted portions of data from client computers, determining whether the encrypted portions are already present on a backup storage, and obtaining only the needed portions. Users unassociated with a particular user account are denied access to information backed up in that account. The backup storage also stores password protected key files holding signatures of the unencrypted portions of data. One implementation of a system includes a memory, a single-instance storage circuit, a user account management circuit, and a signature index. The memory holds a user-account database and backup copies of convergently encrypted portions of data. The single-instance storage circuit uses the signature index to prevent duplicative backup copies. The user account management circuit responds to download requests after authenticating the user information associated with the requested data.
Owner:SYMANTEC OPERATING CORP

System, method and device for dynamically encrypting data based on key library

The invention discloses a system, method and device for dynamically encrypting data based on a key library, which can be used in the field of information security, and the system comprises an inter-application server, a key library server, a plurality of channel application servers and terminals interacting with respective channel application servers, wherein the key library server is used for configuring a data encryption rule for data interacting among different channel application servers and data interacting in the same channel application server, and generating a corresponding encryption program and a key file according to the data encryption rule; the inter-application server is used for downloading a corresponding encryption program and the key file from the key library server according to a data processing request of each channel application server, and encrypting or decrypting application data; and the channel application servers are used for downloading the corresponding encryption program and the key file from the key library server according to the data processing request of the terminal, and encrypting or decrypting the application data. According to the invention, the system safety can be improved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Multiple secure socket layer keyfiles for client login support

A method and system to allow multiple users of a client computer to establish a secure connection for each of the multiple users between the client computer and a server computer. Each user is allowed to unlock a keyfile unique to that user. The unique keyfile is able to authenticate the user's identity to the server computer. Access to the users unique keyfile is accomplished by the user inputting into the client computer a unique user password for the user's unique keyfile. A Graphical User Interface (GUI) is provided to allow the user to input the unique user password for that user's unique keyfile. Upon input of the password, the selected keyfile is opened to enable a user authentication process to authenticate the user's identity to the server computer, thus creating an authenticated secure connection between the server computer and the client computer for the specific user.
Owner:IBM CORP

Mobile terminal secrecy system and method based on quantum true random number

The invention discloses a mobile terminal secrecy system and method based on a quantum true random number. The system comprises a quantum random number generating module, a key file storage module, an encryption module, a decryption module, a key information storage module and an external file storage module, wherein the quantum random number generating module is connected with the key file storage module and used for transmitting random number key information, the key file storage module is respectively connected with the encryption module and the decryption module and used for transmitting encrypted key information and decrypted key information; the decryption module is connected with the external file storage module and used for transmitting a to-be-decrypted file and a decrypted file; the encryption module is connected with the external file storage module and used for transmitting the to-be-encrypted file and the encrypted file; the encryption module is connected with the key information storage module and used for transmitting key use condition information. The feasibility of guaranteeing the absolute security of the data through the daily application of one-time padding is provided, and the encryption of the data can be easily realized.
Owner:SHANGHAI JIAODA INTELLECTUAL PORPERTY MANAGEMENT CO LTD

System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection

A system, method, and apparatus for securing a date file or a cognitive encryption key data file stored in a storage medium or memory device. The date file or encryption key file having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the encryption key file includes querying a user of the date file or encryption key file, the user environment of the date file or encryption key file, or both, for information required for analyzing a computational environment in relation to required security parameters for the cognitive date file or encryption key file. The information in relation to the security parameters is received and analyzed. The computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and/or use of the date file or encryption key file is either permitted or denied based on the analysis of the user and computational environment. Autonomous embedded data cognition enables data, cryptographic data, authentication codes, etc. to perform real-time environmental configuration control, self-manage, self-obfuscate, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. Data-to-data reasoning and analyses can be performed.
Owner:BURGESS SHELIA JEAN

Digital film secret key distributing method, device and system based on management website

ActiveCN103873233AImprove the efficiency of key distributionEnsure safetyKey distribution for secure communicationClient-sideAuthorization
The invention relates to the data processing field, in particular to a digital film secret key distributing method, device and system based on a management website. The method includes the steps that the authorization request for a digital film sent by a second client is received, and authorization information corresponding the digital film is generated according to the authorization request; the authorization information at least comprises authorized information of a playing device, theater information and digital film information; according to the digital film information in the authorization information, content secret keys corresponding to the digital film information are acquired, and the content secret keys are processed to generate secret key files; the secret key files are sent to a first client corresponding to the information of the playing device through a network so that after the first client acquires the secret key files, the acquired encrypted digital film can be decrypted through the secret key files and the digital film corresponding to the authorization information of the first client can be acquired. With the method, device and system, safety of digital films in the propagation process is effectively improved, and safety of the copyright of digital films is protected.
Owner:中央宣传部电影数字节目管理中心

Deciphering method and system of data protection application programming interface (DPAPI) enciphered data

ActiveCN103116730AImplement offline decryptionMeet the read-only requirementEncryption apparatus with shift registers/memoriesDigital data protectionComputer hardwareOperational system
The invention provides a deciphering method and system of data protection application programming interface (DPAPI) enciphered data. The method comprises the following steps: loading a device, wherein a data source is in the device, identifying a system partition from the data source and reading files in the system partition, wherein the Windows system is in the system partition, acquiring files which need to be deciphered and master key files of all users, acquiring all DPAPI enciphered blocks from the files which need to be deciphered, analyzing all the DPAPI enciphered blocks to acquire the first deciphering key information which comprises encipherment secret key unique identification, acquiring the master key files of each DPAPI enciphered block according to the encipherment secret key unique identification, analyzing the master key files to acquire the second deciphering key information which comprises a second annoyance value and a second secret key derive function iteration based on commands, and deciphering the DPAPI enciphered blocks according to a login password, system entropy parameters, the first deciphering key information and the second deciphering key information. The method and the system can achieve read only operation of the data source and meet the need of cross-platform without restriction of operating system.
Owner:XIAMEN MEIYA PICO INFORMATION

Access control method and device of file encrypting system on the basis of partitions

The invention discloses an access control method and device of a file encrypting system on the basis of partitions. The method includes that a password and/or a key file input by a user are/is read to determine whether an encrypting partition exists or not; if the encrypting partition does not exist, the user sets the password and/or the key file which are/is read so as to establish the encrypting partition which is protected by the user password and/or key file, and then the password and/or the key file input by the user are/is read to determine whether the encrypting partition exists or not; if the encrypting partition exists, a decryption key is generated by a possible algorithm according to the password and/or the key file input by the user, and a verification value and a checking value are obtained through the decryption key by the possible algorithm; whether the verification value and the checking value obtained after decryption are consistent to set verification value and checking value or not is determined respectively; if the verification value and the checking value obtained after decryption are consistent to the set verification value and checking value, identity verification passes to obtain file data; otherwise, the password and/or the key file are/or incorrect. Thereby, by means of the access control method and device of the file encrypting system on the basis of the partitions, identity verification grade of the file encrypting system can be improved.
Owner:ASIA EURO BOLOD INFORMATION SECURITY TECHHUNAN

Data transmission and storage method and system

The invention provides a data transmission and storage method and system. The data transmission method comprises the steps that plaintext and plaintext abstracts in an unsecured environment are encrypted, and corresponding encrypted data and secret keys are obtained; the encrypted data is transmitted to a preset first receiving end in the unsecured environment through a first transmission tool; the preset first receiving end activates a preset second receiving end in a secure environment, and the encrypted data is transmitted to the preset second receiving end; after the secrete keys are encrypted through a second transmission tool, a secret key file is formed and transmitted to the second receiving end; the secrete key file received by the second receiving end is decrypted to obtain the secrete keys in the secret key file; the encrypted data received by the second receiving end is decrypted according to the obtained secret keys to obtain the corresponding plaintext and plaintext abstracts, and the integrity of the plaintext is verified according to the plaintext abstracts. According to the data transmission and storage method and system, the secret keys and the encrypted data are subjected to time-share transmission through different transmission channels, the transmission security is improved, and the plaintext cracking difficulty is increased.
Owner:FUZHOU ROCKCHIP SEMICON

Method and apparatus for writing and using keys for encrypting/decrypting a content and a recording medium storing keys written by the method

Content encryption information on content data recorded on a recording medium. A plurality of encryption keys used for encrypting a plurality of data clips containing content data is stored in a key file and index information for associating each of the plurality of encryption keys with a data segment encrypted with the encryption key is placed in the key file or in another management information file (e.g., clip information file). As a consequence, it is allowed to decrypt encrypted content data with different encryption keys by applying each of the plurality of encryption keys to each associated data segment.
Owner:LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products