IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0554419
(1999-10-14)
|
국제출원번호 |
PCT//US99/24142
(2000-05-11)
|
§371/§102 date |
20000511
(20000511)
|
국제공개번호 |
WO00//22773
(2000-04-20)
|
발명자
/ 주소 |
|
인용정보 |
피인용 횟수 :
25 인용 특허 :
10 |
초록
▼
A server computer sends and receives secure data provided by authorized users. The data is secured by encrypting and decrypting the data with a key that is shared between the users and the server computer. As the server computer receives a user's encrypted data, the server computer decrypts the data
A server computer sends and receives secure data provided by authorized users. The data is secured by encrypting and decrypting the data with a key that is shared between the users and the server computer. As the server computer receives a user's encrypted data, the server computer decrypts the data using the user's shared key stored in a database on the server. The server computer can then process the data according to the user's instructions, this could include securely storing the data for retrieval by another user, processing the data, and/or securely sending the data to a second user by encrypting the data with the user's shared key.
대표청구항
▼
1. A system for using a shared key to transmit secure data between a client and a server, the system comprising:an encrypt/decrypt engine for using the shared key to encrypt or decrypt data, the encrypt/decrypt engine being configured for delivery via a web page to a client in response to a user req
1. A system for using a shared key to transmit secure data between a client and a server, the system comprising:an encrypt/decrypt engine for using the shared key to encrypt or decrypt data, the encrypt/decrypt engine being configured for delivery via a web page to a client in response to a user request and further configured to encrypt data independently of an identity of the physical client; wherein the server includes a user private keys database configured to store the shared key, and wherein, it is possible for the client and the server to reside on the same physical computing device, and where the shared key is derived from the user's authentication data, and the derived shared key is used for encrypting all data. 2. The system of claim 1 wherein the shared key is a user's private key entered by a user into the web page.3. The system of claim 1 further comprising a secure data database configured to store data received from the client and, upon the completion of a processing step, to deliver the stored data in an encrypted format to the client or to another client.4. The system of claim 1 further comprising a secure data database configured to store data received from the client and, upon receipt of a request for the data, to deliver the stored data in an encrypted format to the client or to another client.5. The system of claim 1 wherein the shared key is transmitted between the server and the client as few as zero times and the shared key is transmitted between the server and the user as few as one time, the key is not sent for authentication purposes, rather, the effect of the key in the encryption process is sent, consequently, the shared key does not need to be retransmitted once it has been established.6. The system of claim 1 wherein the shared key is a user's private key entered by a user.7. The system of claim 1 wherein the client encrypt/decrypt engine is installed on the client.8. A system for using a shared key in transmitting secure data between a client and a server, the system comprising:an encrypt/decrypt engine for using, the shared key, in encrypting data, the encrypt/decrypt engine being configured to encrypt data independently of an identity of the client; and a user private keys database located on the server and configured to store the shared key, the shared key being the private key of a user, and where the shared key is derived from the user's authentication data, and the derived shared key is used for encrypting all data. 9. The system of claim 8 wherein the server is configured to decrypt encrypted data received from the client using the shared key and to use a private server key, known only by the server, to re-encrypt the decrypted data.10. The system of claim 9 further comprising a secure data database configured to store the encrypted data received from the client and re-encrypted by the server and to deliver the stored data to the client or to another client; the delivered data, after the completion of a processing step, being encrypted with the shared user key or with another shared user key, and where the shared key is derived from the user's authentication data, and the derived shared key is used for encrypting all data.11. The system of claim 9 further comprising a secure data database configured to store the encrypted data received from the client and re-encrypted by the server and to deliver the stored data to the client or to another client; the delivered data being, upon receipt of a request for the data, encrypted with the shared user key or with another shared user key, where the shared key is derived from the user's authentication data, and the derived shared key is used for encrypting all data.12. The system of claim 11 wherein the request is from the user.13. The system of claim 11 wherein the request is from an other user.14. A system for using a shared key in transmitting secure data between a client and a server, the system comprising:an encrypt/decrypt engine for using the shared key entered by a user to encrypt data entered by the user, the encrypt/decrypt engine being configured such that all data entered by the user and stored on the client is stored in encrypted form, and further configured to encrypt data independently of an identity of the physical client; the shared key entry being the responsibility of the user and not the client; the server including a user private keys database configured to store the shared key, the shared key being a private key of a user; and not a physical client and, where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data. 15. The system of claim 14, wherein the encrypt/decrypt engine uses a symmetric key encryption/decryption algorithm for encrypting and decrypting data.16. The system of claim 14, further including a web server engine configured for the user to securely send or receive data from the client to the server.17. A method for using a shared key in receiving secure data on a server, comprising the steps of:delivering from a server to a client a web page including an encrypt/decrypt engine; encrypting data on the client using the encrypt/decrypt engine and a shared key entered by a user of the client, the shared key being shared between the user aid the server; delivering the encrypted data from the client to the server; where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data; receiving the encrypted data at the server; decrypting the encrypted data at the server using the shared key; and processing the decrypted data, where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data. 18. The method of claim 17, wherein the step of processing the decrypted data includes the steps of: encrypting the decrypted data with a private server key; and storing the encrypted data in a database.19. The method of claim 17, wherein the step of processing the decrypted data includes the steps of: re-encrypting the data with an other user's private key shared between the other user and the server; and sending the re-encrypted data to the other user.20. The method of claim 17, wherein the step of processing the decrypted data includes the steps of: decrypting the encrypted data with the private server key; re-encrypting the data with a second user's key shared between the second user and the server; and sending the re-encrypted data to the second user.21. The method of claim 17, wherein the step of processing the decrypted data includes the steps of: processing the data according to an instruction of the user; re-encrypting the processed data using the user's shared key; and sending the re-encrypted processed data to the user.22. The method of claim 17, wherein the step of, processing the decrypted data includes storing the decrypted data in a secure database.23. A computer-readable medium comprising program instructions for causing a computer system to use a shared key in receiving secure data at a server, by the steps of:delivering a web page from the server to a client, the web page including an encrypt/decrypt engine and being configured to use the encrypt/decrypt engine and a shared key entered by a user of the client to encrypt data on the client; the shared key being shared between the user and the server; receiving the encrypted data at then server; decrypting the encrypted data using the shared key; and processing the decrypted data where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data. 24. A computer-readable medium comprising program instructions for causing a computer system to receive secure data on a server using a shared key, by the steps of: delivering an encrypt/decrypt engine from the server to a client, the encrypt/decrypt engine being configured to use a shared key entered by a user of the client to encrypt data on the client, the shared key being shared between the user and the server and the encryption being independent of an identity of the physical client; receiving the encrypted data at the server; decrypting the encrypted data using the shared key; and processing the decrypted data, where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data.25. The computer readable medium of claim 24, further comprising program instructions for causing the processed decrypted data to be re-encrypted using a private server key.26. The computer-readable medium of claim 25, further comprising program instructions for causing the processed decrypted data to be stored in a secure database.27. The computer-readable medium of claim 24, wherein processing the decrypted data includes the steps of: re-encrypting the data with the private server key; storing the re-encrypted data; decrypting the stored data with the private server key; encrypting the data with a second user's key shaved between the second user and the server; and sending the encrypted data to the second user.28. The computer-readable medium of claim 24 wherein processing the decrypted data includes the steps of: processing the data according to an instruction of the user; encrypting the processed data using a shared key; and sending the encrypted processed data to the user or to another user.29. A method of using a shared key in transmitting secure data between a client and a server using a shared key, comprising the steps of: encrypting data using the shared key with an encrypt/decrypt engine configured to encrypt data independently of an identity of the client, the shared key being entered by a user of the client; delivering the encrypted data from the client to the server; receiving the encrypted data at the server; decrypting the encrypted data, at the server using the shared key, the shared key being stored in a user private keys database; and processing the decrypted data, where the shared key is derived from the user's authentication data and the derived shared key is used for encrypting all data.30. The method of claim 29, wherein processing the decrypted data includes the steps of: encrypting the decrypted data with a private server key; and storing the encrypted data, in a database.31. The method of claim 29, wherein the step of processing the decrypted data includes the steps of: encrypting the data with an other user's private key shared between the other user and the server; and sending the encrypted data to the other user.32. The method of claim 29, wherein the step of processing the decrypted data includes the steps of: decrypting the re-encrypted data with the private server key; encrypting the data with a second user's key shared between the second user and the server; and sending the encrypted data to the second user.33. The method of claim 29, wherein the step of processing the decrypted data includes the steps of: processing the data according to an instruction of the user; re-encrypting the processed data using the user's shared key; and sending the re-encrypted processed data to the user.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.