A METHOD AND SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER

    公开(公告)号:MY151312A

    公开(公告)日:2014-05-15

    申请号:MYPI2010004934

    申请日:2010-10-20

    Applicant: MIMOS BERHAD

    Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE ENCRYPTION IN A SERVER, THE METHOD (200) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (202), SELECTING AT LEAST ONE FILE FOR ENCRYPTION UPON SUCCESSFUL LOGIN TO A SERVER (204), INITIALIZING ENCRYPTION PROCESS TO GENERATE AN ENCRYPTION KEY, SK (206), ENCRYPTING AT LEAST ONE FILE USING THE ENCRYPTION KEY, SK TO OBTAIN X (208), STORING X IN A DATABASE OF THE SERVER (210), ENCRYPTING THE ENCRYPTION KEY, SK USING A USER PUBLIC KEY TO OBTAIN Y (212) AND STORING Y IN THE DATABASE OF THE SERVER (214). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE DECRYPTION IN A SERVER, THE METHOD (300) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (302), SELECTING THE ENCRYPTED FILE, X FROM A DATABASE OF THE SERVER FOR DECRYPTION (304), ACCESSING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER (306), FORWARDING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER FOR DECRYPTION (308), DECRYPTING THE ENCRYPTED FILE, Y USING USER PRIVATE KEY TO OBTAIN AN ENCRYPTION KEY, SK (310), ENCRYPTING THE ENCRYPTION KEY, SK USING SERVER PUBLIC KEY EXTRACTED FROM A SERVER CERTIFICATION TO OBTAIN AN ENCRYPTED FILE, Z (312), FORWARDING THE ENCRYPTED FILE, Z TO THE SERVER (314), DECRYPTING THE ENCRYPTED FILE, Z USING SERVER PRIVATE KEY TO OBTAIN ENCRYPTION KEY, SK (316) AND DECRYPTING ENCRYPTED FILE, X USING ENCRYPTION KEY, SK TO OBTAIN AN ORIGINAL DOCUMENT (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER, THE SYSTEM (400) COMPRISING A PLURALITY OF TOKENS (402), A CLIENT SYSTEM (404), A SERVER SYSTEM (406) AND A DATABASE (408). THE MOST ILLUSTRATIVE DRAWINGS:

    A METHOD FOR CREATING AND VERIFYING DIGITAL SIGNATURE IN A SERVER

    公开(公告)号:MY151316A

    公开(公告)日:2014-05-15

    申请号:MYPI2010004936

    申请日:2010-10-20

    Applicant: MIMOS BERHAD

    Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (300) FOR CREATING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF LOGGING IN TO THE SERVER VIA USER?S DIGITAL CERTIFICATE (302), SELECTING AT LEAST ONE FILE FOR DIGITAL SIGNATURE CREATION (304), GENERATING AT LEAST ONE FILE OF DIGEST CODE [A] (306), EMBEDDING THE AT LEAST ONE FILE OF DIGEST CODE [A] IN A BROWSER EXTENSION PROGRAM AT CLIENT SIDE (308), ACTIVATING THE BROWSER EXTENSION PROGRAM (310), ENCRYPTING THE DIGEST CODE [A] WITH A USER PRIVATE KEY (312), TRANSMITTING THE ENCRYPTED DIGEST CODE [B] TO THE SERVER (314), CREATING A DIGITAL SIGNATURE AT THE SERVER (316) AND STORING THE DIGITAL SIGNATURE IN A DATABASE (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (400) FOR VERIFYING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF REQUESTING VERIFICATION OF A DIGITAL SIGNATURE HAVING AN ENCRYPTED DIGEST CODE [B] FROM A DATABASE IN A SERVER (402), RETRIEVING AT LEAST ONE ENCRYPTED DIGEST CODE [B] FROM THE DATABASE (404), GENERATING AT LEAST ONE FILE OF ORIGINAL DIGEST CODE [A] (406), RETRIEVING A USER PUBLIC KEY (408), DECRYPTING ENCRYPTED DIGEST CODE [B] FROM THE DIGITAL SIGNATURE USING THE USER PUBLIC KEY WHICH PRODUCES DECRYPTED DIGEST CODE [C] (410) AND COMPARING BOTH DIGEST ([A] = [C]) (412) TO DETERMINE A SUCCESS OR FAILURE RATE OF THE DECRYPTED INFORMATION. THE MOST ILLUSTRATIVE DRAWINGS:

    SECURE SOFTWARE LICENSING CONTROL MECHANISM

    公开(公告)号:MY146126A

    公开(公告)日:2012-06-29

    申请号:MYPI20071944

    申请日:2007-11-09

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION RELATES TO A SYSTEM AND METHOD FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) FROM PIRACY WITHIN A COMPUTER SYSTEM BY USING A SMART CARD (32) AND A LICENSE CODE. THE SYSTEM FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) COMPRISES A SMART CARD (32), A LICENSED SOFTWARE (31), A REGISTRATION SOFTWARE (11) RUNNING ON A REGISTRATION SERVER (10) AND A LICENSE CODE GENERATOR (21). MEANWHILE, THE METHOD COMPRISES THE STEPS OF DETERMINING THE PRESENCE OF A LICENSE CODE, DECRYPTING THE LICENSE CODE USING USER'S PRIVATE KEY FROM THE SMART CARD (32), VERIFYING A DIGITAL SIGNATURE IN THE LICENSE CODE, AND CHECKING THE EXPIRY DATE OF THE SOFTWARE (31) FOR EXECUTION OF THE SOFTWARE APPLICATION. IF THE LICENSE CODE IS NOT AVAILABLE, THE METHOD FURTHER REQUIRES THE USER TO USE CERTIFICATE-BASED-LOGIN TO A WEBSITE AND REGISTER USING THE SMART CARD (32) THAT IS PROVIDED BY THE SOFTWARE VENDOR. SUBSEQUENTLY, USER'S INFORMATION AND CERTIFICATE IS SENT THROUGH A SECURE CHANNEL TO THE VENDOR'S SERVER AND SERVER SIDE APPLICATION DIGITALLY SIGNS THE PROGRAM LICENSE EXPIRY DATE AND ENCRYPT WITH RECIPIENT PUBLIC KEY. THEN, THE LICENSE CODE IS SENT BACK TO THE USER AND THE DECRYPTION AND VERIFICATION PROCESS OF THE DIGITAL SIGNATURE REPEATS.

    TRUSTED COMPUTER PLATFORM METHOD AND SYSTEM WITHOUT TRUST CREDENTIAL

    公开(公告)号:MY145949A

    公开(公告)日:2012-05-31

    申请号:MYPI20071578

    申请日:2007-09-20

    Applicant: MIMOS BERHAD

    Abstract: A TRUSTED COMPUTER PLATFORM (140) METHOD AND SYSTEM IS DISCLOSED FOR A SECURE COMPUTER SYSTEM WITHOUT A TRUST CREDENTIAL. THE PLATFORM (140) PROVIDES A FUNCTIONALITY OF A SECURE OR "TRUSTED COMPUTING" (TC) ENVIRONMENT TO PREVENT OR BLOCK UNAUTHORIZED COMPUTER PROGRAMS OR APPLICATIONS FROM RUNNING WITHIN THE COMPUTER SYSTEM AND PROVIDE A FULLY TRUSTED COMPUTER SYSTEM (140) HAVING 1) ENDORSEMENT KEY (118); 2) SECURE INPUT AND OUTPUT (102); 3) MEMORY CURTAINING / PROTECTED EXECUTION (104); 4) SEALED STORAGE; AND 5) REMOTE ATTESTATION (108). THE TRUSTED COMPUTER PLATFORM (140) IS AN IMPLEMENTATION THAT ACHIEVES AT LEAST A MECHANISM TO PROACTIVELY ESTABLISH MORE TRUSTED RELATIONSHIPS FOR REMOTE OR LOCAL ACCESS THROUGH SECURE USER AUTHENTICATION AND MACHINE ATTESTATION, PROTECT ENCRYPTION KEYS AND DIGITAL SIGNATURE KEYS TO MAINTAIN DATA CONFIDENTIALITY AND INTEGRITY, PROTECT KEY OPERATIONS AND OTHER SECURITY TASKS THAT WOULD OTHERWISE BE PERFORMED ON UNPROTECTED INTERFACES IN UNPROTECTED COMMUNICATIONS, OR PROTECT PLATFORM AND USER AUTHENTICATION INFORMATION FROM SOFTWARE- BASED ATTACKS.

Patent Agency Ranking