-
公开(公告)号:MY151312A
公开(公告)日:2014-05-15
申请号:MYPI2010004934
申请日:2010-10-20
Applicant: MIMOS BERHAD
Inventor: BEE TAN FUI , HARON GALOH RASHIDAH , SEAK SEA CHONG , SIONG NG KANG , SIAN TAN SOO , DAUD NOR IZYANI
Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE ENCRYPTION IN A SERVER, THE METHOD (200) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (202), SELECTING AT LEAST ONE FILE FOR ENCRYPTION UPON SUCCESSFUL LOGIN TO A SERVER (204), INITIALIZING ENCRYPTION PROCESS TO GENERATE AN ENCRYPTION KEY, SK (206), ENCRYPTING AT LEAST ONE FILE USING THE ENCRYPTION KEY, SK TO OBTAIN X (208), STORING X IN A DATABASE OF THE SERVER (210), ENCRYPTING THE ENCRYPTION KEY, SK USING A USER PUBLIC KEY TO OBTAIN Y (212) AND STORING Y IN THE DATABASE OF THE SERVER (214). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE DECRYPTION IN A SERVER, THE METHOD (300) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (302), SELECTING THE ENCRYPTED FILE, X FROM A DATABASE OF THE SERVER FOR DECRYPTION (304), ACCESSING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER (306), FORWARDING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER FOR DECRYPTION (308), DECRYPTING THE ENCRYPTED FILE, Y USING USER PRIVATE KEY TO OBTAIN AN ENCRYPTION KEY, SK (310), ENCRYPTING THE ENCRYPTION KEY, SK USING SERVER PUBLIC KEY EXTRACTED FROM A SERVER CERTIFICATION TO OBTAIN AN ENCRYPTED FILE, Z (312), FORWARDING THE ENCRYPTED FILE, Z TO THE SERVER (314), DECRYPTING THE ENCRYPTED FILE, Z USING SERVER PRIVATE KEY TO OBTAIN ENCRYPTION KEY, SK (316) AND DECRYPTING ENCRYPTED FILE, X USING ENCRYPTION KEY, SK TO OBTAIN AN ORIGINAL DOCUMENT (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER, THE SYSTEM (400) COMPRISING A PLURALITY OF TOKENS (402), A CLIENT SYSTEM (404), A SERVER SYSTEM (406) AND A DATABASE (408). THE MOST ILLUSTRATIVE DRAWINGS:
-
公开(公告)号:MY151316A
公开(公告)日:2014-05-15
申请号:MYPI2010004936
申请日:2010-10-20
Applicant: MIMOS BERHAD
Inventor: SEAK SEA CHONG , BEE TAN FUI , SIONG NG KANG , HARON GALOH RASHIDAH , SIAN TAN SOO , DAUD NOR IZYANI
IPC: G06F21/64
Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (300) FOR CREATING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF LOGGING IN TO THE SERVER VIA USER?S DIGITAL CERTIFICATE (302), SELECTING AT LEAST ONE FILE FOR DIGITAL SIGNATURE CREATION (304), GENERATING AT LEAST ONE FILE OF DIGEST CODE [A] (306), EMBEDDING THE AT LEAST ONE FILE OF DIGEST CODE [A] IN A BROWSER EXTENSION PROGRAM AT CLIENT SIDE (308), ACTIVATING THE BROWSER EXTENSION PROGRAM (310), ENCRYPTING THE DIGEST CODE [A] WITH A USER PRIVATE KEY (312), TRANSMITTING THE ENCRYPTED DIGEST CODE [B] TO THE SERVER (314), CREATING A DIGITAL SIGNATURE AT THE SERVER (316) AND STORING THE DIGITAL SIGNATURE IN A DATABASE (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (400) FOR VERIFYING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF REQUESTING VERIFICATION OF A DIGITAL SIGNATURE HAVING AN ENCRYPTED DIGEST CODE [B] FROM A DATABASE IN A SERVER (402), RETRIEVING AT LEAST ONE ENCRYPTED DIGEST CODE [B] FROM THE DATABASE (404), GENERATING AT LEAST ONE FILE OF ORIGINAL DIGEST CODE [A] (406), RETRIEVING A USER PUBLIC KEY (408), DECRYPTING ENCRYPTED DIGEST CODE [B] FROM THE DIGITAL SIGNATURE USING THE USER PUBLIC KEY WHICH PRODUCES DECRYPTED DIGEST CODE [C] (410) AND COMPARING BOTH DIGEST ([A] = [C]) (412) TO DETERMINE A SUCCESS OR FAILURE RATE OF THE DECRYPTED INFORMATION. THE MOST ILLUSTRATIVE DRAWINGS:
-
公开(公告)号:MY150173A
公开(公告)日:2013-12-13
申请号:MYPI20091055
申请日:2009-03-16
Applicant: MIMOS BERHAD
Inventor: SEAK SEA CHONG , SIONG NG KANG , BEE TAN FUI , HARON GALOH RASHIDAH
IPC: H04L9/00
Abstract: THIS INVENTION METHOD FOR GENERATING PROXY CERTIFICATE (101) ON WEB PORTAL IS A MEANS OF SECURE AND RELIABLE ACCESS TO A WEB PORTAL. THIS SYSTEM WILL PREVENT IDENTITY FRAUD OVER THE WEB AND IS A SECURE MEANS OF ACCESSING PERSONAL INFORMATION ONLINE.
-
公开(公告)号:MY146126A
公开(公告)日:2012-06-29
申请号:MYPI20071944
申请日:2007-11-09
Applicant: MIMOS BERHAD
Inventor: SIONG NG KANG , BEE TAN FUI
Abstract: THE PRESENT INVENTION RELATES TO A SYSTEM AND METHOD FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) FROM PIRACY WITHIN A COMPUTER SYSTEM BY USING A SMART CARD (32) AND A LICENSE CODE. THE SYSTEM FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) COMPRISES A SMART CARD (32), A LICENSED SOFTWARE (31), A REGISTRATION SOFTWARE (11) RUNNING ON A REGISTRATION SERVER (10) AND A LICENSE CODE GENERATOR (21). MEANWHILE, THE METHOD COMPRISES THE STEPS OF DETERMINING THE PRESENCE OF A LICENSE CODE, DECRYPTING THE LICENSE CODE USING USER'S PRIVATE KEY FROM THE SMART CARD (32), VERIFYING A DIGITAL SIGNATURE IN THE LICENSE CODE, AND CHECKING THE EXPIRY DATE OF THE SOFTWARE (31) FOR EXECUTION OF THE SOFTWARE APPLICATION. IF THE LICENSE CODE IS NOT AVAILABLE, THE METHOD FURTHER REQUIRES THE USER TO USE CERTIFICATE-BASED-LOGIN TO A WEBSITE AND REGISTER USING THE SMART CARD (32) THAT IS PROVIDED BY THE SOFTWARE VENDOR. SUBSEQUENTLY, USER'S INFORMATION AND CERTIFICATE IS SENT THROUGH A SECURE CHANNEL TO THE VENDOR'S SERVER AND SERVER SIDE APPLICATION DIGITALLY SIGNS THE PROGRAM LICENSE EXPIRY DATE AND ENCRYPT WITH RECIPIENT PUBLIC KEY. THEN, THE LICENSE CODE IS SENT BACK TO THE USER AND THE DECRYPTION AND VERIFICATION PROCESS OF THE DIGITAL SIGNATURE REPEATS.
-
公开(公告)号:MY145949A
公开(公告)日:2012-05-31
申请号:MYPI20071578
申请日:2007-09-20
Applicant: MIMOS BERHAD
Inventor: KEONG WONG HAU , HARON GALOH RASHIDAH , BEE TAN FUI , SEAK SEA CHONG , SIONG NG KANG , TALIB AZHAR BIN ABU
Abstract: A TRUSTED COMPUTER PLATFORM (140) METHOD AND SYSTEM IS DISCLOSED FOR A SECURE COMPUTER SYSTEM WITHOUT A TRUST CREDENTIAL. THE PLATFORM (140) PROVIDES A FUNCTIONALITY OF A SECURE OR "TRUSTED COMPUTING" (TC) ENVIRONMENT TO PREVENT OR BLOCK UNAUTHORIZED COMPUTER PROGRAMS OR APPLICATIONS FROM RUNNING WITHIN THE COMPUTER SYSTEM AND PROVIDE A FULLY TRUSTED COMPUTER SYSTEM (140) HAVING 1) ENDORSEMENT KEY (118); 2) SECURE INPUT AND OUTPUT (102); 3) MEMORY CURTAINING / PROTECTED EXECUTION (104); 4) SEALED STORAGE; AND 5) REMOTE ATTESTATION (108). THE TRUSTED COMPUTER PLATFORM (140) IS AN IMPLEMENTATION THAT ACHIEVES AT LEAST A MECHANISM TO PROACTIVELY ESTABLISH MORE TRUSTED RELATIONSHIPS FOR REMOTE OR LOCAL ACCESS THROUGH SECURE USER AUTHENTICATION AND MACHINE ATTESTATION, PROTECT ENCRYPTION KEYS AND DIGITAL SIGNATURE KEYS TO MAINTAIN DATA CONFIDENTIALITY AND INTEGRITY, PROTECT KEY OPERATIONS AND OTHER SECURITY TASKS THAT WOULD OTHERWISE BE PERFORMED ON UNPROTECTED INTERFACES IN UNPROTECTED COMMUNICATIONS, OR PROTECT PLATFORM AND USER AUTHENTICATION INFORMATION FROM SOFTWARE- BASED ATTACKS.
-
-
-
-