A METHOD AND SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER

    公开(公告)号:MY151312A

    公开(公告)日:2014-05-15

    申请号:MYPI2010004934

    申请日:2010-10-20

    Applicant: MIMOS BERHAD

    Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE ENCRYPTION IN A SERVER, THE METHOD (200) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (202), SELECTING AT LEAST ONE FILE FOR ENCRYPTION UPON SUCCESSFUL LOGIN TO A SERVER (204), INITIALIZING ENCRYPTION PROCESS TO GENERATE AN ENCRYPTION KEY, SK (206), ENCRYPTING AT LEAST ONE FILE USING THE ENCRYPTION KEY, SK TO OBTAIN X (208), STORING X IN A DATABASE OF THE SERVER (210), ENCRYPTING THE ENCRYPTION KEY, SK USING A USER PUBLIC KEY TO OBTAIN Y (212) AND STORING Y IN THE DATABASE OF THE SERVER (214). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE DECRYPTION IN A SERVER, THE METHOD (300) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (302), SELECTING THE ENCRYPTED FILE, X FROM A DATABASE OF THE SERVER FOR DECRYPTION (304), ACCESSING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER (306), FORWARDING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER FOR DECRYPTION (308), DECRYPTING THE ENCRYPTED FILE, Y USING USER PRIVATE KEY TO OBTAIN AN ENCRYPTION KEY, SK (310), ENCRYPTING THE ENCRYPTION KEY, SK USING SERVER PUBLIC KEY EXTRACTED FROM A SERVER CERTIFICATION TO OBTAIN AN ENCRYPTED FILE, Z (312), FORWARDING THE ENCRYPTED FILE, Z TO THE SERVER (314), DECRYPTING THE ENCRYPTED FILE, Z USING SERVER PRIVATE KEY TO OBTAIN ENCRYPTION KEY, SK (316) AND DECRYPTING ENCRYPTED FILE, X USING ENCRYPTION KEY, SK TO OBTAIN AN ORIGINAL DOCUMENT (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER, THE SYSTEM (400) COMPRISING A PLURALITY OF TOKENS (402), A CLIENT SYSTEM (404), A SERVER SYSTEM (406) AND A DATABASE (408). THE MOST ILLUSTRATIVE DRAWINGS:

    A METHOD OF CONTROLLING LICENSE KEY GENERATION

    公开(公告)号:MY149426A

    公开(公告)日:2013-08-30

    申请号:MYPI2010005503

    申请日:2010-11-23

    Applicant: MIMOS BERHAD

    Abstract: A METHOD OF GENERATING A SOFTWARE LICENSE KEY FOR A SOFTWARE VENDOR IN A CLIENT SYSTEM COMPRISES THE STEPS OF CONNECTING A SECURITY TOKEN AND MAKING REQUEST OF LICENSE KEY GENERATION (110) TO THE CLIENT SYSTEM THROUGH A COMMUNICATION MODULE THAT THE SECURITY TOKEN CONTAINS A FIRST VERIFICATION INFORMATION PACK, ENCRYPTED USING A SECRET KEY, INCLUDING A PRIMARY DIGITAL IDENTITY OF THE SOFTWARE VENDOR GENERATED BASED ON HARDWARE INFORMATION OF THE SECURITY TOKEN AND A FIRST DIGITAL COUNTER HAVING AN INTEGER N; EXTRACTING HARDWARE INFORMATION (120, 130) OF THE SECURITY TOKEN TO GENERATE A SECONDARY DIGITAL IDENTITY; DECRYPTING THE FIRST VERIFICATION INFORMATION PACK (140) USING THE SECRET KEY TO GAIN ACCESS OF THE PRIMARY DIGITAL IDENTITY AND THE DIGITAL COUNTER; VERIFYING (220) THE PRIMARY DIGITAL IDENTITY IS SIMILAR TO THE SECONDARY DIGITAL IDENTITY AND N IS NOT EQUAL TO ZERO; DECRYPTING (150, 160) A SECOND VERIFICATION INFORMATION PACK, WHICH CONTAINING A TERTIARY DIGITAL IDENTITY AND A SECOND DIGITAL COUNTER HAVING AN INTEGER X; GENERATING Z COPY OF LICENSE KEY (310) UPON VERIFYING (230) THAT THE PRIMARY AND TERTIARY DIGITAL IDENTITIES ARE THE SAME WHILE N EQUALS TO X; GENERATING (330) A THIRD DIGITAL COUNTER HAVING AN INTEGER OF (N-Z) OR (X-Z); ENCRYPTING THE THIRD DIGITAL COUNTER TOGETHER WITH THE PRIMARY OR TERTIARY DIGITAL IDENTITY USING THE SECRET KEY TO PRODUCE A THIRD VERIFICATION INFORMATION PACK; AND REPLACING (340, 350) THE FIRST AND SECOND VERIFICATION INFORMATION PACK WITH THE THIRD VERIFICATION INFORMATION PACK.

    A METHOD FOR CREATING AND VERIFYING DIGITAL SIGNATURE IN A SERVER

    公开(公告)号:MY151316A

    公开(公告)日:2014-05-15

    申请号:MYPI2010004936

    申请日:2010-10-20

    Applicant: MIMOS BERHAD

    Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (300) FOR CREATING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF LOGGING IN TO THE SERVER VIA USER?S DIGITAL CERTIFICATE (302), SELECTING AT LEAST ONE FILE FOR DIGITAL SIGNATURE CREATION (304), GENERATING AT LEAST ONE FILE OF DIGEST CODE [A] (306), EMBEDDING THE AT LEAST ONE FILE OF DIGEST CODE [A] IN A BROWSER EXTENSION PROGRAM AT CLIENT SIDE (308), ACTIVATING THE BROWSER EXTENSION PROGRAM (310), ENCRYPTING THE DIGEST CODE [A] WITH A USER PRIVATE KEY (312), TRANSMITTING THE ENCRYPTED DIGEST CODE [B] TO THE SERVER (314), CREATING A DIGITAL SIGNATURE AT THE SERVER (316) AND STORING THE DIGITAL SIGNATURE IN A DATABASE (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (400) FOR VERIFYING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF REQUESTING VERIFICATION OF A DIGITAL SIGNATURE HAVING AN ENCRYPTED DIGEST CODE [B] FROM A DATABASE IN A SERVER (402), RETRIEVING AT LEAST ONE ENCRYPTED DIGEST CODE [B] FROM THE DATABASE (404), GENERATING AT LEAST ONE FILE OF ORIGINAL DIGEST CODE [A] (406), RETRIEVING A USER PUBLIC KEY (408), DECRYPTING ENCRYPTED DIGEST CODE [B] FROM THE DIGITAL SIGNATURE USING THE USER PUBLIC KEY WHICH PRODUCES DECRYPTED DIGEST CODE [C] (410) AND COMPARING BOTH DIGEST ([A] = [C]) (412) TO DETERMINE A SUCCESS OR FAILURE RATE OF THE DECRYPTED INFORMATION. THE MOST ILLUSTRATIVE DRAWINGS:

    METHOD OF PERFORMING SECURE DOCUMENTS WITH A SECURITY TOKEN ON A TRUSTED COMPARTMENT

    公开(公告)号:MY151311A

    公开(公告)日:2014-05-15

    申请号:MYPI2010004834

    申请日:2010-10-14

    Applicant: MIMOS BERHAD

    Abstract: A PLATFORM HAVING A PREFERRED ARCHITECTURE COMPRISING OF HARDWARE (101), VIRTUALIZATION LAYER (102), AND A TRUSTED SOFTWARE LAYER (103). THE TRUSTED COMPARTMENT (200) IS FOUNDED ON THE VIRTUALIZATION (102) AND TRUSTED SOFTWARE LAYER (103). THIS ENABLES ANY APPLICATION TO RUN ON A SEPARATE COMPARTMENT FROM THE OTHER DOMAIN THAT HOUSES THE HOST OPERATING SYSTEM (104). WHEREIN, A USER INTERFACE MODULE (240) PROVIDES THE INTERFACE FOR THE USER TO PERFORM SECURITY METHODS ON A DOCUMENT. A COMMON INTERFACE MODULE (220) PROVIDES THE COMMON APPLICATION INTERFACES FOR CRYPTOGRAPHIC FUNCTION TO COMMUNICATE BETWEEN THE USER INTERFACE (240) AND TRUSTED COMPARTMENT (200) AND PASS THROUGH THE OPERATING SYSTEM (104). A TOKEN INTERFACE (230) PROVIDES AN INTERFACE FOR THE TRUSTED COMPARTMENT (200) TO COMMUNICATE WITH THE REAL TOKEN HARDWARE. AN CRYPTOGRAPHIC ENGINE MODULE (210) PROVIDES CRYPTOGRAPHIC FUNCTIONS TO SECURE DIGITAL DOCUMENT WITHIN THE TRUSTED COMPARTMENT (200). MOST ILLUSTRATIVE DRAWING:

    A SYSTEM AND METHOD FOR MULTIMODAL AUTHENTICATION PLATFORM

    公开(公告)号:MY155818A

    公开(公告)日:2015-12-02

    申请号:MYPI2012003211

    申请日:2012-07-13

    Applicant: MIMOS BERHAD

    Abstract: THE SYSTEM AND METHOD OF THE PRESENT INVENTION PROVIDES MULTIMODAL AUTHENTICATION PLATFORM AS A FRONT CHANNEL (100, 300) FOR USER TO ACCESS A PARTICULAR APPLICATION SITE WITH SECURITY INTACT. THE SYSTEM OF THE PRESENT INVENTION COMPRISING AT LEAST ONE USER (101); AT LEAST ONE AUTHENTICATION GATEWAY (105) AND AT LEAST ONE AUTHENTICATION SERVER (102). THE AT LEAST ONE AUTHENTICATION SERVER (102) COMPRISING AT LEAST ONE USER REGISTRATION MODULE (302); AT LEAST ONE USER PROFILE MODULE (303); AT LEAST ONE MANAGE AUTHENTICATION MODULE (301); AND AT LEAST ONE AUTHENTICATION DATABASE INTERFACE (304). THE METHODOLOGY OF THE PRESENT INVENTION COMPRISES STEPS OF ACCESSING APPLICATION SITE BY PROVIDING URL LINK (701); SETTING AUTHENTICATION MODULE (S) FOR USER ACCESS BASED ON AUTHENTICATION MODULE (S) PREFERENCE LIST (702); REDIRECTING USER TO AUTHENTICATION SITE (703); PROVIDING INTERFACE WITH MULTIMODAL AUTHENTICATION PLATFORM (704); SELECTING MODAL OF AUTHENTICATION TO ACCESS APPLICATION SITE (705); PRESENTING USER CREDENTIAL INFORMATION REQUIRED FOR SELECTED MODAL OF AUTHENTICATION (706); AUTHENTICATING USER BASED ON USER CREDENTIALS (707); AND GRANTING USER ACCESS TO APPLICATION SITE UPON SUCCESSFUL AUTHENTICATION (708). THE MOST ILLUSTRATIVE DRAWING IS

    TRUSTED NODE FOR GRID COMPUTING
    7.
    发明专利

    公开(公告)号:MY152190A

    公开(公告)日:2014-08-29

    申请号:MYPI20071632

    申请日:2007-09-27

    Applicant: MIMOS BERHAD

    Inventor: SIONG NG KANG

    Abstract: THERE IS DISCLOSED A METHOD AND APPARATUS ADAPTED FOR SECURING COMPUTING PROCESS RUNNING ON A COMPUTING HARDWARE NODE IN A GRID COMPUTING SYSTEM THROUGH THE FORMATION OF VIRTUAL TRUSTED NODE. GRID COMPUTING BREAKS UP A COMPUTATIONAL TASK INTO A SMALLER COMPUTATION SUB-TASKS. THESE SUB-TASKS ARE DISTRIBUTED TO MANY COMPUTERS WHERE ONCE EXECUTED, THE RESULTS ARE RETURNED TO A CENTRALIZED NODE FOR COMPILATION. DATA INTEGRITY AND SECURITY BECOMES ARE OF PARAMOUNT CONCERN. THE PROPOSED INVENTION SOLVE SUCH A CONCERN BY PROVIDING A METHOD OF CREATING A VIRTUAL TRUSTED NODE IN A GRID COMPUTING SYSTEM THROUGH THE CREATION OF WRAPPED-TASK (11, 21) BY WRAPPING A SOFTWARE FOR THE SUB-TASKS TOGETHER WITH AN OPERATING SYSTEM (12, 22), SENDING THE WRAPPED-TASK TO THE COMPUTER (40) IN THE GRID COMPUTING SYSTEM AND EXECUTING THE WRAPPED-TASK BY WAY OF A VIRTUAL MACHINE MONITOR (30) AND A TRUSTED PLATFORM MODULE (41). THE OPERATING SYSTEM IS PROVIDED WITH ONLY THE MINIMUM AND NECESSARY FUNCTIONS TO EXECUTE THE WRAPPED-TASK. A COMPUTER APPARATUS (40) FOR CREATING SUCH VIRTUAL TRUSTED NODE IS ALSO DISCLOSED. (THE MOST ILLUSTRATIVE

    SECURE SOFTWARE LICENSING CONTROL MECHANISM

    公开(公告)号:MY146126A

    公开(公告)日:2012-06-29

    申请号:MYPI20071944

    申请日:2007-11-09

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION RELATES TO A SYSTEM AND METHOD FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) FROM PIRACY WITHIN A COMPUTER SYSTEM BY USING A SMART CARD (32) AND A LICENSE CODE. THE SYSTEM FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) COMPRISES A SMART CARD (32), A LICENSED SOFTWARE (31), A REGISTRATION SOFTWARE (11) RUNNING ON A REGISTRATION SERVER (10) AND A LICENSE CODE GENERATOR (21). MEANWHILE, THE METHOD COMPRISES THE STEPS OF DETERMINING THE PRESENCE OF A LICENSE CODE, DECRYPTING THE LICENSE CODE USING USER'S PRIVATE KEY FROM THE SMART CARD (32), VERIFYING A DIGITAL SIGNATURE IN THE LICENSE CODE, AND CHECKING THE EXPIRY DATE OF THE SOFTWARE (31) FOR EXECUTION OF THE SOFTWARE APPLICATION. IF THE LICENSE CODE IS NOT AVAILABLE, THE METHOD FURTHER REQUIRES THE USER TO USE CERTIFICATE-BASED-LOGIN TO A WEBSITE AND REGISTER USING THE SMART CARD (32) THAT IS PROVIDED BY THE SOFTWARE VENDOR. SUBSEQUENTLY, USER'S INFORMATION AND CERTIFICATE IS SENT THROUGH A SECURE CHANNEL TO THE VENDOR'S SERVER AND SERVER SIDE APPLICATION DIGITALLY SIGNS THE PROGRAM LICENSE EXPIRY DATE AND ENCRYPT WITH RECIPIENT PUBLIC KEY. THEN, THE LICENSE CODE IS SENT BACK TO THE USER AND THE DECRYPTION AND VERIFICATION PROCESS OF THE DIGITAL SIGNATURE REPEATS.

    TRUSTED COMPUTER PLATFORM METHOD AND SYSTEM WITHOUT TRUST CREDENTIAL

    公开(公告)号:MY145949A

    公开(公告)日:2012-05-31

    申请号:MYPI20071578

    申请日:2007-09-20

    Applicant: MIMOS BERHAD

    Abstract: A TRUSTED COMPUTER PLATFORM (140) METHOD AND SYSTEM IS DISCLOSED FOR A SECURE COMPUTER SYSTEM WITHOUT A TRUST CREDENTIAL. THE PLATFORM (140) PROVIDES A FUNCTIONALITY OF A SECURE OR "TRUSTED COMPUTING" (TC) ENVIRONMENT TO PREVENT OR BLOCK UNAUTHORIZED COMPUTER PROGRAMS OR APPLICATIONS FROM RUNNING WITHIN THE COMPUTER SYSTEM AND PROVIDE A FULLY TRUSTED COMPUTER SYSTEM (140) HAVING 1) ENDORSEMENT KEY (118); 2) SECURE INPUT AND OUTPUT (102); 3) MEMORY CURTAINING / PROTECTED EXECUTION (104); 4) SEALED STORAGE; AND 5) REMOTE ATTESTATION (108). THE TRUSTED COMPUTER PLATFORM (140) IS AN IMPLEMENTATION THAT ACHIEVES AT LEAST A MECHANISM TO PROACTIVELY ESTABLISH MORE TRUSTED RELATIONSHIPS FOR REMOTE OR LOCAL ACCESS THROUGH SECURE USER AUTHENTICATION AND MACHINE ATTESTATION, PROTECT ENCRYPTION KEYS AND DIGITAL SIGNATURE KEYS TO MAINTAIN DATA CONFIDENTIALITY AND INTEGRITY, PROTECT KEY OPERATIONS AND OTHER SECURITY TASKS THAT WOULD OTHERWISE BE PERFORMED ON UNPROTECTED INTERFACES IN UNPROTECTED COMMUNICATIONS, OR PROTECT PLATFORM AND USER AUTHENTICATION INFORMATION FROM SOFTWARE- BASED ATTACKS.

Patent Agency Ranking