-
公开(公告)号:MY151312A
公开(公告)日:2014-05-15
申请号:MYPI2010004934
申请日:2010-10-20
Applicant: MIMOS BERHAD
Inventor: BEE TAN FUI , HARON GALOH RASHIDAH , SEAK SEA CHONG , SIONG NG KANG , SIAN TAN SOO , DAUD NOR IZYANI
Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE ENCRYPTION IN A SERVER, THE METHOD (200) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (202), SELECTING AT LEAST ONE FILE FOR ENCRYPTION UPON SUCCESSFUL LOGIN TO A SERVER (204), INITIALIZING ENCRYPTION PROCESS TO GENERATE AN ENCRYPTION KEY, SK (206), ENCRYPTING AT LEAST ONE FILE USING THE ENCRYPTION KEY, SK TO OBTAIN X (208), STORING X IN A DATABASE OF THE SERVER (210), ENCRYPTING THE ENCRYPTION KEY, SK USING A USER PUBLIC KEY TO OBTAIN Y (212) AND STORING Y IN THE DATABASE OF THE SERVER (214). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD FOR FILE DECRYPTION IN A SERVER, THE METHOD (300) COMPRISING THE STEPS OF ACCESSING A SERVER BY LOGGING IN TO A SERVER VIA A PREDETERMINED PROGRAMMING LANGUAGE (302), SELECTING THE ENCRYPTED FILE, X FROM A DATABASE OF THE SERVER FOR DECRYPTION (304), ACCESSING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER (306), FORWARDING THE ENCRYPTED FILE, Y FROM THE DATABASE OF THE SERVER FOR DECRYPTION (308), DECRYPTING THE ENCRYPTED FILE, Y USING USER PRIVATE KEY TO OBTAIN AN ENCRYPTION KEY, SK (310), ENCRYPTING THE ENCRYPTION KEY, SK USING SERVER PUBLIC KEY EXTRACTED FROM A SERVER CERTIFICATION TO OBTAIN AN ENCRYPTED FILE, Z (312), FORWARDING THE ENCRYPTED FILE, Z TO THE SERVER (314), DECRYPTING THE ENCRYPTED FILE, Z USING SERVER PRIVATE KEY TO OBTAIN ENCRYPTION KEY, SK (316) AND DECRYPTING ENCRYPTED FILE, X USING ENCRYPTION KEY, SK TO OBTAIN AN ORIGINAL DOCUMENT (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A SYSTEM FOR FILE ENCRYPTION AND DECRYPTION IN A SERVER, THE SYSTEM (400) COMPRISING A PLURALITY OF TOKENS (402), A CLIENT SYSTEM (404), A SERVER SYSTEM (406) AND A DATABASE (408). THE MOST ILLUSTRATIVE DRAWINGS:
-
公开(公告)号:MY149426A
公开(公告)日:2013-08-30
申请号:MYPI2010005503
申请日:2010-11-23
Applicant: MIMOS BERHAD
Inventor: SEAK SEA CHONG , SIONG NG KANG
Abstract: A METHOD OF GENERATING A SOFTWARE LICENSE KEY FOR A SOFTWARE VENDOR IN A CLIENT SYSTEM COMPRISES THE STEPS OF CONNECTING A SECURITY TOKEN AND MAKING REQUEST OF LICENSE KEY GENERATION (110) TO THE CLIENT SYSTEM THROUGH A COMMUNICATION MODULE THAT THE SECURITY TOKEN CONTAINS A FIRST VERIFICATION INFORMATION PACK, ENCRYPTED USING A SECRET KEY, INCLUDING A PRIMARY DIGITAL IDENTITY OF THE SOFTWARE VENDOR GENERATED BASED ON HARDWARE INFORMATION OF THE SECURITY TOKEN AND A FIRST DIGITAL COUNTER HAVING AN INTEGER N; EXTRACTING HARDWARE INFORMATION (120, 130) OF THE SECURITY TOKEN TO GENERATE A SECONDARY DIGITAL IDENTITY; DECRYPTING THE FIRST VERIFICATION INFORMATION PACK (140) USING THE SECRET KEY TO GAIN ACCESS OF THE PRIMARY DIGITAL IDENTITY AND THE DIGITAL COUNTER; VERIFYING (220) THE PRIMARY DIGITAL IDENTITY IS SIMILAR TO THE SECONDARY DIGITAL IDENTITY AND N IS NOT EQUAL TO ZERO; DECRYPTING (150, 160) A SECOND VERIFICATION INFORMATION PACK, WHICH CONTAINING A TERTIARY DIGITAL IDENTITY AND A SECOND DIGITAL COUNTER HAVING AN INTEGER X; GENERATING Z COPY OF LICENSE KEY (310) UPON VERIFYING (230) THAT THE PRIMARY AND TERTIARY DIGITAL IDENTITIES ARE THE SAME WHILE N EQUALS TO X; GENERATING (330) A THIRD DIGITAL COUNTER HAVING AN INTEGER OF (N-Z) OR (X-Z); ENCRYPTING THE THIRD DIGITAL COUNTER TOGETHER WITH THE PRIMARY OR TERTIARY DIGITAL IDENTITY USING THE SECRET KEY TO PRODUCE A THIRD VERIFICATION INFORMATION PACK; AND REPLACING (340, 350) THE FIRST AND SECOND VERIFICATION INFORMATION PACK WITH THE THIRD VERIFICATION INFORMATION PACK.
-
公开(公告)号:MY151316A
公开(公告)日:2014-05-15
申请号:MYPI2010004936
申请日:2010-10-20
Applicant: MIMOS BERHAD
Inventor: SEAK SEA CHONG , BEE TAN FUI , SIONG NG KANG , HARON GALOH RASHIDAH , SIAN TAN SOO , DAUD NOR IZYANI
IPC: G06F21/64
Abstract: ONE EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (300) FOR CREATING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF LOGGING IN TO THE SERVER VIA USER?S DIGITAL CERTIFICATE (302), SELECTING AT LEAST ONE FILE FOR DIGITAL SIGNATURE CREATION (304), GENERATING AT LEAST ONE FILE OF DIGEST CODE [A] (306), EMBEDDING THE AT LEAST ONE FILE OF DIGEST CODE [A] IN A BROWSER EXTENSION PROGRAM AT CLIENT SIDE (308), ACTIVATING THE BROWSER EXTENSION PROGRAM (310), ENCRYPTING THE DIGEST CODE [A] WITH A USER PRIVATE KEY (312), TRANSMITTING THE ENCRYPTED DIGEST CODE [B] TO THE SERVER (314), CREATING A DIGITAL SIGNATURE AT THE SERVER (316) AND STORING THE DIGITAL SIGNATURE IN A DATABASE (318). ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (400) FOR VERIFYING DIGITAL SIGNATURE IN A SERVER, THE METHOD COMPRISING THE STEPS OF REQUESTING VERIFICATION OF A DIGITAL SIGNATURE HAVING AN ENCRYPTED DIGEST CODE [B] FROM A DATABASE IN A SERVER (402), RETRIEVING AT LEAST ONE ENCRYPTED DIGEST CODE [B] FROM THE DATABASE (404), GENERATING AT LEAST ONE FILE OF ORIGINAL DIGEST CODE [A] (406), RETRIEVING A USER PUBLIC KEY (408), DECRYPTING ENCRYPTED DIGEST CODE [B] FROM THE DIGITAL SIGNATURE USING THE USER PUBLIC KEY WHICH PRODUCES DECRYPTED DIGEST CODE [C] (410) AND COMPARING BOTH DIGEST ([A] = [C]) (412) TO DETERMINE A SUCCESS OR FAILURE RATE OF THE DECRYPTED INFORMATION. THE MOST ILLUSTRATIVE DRAWINGS:
-
公开(公告)号:MY151311A
公开(公告)日:2014-05-15
申请号:MYPI2010004834
申请日:2010-10-14
Applicant: MIMOS BERHAD
Inventor: SIONG NG KANG , HARON GALOH RASHIDAH , SEAK SEA CHONG , MOHAMAD WAN AHMAD ZAINIE WAN
IPC: G06F21/57
Abstract: A PLATFORM HAVING A PREFERRED ARCHITECTURE COMPRISING OF HARDWARE (101), VIRTUALIZATION LAYER (102), AND A TRUSTED SOFTWARE LAYER (103). THE TRUSTED COMPARTMENT (200) IS FOUNDED ON THE VIRTUALIZATION (102) AND TRUSTED SOFTWARE LAYER (103). THIS ENABLES ANY APPLICATION TO RUN ON A SEPARATE COMPARTMENT FROM THE OTHER DOMAIN THAT HOUSES THE HOST OPERATING SYSTEM (104). WHEREIN, A USER INTERFACE MODULE (240) PROVIDES THE INTERFACE FOR THE USER TO PERFORM SECURITY METHODS ON A DOCUMENT. A COMMON INTERFACE MODULE (220) PROVIDES THE COMMON APPLICATION INTERFACES FOR CRYPTOGRAPHIC FUNCTION TO COMMUNICATE BETWEEN THE USER INTERFACE (240) AND TRUSTED COMPARTMENT (200) AND PASS THROUGH THE OPERATING SYSTEM (104). A TOKEN INTERFACE (230) PROVIDES AN INTERFACE FOR THE TRUSTED COMPARTMENT (200) TO COMMUNICATE WITH THE REAL TOKEN HARDWARE. AN CRYPTOGRAPHIC ENGINE MODULE (210) PROVIDES CRYPTOGRAPHIC FUNCTIONS TO SECURE DIGITAL DOCUMENT WITHIN THE TRUSTED COMPARTMENT (200). MOST ILLUSTRATIVE DRAWING:
-
公开(公告)号:MY155818A
公开(公告)日:2015-12-02
申请号:MYPI2012003211
申请日:2012-07-13
Applicant: MIMOS BERHAD
Inventor: SIONG NG KANG , HARON GALOH RASHIDAH , LOON WONG HON , MANIAM DHARMADHARSHINI , SEAK SEA CHONG , DAUD NOR IZYANI
IPC: H04L29/06
Abstract: THE SYSTEM AND METHOD OF THE PRESENT INVENTION PROVIDES MULTIMODAL AUTHENTICATION PLATFORM AS A FRONT CHANNEL (100, 300) FOR USER TO ACCESS A PARTICULAR APPLICATION SITE WITH SECURITY INTACT. THE SYSTEM OF THE PRESENT INVENTION COMPRISING AT LEAST ONE USER (101); AT LEAST ONE AUTHENTICATION GATEWAY (105) AND AT LEAST ONE AUTHENTICATION SERVER (102). THE AT LEAST ONE AUTHENTICATION SERVER (102) COMPRISING AT LEAST ONE USER REGISTRATION MODULE (302); AT LEAST ONE USER PROFILE MODULE (303); AT LEAST ONE MANAGE AUTHENTICATION MODULE (301); AND AT LEAST ONE AUTHENTICATION DATABASE INTERFACE (304). THE METHODOLOGY OF THE PRESENT INVENTION COMPRISES STEPS OF ACCESSING APPLICATION SITE BY PROVIDING URL LINK (701); SETTING AUTHENTICATION MODULE (S) FOR USER ACCESS BASED ON AUTHENTICATION MODULE (S) PREFERENCE LIST (702); REDIRECTING USER TO AUTHENTICATION SITE (703); PROVIDING INTERFACE WITH MULTIMODAL AUTHENTICATION PLATFORM (704); SELECTING MODAL OF AUTHENTICATION TO ACCESS APPLICATION SITE (705); PRESENTING USER CREDENTIAL INFORMATION REQUIRED FOR SELECTED MODAL OF AUTHENTICATION (706); AUTHENTICATING USER BASED ON USER CREDENTIALS (707); AND GRANTING USER ACCESS TO APPLICATION SITE UPON SUCCESSFUL AUTHENTICATION (708). THE MOST ILLUSTRATIVE DRAWING IS
-
公开(公告)号:MY149764A
公开(公告)日:2013-10-14
申请号:MYPI20084710
申请日:2008-11-21
Applicant: MIMOS BERHAD
Inventor: TAHIR SHAHIRINA MOHD , KUAN LIM MEI , KIRAN MALEEHA , SIONG NG KANG , AL-TALIB SAHAR ABDUL AZIZ MAGEED DR
IPC: H01R25/00
Abstract: THE PRESENT INVENTION IS A NESTED POWER STRIP APPARATUS WHICH EXTENDS AN ELECTRICITY SUPPLY TO A PLURALITY OF ELECTRICAL EQUIPMENTS. THE APPARATUS MAXIMIZES A NUMBER OF SOCKETS (10) AND AT THE SAME TIME MAXIMIZES DISTANCE BETWEEN SOCKETS (10). HAVING THE PRESENT INVENTION IN A CYLINDRICAL SHAPE FOR EXAMPLE, ALLOWS ACCOMMODATION OF MORE SOCKETS (10) AND HAVING A NESTED ATTRIBUTE REDUCES TOTAL SPACE TAKEN UP WHEN THE APPARATUS IS NOT IN USE.
-
公开(公告)号:MY152190A
公开(公告)日:2014-08-29
申请号:MYPI20071632
申请日:2007-09-27
Applicant: MIMOS BERHAD
Inventor: SIONG NG KANG
IPC: G06F15/16
Abstract: THERE IS DISCLOSED A METHOD AND APPARATUS ADAPTED FOR SECURING COMPUTING PROCESS RUNNING ON A COMPUTING HARDWARE NODE IN A GRID COMPUTING SYSTEM THROUGH THE FORMATION OF VIRTUAL TRUSTED NODE. GRID COMPUTING BREAKS UP A COMPUTATIONAL TASK INTO A SMALLER COMPUTATION SUB-TASKS. THESE SUB-TASKS ARE DISTRIBUTED TO MANY COMPUTERS WHERE ONCE EXECUTED, THE RESULTS ARE RETURNED TO A CENTRALIZED NODE FOR COMPILATION. DATA INTEGRITY AND SECURITY BECOMES ARE OF PARAMOUNT CONCERN. THE PROPOSED INVENTION SOLVE SUCH A CONCERN BY PROVIDING A METHOD OF CREATING A VIRTUAL TRUSTED NODE IN A GRID COMPUTING SYSTEM THROUGH THE CREATION OF WRAPPED-TASK (11, 21) BY WRAPPING A SOFTWARE FOR THE SUB-TASKS TOGETHER WITH AN OPERATING SYSTEM (12, 22), SENDING THE WRAPPED-TASK TO THE COMPUTER (40) IN THE GRID COMPUTING SYSTEM AND EXECUTING THE WRAPPED-TASK BY WAY OF A VIRTUAL MACHINE MONITOR (30) AND A TRUSTED PLATFORM MODULE (41). THE OPERATING SYSTEM IS PROVIDED WITH ONLY THE MINIMUM AND NECESSARY FUNCTIONS TO EXECUTE THE WRAPPED-TASK. A COMPUTER APPARATUS (40) FOR CREATING SUCH VIRTUAL TRUSTED NODE IS ALSO DISCLOSED. (THE MOST ILLUSTRATIVE
-
公开(公告)号:MY150173A
公开(公告)日:2013-12-13
申请号:MYPI20091055
申请日:2009-03-16
Applicant: MIMOS BERHAD
Inventor: SEAK SEA CHONG , SIONG NG KANG , BEE TAN FUI , HARON GALOH RASHIDAH
IPC: H04L9/00
Abstract: THIS INVENTION METHOD FOR GENERATING PROXY CERTIFICATE (101) ON WEB PORTAL IS A MEANS OF SECURE AND RELIABLE ACCESS TO A WEB PORTAL. THIS SYSTEM WILL PREVENT IDENTITY FRAUD OVER THE WEB AND IS A SECURE MEANS OF ACCESSING PERSONAL INFORMATION ONLINE.
-
公开(公告)号:MY146126A
公开(公告)日:2012-06-29
申请号:MYPI20071944
申请日:2007-11-09
Applicant: MIMOS BERHAD
Inventor: SIONG NG KANG , BEE TAN FUI
Abstract: THE PRESENT INVENTION RELATES TO A SYSTEM AND METHOD FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) FROM PIRACY WITHIN A COMPUTER SYSTEM BY USING A SMART CARD (32) AND A LICENSE CODE. THE SYSTEM FOR PROTECTING A LICENSED SOFTWARE APPLICATION (31) COMPRISES A SMART CARD (32), A LICENSED SOFTWARE (31), A REGISTRATION SOFTWARE (11) RUNNING ON A REGISTRATION SERVER (10) AND A LICENSE CODE GENERATOR (21). MEANWHILE, THE METHOD COMPRISES THE STEPS OF DETERMINING THE PRESENCE OF A LICENSE CODE, DECRYPTING THE LICENSE CODE USING USER'S PRIVATE KEY FROM THE SMART CARD (32), VERIFYING A DIGITAL SIGNATURE IN THE LICENSE CODE, AND CHECKING THE EXPIRY DATE OF THE SOFTWARE (31) FOR EXECUTION OF THE SOFTWARE APPLICATION. IF THE LICENSE CODE IS NOT AVAILABLE, THE METHOD FURTHER REQUIRES THE USER TO USE CERTIFICATE-BASED-LOGIN TO A WEBSITE AND REGISTER USING THE SMART CARD (32) THAT IS PROVIDED BY THE SOFTWARE VENDOR. SUBSEQUENTLY, USER'S INFORMATION AND CERTIFICATE IS SENT THROUGH A SECURE CHANNEL TO THE VENDOR'S SERVER AND SERVER SIDE APPLICATION DIGITALLY SIGNS THE PROGRAM LICENSE EXPIRY DATE AND ENCRYPT WITH RECIPIENT PUBLIC KEY. THEN, THE LICENSE CODE IS SENT BACK TO THE USER AND THE DECRYPTION AND VERIFICATION PROCESS OF THE DIGITAL SIGNATURE REPEATS.
-
公开(公告)号:MY145949A
公开(公告)日:2012-05-31
申请号:MYPI20071578
申请日:2007-09-20
Applicant: MIMOS BERHAD
Inventor: KEONG WONG HAU , HARON GALOH RASHIDAH , BEE TAN FUI , SEAK SEA CHONG , SIONG NG KANG , TALIB AZHAR BIN ABU
Abstract: A TRUSTED COMPUTER PLATFORM (140) METHOD AND SYSTEM IS DISCLOSED FOR A SECURE COMPUTER SYSTEM WITHOUT A TRUST CREDENTIAL. THE PLATFORM (140) PROVIDES A FUNCTIONALITY OF A SECURE OR "TRUSTED COMPUTING" (TC) ENVIRONMENT TO PREVENT OR BLOCK UNAUTHORIZED COMPUTER PROGRAMS OR APPLICATIONS FROM RUNNING WITHIN THE COMPUTER SYSTEM AND PROVIDE A FULLY TRUSTED COMPUTER SYSTEM (140) HAVING 1) ENDORSEMENT KEY (118); 2) SECURE INPUT AND OUTPUT (102); 3) MEMORY CURTAINING / PROTECTED EXECUTION (104); 4) SEALED STORAGE; AND 5) REMOTE ATTESTATION (108). THE TRUSTED COMPUTER PLATFORM (140) IS AN IMPLEMENTATION THAT ACHIEVES AT LEAST A MECHANISM TO PROACTIVELY ESTABLISH MORE TRUSTED RELATIONSHIPS FOR REMOTE OR LOCAL ACCESS THROUGH SECURE USER AUTHENTICATION AND MACHINE ATTESTATION, PROTECT ENCRYPTION KEYS AND DIGITAL SIGNATURE KEYS TO MAINTAIN DATA CONFIDENTIALITY AND INTEGRITY, PROTECT KEY OPERATIONS AND OTHER SECURITY TASKS THAT WOULD OTHERWISE BE PERFORMED ON UNPROTECTED INTERFACES IN UNPROTECTED COMMUNICATIONS, OR PROTECT PLATFORM AND USER AUTHENTICATION INFORMATION FROM SOFTWARE- BASED ATTACKS.
-
-
-
-
-
-
-
-
-