scispace - formally typeset
Patent

Method and apparatus for managing secure collaborative transactions

Reads0
Chats0
TLDR
In this paper, different levels of security are provided in a security system so that users can decide the security level of their own communications and maintain a low level of security and maintain the security overhead as low as possible.
Abstract
Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace. In another embodiment, subgroups called “tribes” can be formed within a telespace and each tribe adopts the security level of the telespace in which it resides.

read more

Citations
More filters
Patent

Interactive media guidance system having multiple devices

TL;DR: In this article, a user may configure the delivery of the selected television program and associated data and interactive applications to different user equipment devices in a home network, which may have different capabilities.
Patent

Method and apparatus for managing transactions

TL;DR: In this article, a system receives account access information from a user and then accesses the account using the received access information, which is harvested from a web page associated with the account or received from another financial data source.
Patent

Systems and methods for authenticating mobile devices

TL;DR: In this article, a registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received, and based upon the received identifying information and a base level key, a rotated key for the mobile devices may be determined.
Patent

Data storage incorporating cryptographically enhanced data protection

TL;DR: In this article, the authors describe a system for storing encrypted data and providing access to a group of users, including a record of user accounts including: a user identifier and a public encryption key; access control list (ACL) defining an access control policy including permissions defining access to data objects associated with the ACL and an ACL key list including copies of a an ACL-key encrypted with the public keys of the users.
Patent

Software business process model

TL;DR: In this article, a business software framework includes an application framework that has a process model, which provides desired services to the business components, and can also use an agent/service arrangement.
References
More filters
Journal ArticleDOI

Secure group communications using key graphs

TL;DR: It is shown that the group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves, and the average measured processing time per join/leave increases linearly with the logarithm of group size.
Proceedings ArticleDOI

Multicast security: a taxonomy and some efficient constructions

TL;DR: A taxonomy of multicast scenarios on the Internet and an improved solution to the key revocation problem are presented, which can be regarded as a 'midpoint' between traditional message authentication codes and digital signatures.
Journal ArticleDOI

Prudent engineering practice for cryptographic protocols

TL;DR: The principles are informal guidelines that complement formal methods, but do not assume them, and are however helpful, in that adherence to them would have avoided a considerable number of published errors.
Patent

Method and apparatus for collaborative document control

TL;DR: In this article, a method and apparatus for controlling collaborative access to a work group document by the users of a computer system is described, where a combination of public-key cryptographic methods, symmetric cryptographic methods and message digest generation methods are used.
Patent

Method and apparatus for identifying and discarding junk electronic mail

TL;DR: In this paper, a group of trusted users can collectively determine whether a given electronic mail message is junk e-mail, and if the message is determined to be junk mail, other trusted users in the group dispose of unviewed copies of the junk e mail.