The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 17, 2015

Filed:

Jan. 16, 2007
Applicants:

Terence Spies, San Mateo, CA (US);

Matthew J. Pauker, San Francisco, CA (US);

Inventors:

Terence Spies, San Mateo, CA (US);

Matthew J. Pauker, San Francisco, CA (US);

Assignee:

Voltage Security, Inc., Cupertino, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 9/32 (2006.01); G06Q 20/00 (2012.01); G06Q 20/38 (2012.01); G06F 21/62 (2013.01); G06F 21/60 (2013.01);
U.S. Cl.
CPC ...
G06Q 20/3829 (2013.01); H04L 9/0869 (2013.01); H04L 9/0866 (2013.01); G06F 21/6209 (2013.01); G06F 21/6227 (2013.01); G06F 21/6245 (2013.01); H04L 9/083 (2013.01); H04L 9/321 (2013.01); G06F 21/602 (2013.01);
Abstract

Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity.


Find Patent Forward Citations

Loading…