C. Jay Wack - Clarksburg MD, US Edward M. Scheidt - McLean VA, US James L. Kolouch - Vienna VA, US
Assignee:
Tecsec, Inc. - Vienna VA
International Classification:
H04L 9/22
US Classification:
380 44, 380280, 380286
Abstract:
A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
Edward Scheidt - McLean VA, US James Kolouch - Vienna VA, US Ersin L. Domangue - Woodbine MA, US Mark A. Odell - Ashburn VA, US Wai Lin Tsang - Falls Church VA, US
A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving document data corresponding to at least one selected portion of the document, binding the stored private signing key and the document data to create an electronic signature, and providing the electronic signature for a recipient.
Edward M. Scheidt - McLean VA, US James L. Kolouch - Vienna VA, US Ersin L. Domangue - Woodbine MD, US Mark A. Odell - Ashburn VA, US Wai Lin Tsang - Falls Church VA, US
A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving document data corresponding to at least one selected portion of the document, binding the stored private signing key and the document data to create an electronic signature, and providing the electronic signature for a recipient.
Cryptographic Key Split Binder For Use With Tagged Data Elements
C. Jay Wack - Clarksburg MD, US Edward M. Scheidt - McLean VA, US James L. Kolouch - Vienna VA, US
Assignee:
TecSec, Inc. - McLean VA
International Classification:
H04L 9/00 H04N 7/167
US Classification:
380 44, 380277, 380200
Abstract:
A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
Cryptographic Key Split Binder For Use With Tagged Data Elements
C. Jay Wack - Grasonville MD, US Edward M. Scheidt - McLean VA, US James L. Kolouch - Vienna VA, US
Assignee:
TecSec, Inc. - Herndon VA
International Classification:
H04L 9/00 H04N 7/167
US Classification:
380 44, 380277, 380200
Abstract:
A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag.
Secure Accounting And Operational Control Reporting System
A secure accounting and operational method, whereby process elements are provided to a process, selected process elements are manipulated, a scheduled condition of the process is sampled at a predetermined point in the process, and the process sample is encrypted to provide an encrypted output. As a result, an authorized recipient has a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.
Process Of Encryption And Operational Control Of Tagged Data Elements
Edward M. Scheidt - McLean VA, US James L. Kolouch - Vienna VA, US
International Classification:
H04L 9/28
US Classification:
380 28
Abstract:
A process of encrypting an object having an associated object tag includes generating a cryptographic key by binding an organization split, a maintenance split, a random split, and at least one label split (). A cryptographic algorithm is initialized with the cryptographic key, and the object is encrypted using the cryptographic algorithm () according to the object tag, to form an encrypted object. Combiner data is added to the encrypted object (). The combiner data includes reference data, name data, a maintenance split or a maintenance level, and the random split (). Alternatively, key splits are bound to generate a cryptographic key, and a cryptographic algorithm is initialized with the cryptographic key. The initialized cryptographic algorithm is applied to the object according to a cryptographic scheme determined by the object tag, to form an encrypted object. One of the key splits corresponds to a biometric measurement.
C. Jay Wack - Herndon VA, US James L. Kolouch - Herndon VA, US
Assignee:
TECSEC - Herndon VA
International Classification:
G06F 21/24 G06F 17/00
US Classification:
713189
Abstract:
Cryptographically converting raw data into a structured electronic document can include parsing the raw data to identify at least one raw data object. A target data object is selected from the raw data object(s). For each selected target data object, the target data object is encrypted according to a cryptographic scheme to create an encrypted data object. Each selected target data object is replaced with the respective encrypted data object, and is associated with markup data in a structured format for each respective encrypted data object, resulting in the structured electronic document. The format of the structured electronic document can be compliant with a formatting language, which can be a general-purpose or specific-purpose formatting language.