Browse Prior Art Database

Protection of Information Using a Software Lock And Key

IP.com Disclosure Number: IPCOM000037454D
Original Publication Date: 1989-Feb-01
Included in the Prior Art Database: 2005-Jan-29
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Harrison, RT: AUTHOR [+4]

Abstract

An application program is disclosed that controls access to sensitive information through a software Lock which has two possible states: secure or open. When the Lock is secure, the sensitive information is not accessible by the application program user. Conversely, when the Lock is open, the sensitive information is accessible.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Protection of Information Using a Software Lock And Key

An application program is disclosed that controls access to sensitive information through a software Lock which has two possible states: secure or open. When the Lock is secure, the sensitive information is not accessible by the application program user. Conversely, when the Lock is open, the sensitive information is accessible.

The application program also defines two software keys. One key is called the master key and the other the service key. Either of the keys may be used to change the state of the Lock. The difference in the two keys is how new values may be assigned. A new value can be assigned to the master key if and only if the current master key value is entered. A new value can be assigned to the service key if the current master key or service key value is entered.

The key values and Lock state are maintained in the same media file in which the sensitive information is maintained. The key values are scrambled in the file.

In summary, the application program provides the user with the ability to:

1. Open Lock

2. Secure Lock

3. Change Master Key

4. Change Service Key

When the Lock is secure, the sensitive information as defined by the application program is not accessible by the application program user.

Disclosed anonymously.

1