Secure data parser method and system

ABSTRACT

A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. patent application Ser. No.11/258,839, filed on Oct. 25, 2005, which claims priority benefit fromU.S. provisional application No. 60/622,146, filed on Oct. 25, 2004, andU.S. provisional application No. 60/718,185, filed Sep. 16, 2005. Theaforementioned, earlier-filed applications are hereby incorporated byreference herein in their entireties.

FIELD OF THE INVENTION

The present invention relates in general to a system for securing datafrom unauthorized access or use.

BACKGROUND OF THE INVENTION

In today's society, individuals and businesses conduct anever-increasing amount of activities on and over computer systems. Thesecomputer systems, including proprietary and non-proprietary computernetworks, are often storing, archiving, and transmitting all types ofsensitive information. Thus, an ever-increasing need exists for ensuringdata stored and transmitted over these systems cannot be read orotherwise compromised.

One common solution for securing computer systems is to provide loginand password functionality. However, password management has proven tobe quite costly with a large percentage of help desk calls relating topassword issues. Moreover, passwords provide little security in thatthey are generally stored in a file susceptible to inappropriate access,through, for example, brute-force attacks.

Another solution for securing computer systems is to providecryptographic infrastructures. Cryptography, in general, refers toprotecting data by transforming, or encrypting, it into an unreadableformat. Only those who possess the key(s) to the encryption can decryptthe data into a useable format. Cryptography is used to identify users,e.g., authentication, to allow access privileges, e.g., authorization,to create digital certificates and signatures, and the like. One popularcryptography system is a public key system that uses two keys, a publickey known to everyone and a private key known only to the individual orbusiness owner thereof. Generally, the data encrypted with one key isdecrypted with the other and neither key is recreatable from the other.

Unfortunately, even the foregoing typical public-key cryptographicsystems are still highly reliant on the user for security. For example,cryptographic systems issue the private key to the user, for example,through the user's browser. Unsophisticated users then generally storethe private key on a hard drive accessible to others through an opencomputer system, such as, for example, the Internet. On the other hand,users may choose poor names for files containing their private key, suchas, for example, “key.” The result of the foregoing and other acts is toallow the key or keys to be susceptible to compromise.

In addition to the foregoing compromises, a user may save his or herprivate key on a computer system configured with an archiving or backupsystem, potentially resulting in copies of the private key travelingthrough multiple computer storage devices or other systems. Thissecurity breach is often referred to as “key migration.” Similar to keymigration, many applications provide access to a user's private keythrough, at most, simple login and password access. As mentioned in theforegoing, login and password access often does not provide adequatesecurity.

One solution for increasing the security of the foregoing cryptographicsystems is to include biometrics as part of the authentication orauthorization. Biometrics generally include measurable physicalcharacteristics, such as, for example, finger prints or speech that canbe checked by an automated system, such as, for example, patternmatching or recognition of finger print patterns or speech patterns. Insuch systems, a user's biometric and/or keys may be stored on mobilecomputing devices, such as, for example, a smartcard, laptop, personaldigital assistant, or mobile phone, thereby allowing the biometric orkeys to be usable in a mobile environment.

The foregoing mobile biometric cryptographic system still suffers from avariety of drawbacks. For example, the mobile user may lose or break thesmartcard or portable computing device, thereby having his or her accessto potentially important data entirely cut-off. Alternatively, amalicious person may steal the mobile user's smartcard or portablecomputing device and use it to effectively steal the mobile user'sdigital credentials. On the other hand, the portable-computing devicemay be connected to an open system, such as the Internet, and, likepasswords, the file where the biometric is stored may be susceptible tocompromise through user inattentiveness to security or maliciousintruders.

SUMMARY OF THE INVENTION

Based on the foregoing, a need exists to provide a cryptographic systemwhose security is user-independent while still supporting mobile users.

Accordingly, one aspect of the present invention is to provide a methodfor securing virtually any type of data from unauthorized access or use.The method comprises one or more steps of parsing, splitting and/orseparating the data to be secured into two or more parts or portions.The method also comprises encrypting the data to be secured. Encryptionof the data may be performed prior to or after the first parsing,splitting and/or separating of the data. In addition, the encryptingstep may be repeated for one or more portions of the data. Similarly,the parsing, splitting and/or separating steps may be repeated for oneor more portions of the data. The method also optionally comprisesstoring the parsed, split and/or separated data that has been encryptedin one location or in multiple locations. This method also optionallycomprises reconstituting or re-assembling the secured data into itsoriginal form for authorized access or use. This method may beincorporated into the operations of any computer, server, engine or thelike, that is capable of executing the desired steps of the method.

Another aspect of the present invention provides a system for securingvirtually any type of data from unauthorized access or use. This systemcomprises a data splitting module, a cryptographic handling module, and,optionally, a data assembly module. The system may, in one embodiment,further comprise one or more data storage facilities where secure datamay be stored.

Accordingly, one aspect of the invention is to provide a secure server,or trust engine, having server-centric keys, or in other words, storingcryptographic keys and user authentication data on a server. Accordingto this embodiment, a user accesses the trust engine in order to performauthentication and cryptographic functions, such as, but not limited to,for example, authentication, authorization, digital signing andgeneration, storage, and retrieval of certificates, encryption,notary-like and power-of-attorney-like actions, and the like.

Another aspect of the invention is to provide a reliable, or trusted,authentication process. Moreover, subsequent to a trustworthy positiveauthentication, a wide number of differing actions may be taken, fromproviding cryptographic technology, to system or device authorizationand access, to permitting use or control of one or a wide number ofelectronic devices.

Another aspect of the invention is to provide cryptographic keys andauthentication data in an environment where they are not lost, stolen,or compromised, thereby advantageously avoiding a need to continuallyreissue and manage new keys and authentication data. According toanother aspect of the invention, the trust engine allows a user to useone key pair for multiple activities, vendors, and/or authenticationrequests. According to yet another aspect of the invention, the trustengine performs at least one step of cryptographic processing, such as,but not limited to, encrypting, authenticating, or signing, on theserver side, thereby allowing clients or users to possess only minimalcomputing resources.

According to yet another aspect of the invention, the trust engineincludes one or multiple depositories for storing portions of eachcryptographic key and authentication data. The portions are createdthrough a data splitting process that prohibits reconstruction without apredetermined portion from more than one location in one depository orfrom multiple depositories. According to another embodiment, themultiple depositories may be geographically remote such that a rogueemployee or otherwise compromised system at one depository will notprovide access to a user's key or authentication data.

According to yet another embodiment, the authentication processadvantageously allows the trust engine to process multipleauthentication activities in parallel. According to yet anotherembodiment, the trust engine may advantageously track failed accessattempts and thereby limit the number of times malicious intruders mayattempt to subvert the system.

According to yet another embodiment, the trust engine may includemultiple instantiations where each trust engine may predict and shareprocessing loads with the others. According to yet another embodiment,the trust engine may include a redundancy module for polling a pluralityof authentication results to ensure that more than one systemauthenticates the user.

Therefore, one aspect of the invention includes a secure cryptographicsystem, which may be remotely accessible, for storing data of any type,including, but not limited to, a plurality of private cryptographic keysto be associated with a plurality of users. The cryptographic systemassociates each of the plurality of users with one or more differentkeys from the plurality of private cryptographic keys and performscryptographic functions for each user using the associated one or moredifferent keys without releasing the plurality of private cryptographickeys to the users. The cryptographic system comprises a depositorysystem having at least one server which stores the data to be secured,such as a plurality of private cryptographic keys and a plurality ofenrollment authentication data. Each enrollment authentication dataidentifies one of multiple users and each of the multiple users isassociated with one or more different keys from the plurality of privatecryptographic keys. The cryptographic system also may comprise anauthentication engine which compares authentication data received by oneof the multiple users to enrollment authentication data corresponding tothe one of multiple users and received from the depository system,thereby producing an authentication result. The cryptographic systemalso may comprise a cryptographic engine which, when the authenticationresult indicates proper identification of the one of the multiple users,performs cryptographic functions on behalf of the one of the multipleusers using the associated one or more different keys received from thedepository system. The cryptographic system also may comprise atransaction engine connected to route data from the multiple users tothe depository server system, the authentication engine, and thecryptographic engine.

Another aspect of the invention includes a secure cryptographic systemthat is optionally remotely accessible. The cryptographic systemcomprises a depository system having at least one server which stores atleast one private key and any other data, such as, but not limited to, aplurality of enrollment authentication data, wherein each enrollmentauthentication data identifies one of possibly multiple users. Thecryptographic system may also optionally comprise an authenticationengine which compares authentication data received by users toenrollment authentication data corresponding to the user and receivedfrom the depository system, thereby producing an authentication result.The cryptographic system also comprises a cryptographic engine which,when the authentication result indicates proper identification of theuser, performs cryptographic functions on behalf of the user using atleast said private key, which may be received from the depositorysystem. The cryptographic system may also optionally comprise atransaction engine connected to route data from the users to otherengines or systems such as, but not limited to, the depository serversystem, the authentication engine, and the cryptographic engine.

Another aspect of the invention includes a method of facilitatingcryptographic functions. The method comprises associating a user frommultiple users with one or more keys from a plurality of privatecryptographic keys stored on a secure location, such as a secure server.The method also comprises receiving authentication data from the user,and comparing the authentication data to authentication datacorresponding to the user, thereby verifying the identity of the user.The method also comprises utilizing the one or more keys to performcryptographic functions without releasing the one or more keys to theuser.

Another aspect of the invention includes an authentication system foruniquely identifying a user through secure storage of the user'senrollment authentication data. The authentication system comprises oneor more data storage facilities, wherein each data storage facilityincludes a computer accessible storage medium which stores at least oneof portions of enrollment authentication data. The authentication systemalso comprises an authentication engine which communicates with the datastorage facility or facilities. The authentication engine comprises adata splitting module which operates on the enrollment authenticationdata to create portions, a data assembling module which processes theportions from at least one of the data storage facilities to assemblethe enrollment authentication data, and a data comparator module whichreceives current authentication data from a user and compares thecurrent authentication data with the assembled enrollment authenticationdata to determine whether the user has been uniquely identified.

Another aspect of the invention includes a cryptographic system. Thecryptographic system comprises one or more data storage facilities,wherein each data storage facility includes a computer accessiblestorage medium which stores at least one portion of one or morecryptographic keys. The cryptographic system also comprises acryptographic engine which communicates with the data storagefacilities. The cryptographic engine also comprises a data splittingmodule which operate on the cryptographic keys to create portions, adata assembling module which processes the portions from at least one ofthe data storage facilities to assemble the cryptographic keys, and acryptographic handling module which receives the assembled cryptographickeys and performs cryptographic functions therewith.

Another aspect of the invention includes a method of storing any type ofdata, including, but not limited to, authentication data ingeographically remote secure data storage facilities thereby protectingthe data against composition of any individual data storage facility.The method comprises receiving data at a trust engine, combining at thetrust engine the data with a first substantially random value to form afirst combined value, and combining the data with a second substantiallyrandom value to form a second combined value. The method comprisescreating a first pairing of the first substantially random value withthe second combined value, creating a second pairing of the firstsubstantially random value with the second substantially random value,and storing the first pairing in a first secure data storage facility.The method comprises storing the second pairing in a second secure datastorage facility remote from the first secure data storage facility.

Another aspect of the invention includes a method of storing any type ofdata, including, but not limited to, authentication data comprisingreceiving data, combining the data with a first set of bits to form asecond set of bits, and combining the data with a third set of bits toform a fourth set of bits. The method also comprises creating a firstpairing of the first set of bits with the third set of bits. The methodalso comprises creating a second pairing of the first set of bits withthe fourth set of bits, and storing one of the first and second pairingsin a first computer accessible storage medium. The method also comprisesstoring the other of the first and second pairings in a second computeraccessible storage medium.

Another aspect of the invention includes a method of storingcryptographic data in geographically remote secure data storagefacilities thereby protecting the cryptographic data against comprise ofany individual data storage facility. The method comprises receivingcryptographic data at a trust engine, combining at the trust engine thecryptographic data with a first substantially random value to form afirst combined value, and combining the cryptographic data with a secondsubstantially random value to form a second combined value. The methodalso comprises creating a first pairing of the first substantiallyrandom value with the second combined value, creating a second pairingof the first substantially random value with the second substantiallyrandom value, and storing the first pairing in a first secure datastorage facility. The method also comprises storing the second pairingin a secure second data storage facility remote from the first securedata storage facility.

Another aspect of the invention includes a method of storingcryptographic data comprising receiving authentication data andcombining the cryptographic data with a first set of bits to form asecond set of bits. The method also comprises combining thecryptographic data with a third set of bits to form a fourth set ofbits, creating a first pairing of the first set of bits with the thirdset of bits, and creating a second pairing of the first set of bits withthe fourth set of bits. The method also comprises storing one of thefirst and second pairings in a first computer accessible storage medium,and storing the other of the first and second pairings in a secondcomputer accessible storage medium.

Another aspect of the invention includes a method of handling sensitivedata of any type or form in a cryptographic system, wherein thesensitive data exists in a useable form only during actions byauthorized users, employing the sensitive data. The method alsocomprises receiving in a software module, substantially randomized orencrypted sensitive data from a first computer accessible storagemedium, and receiving in the software module, substantially randomizedor encrypted data which may or may not be sensitive data, from one ormore other computer accessible storage medium. The method also comprisesprocessing the substantially randomized pre-encrypted sensitive data andthe substantially randomized or encrypted data which may or may not besensitive data, in the software module to assemble the sensitive dataand employing the sensitive data in a software engine to perform anaction. The action includes, but is not limited to, one ofauthenticating a user and performing a cryptographic function.

Another aspect of the invention includes a secure authentication system.The secure authentication system comprises a plurality of authenticationengines. Each authentication engine receives enrollment authenticationdata designed to uniquely identify a user to a degree of certainty. Eachauthentication engine receives current authentication data to compare tothe enrollment authentication data, and each authentication enginedetermines an authentication result. The secure authentication systemalso comprises a redundancy system which receives the authenticationresult of at least two of the authentication engines and determineswhether the user has been uniquely identified.

Another aspect of the invention includes a secure data in motion systemwhereby data may be transmitted in different portions that are securedin accordance with the present invention such that any one portionbecoming compromised shall not provide sufficient data to restore theoriginal data. This may be applied to any transmission of data, whetherit be wired, wireless, or physical.

Another aspect of the invention includes integration of the secure dataparser of the present invention into any suitable system where data isstored or communicated. For example, email system, RAID systems, videobroadcasting systems, database systems, or any other suitable system mayhave the secure data parser integrated at any suitable level.

Another aspect of the invention includes using any suitable parsing andsplitting algorithm to generate shares of data. Either random,pseudo-random, deterministic, or any combination thereof may be employedfor parsing and splitting data.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is described in more detail below in connectionwith the attached drawings, which are meant to illustrate and not tolimit the invention, and in which:

FIG. 1 illustrates a block diagram of a cryptographic system, accordingto aspects of an embodiment of the invention;

FIG. 2 illustrates a block diagram of the trust engine of FIG. 1,according to aspects of an embodiment of the invention;

FIG. 3 illustrates a block diagram of the transaction engine of FIG. 2,according to aspects of an embodiment of the invention;

FIG. 4 illustrates a block diagram of the depository of FIG. 2,according to aspects of an embodiment of the invention;

FIG. 5 illustrates a block diagram of the authentication engine of FIG.2, according to aspects of an embodiment of the invention;

FIG. 6 illustrates a block diagram of the cryptographic engine of FIG.2, according to aspects of an embodiment of the invention;

FIG. 7 illustrates a block diagram of a depository system, according toaspects of another embodiment of the invention;

FIG. 8 illustrates a flow chart of a data splitting process according toaspects of an embodiment of the invention;

FIG. 9, Panel A illustrates a data flow of an enrollment processaccording to aspects of an embodiment of the invention;

FIG. 9, Panel B illustrates a flow chart of an interoperability processaccording to aspects of an embodiment of the invention;

FIG. 10 illustrates a data flow of an authentication process accordingto aspects of an embodiment of the invention;

FIG. 11 illustrates a data flow of a signing process according toaspects of an embodiment of the invention;

FIG. 12 illustrates a data flow and an encryption/decryption processaccording to aspects and yet another embodiment of the invention;

FIG. 13 illustrates a simplified block diagram of a trust engine systemaccording to aspects of another embodiment of the invention;

FIG. 14 illustrates a simplified block diagram of a trust engine systemaccording to aspects of another embodiment of the invention;

FIG. 15 illustrates a block diagram of the redundancy module of FIG. 14,according to aspects of an embodiment of the invention;

FIG. 16 illustrates a process for evaluating authentications accordingto one aspect of the invention;

FIG. 17 illustrates a process for assigning a value to an authenticationaccording to one aspect as shown in FIG. 16 of the invention;

FIG. 18 illustrates a process for performing trust arbitrage in anaspect of the invention as shown in FIG. 17; and

FIG. 19 illustrates a sample transaction between a user and a vendoraccording to aspects of an embodiment of the invention where an initialweb based contact leads to a sales contract signed by both parties.

FIG. 20 illustrates a sample user system with a cryptographic serviceprovider module which provides security functions to a user system.

FIG. 21 illustrates a process for parsing, splitting and/or separatingdata with encryption and storage of the encryption master key with thedata.

FIG. 22 illustrates a process for parsing, splitting and/or separatingdata with encryption and storing the encryption master key separatelyfrom the data.

FIG. 23 illustrates the intermediary key process for parsing, splittingand/or separating data with encryption and storage of the encryptionmaster key with the data.

FIG. 24 illustrates the intermediary key process for parsing, splittingand/or separating data with encryption and storing the encryption masterkey separately from the data.

FIG. 25 illustrates utilization of the cryptographic methods and systemsof the present invention with a small working group.

FIG. 26 is a block diagram of an illustrative physical token securitysystem employing the secure data parser in accordance with oneembodiment of the present invention.

FIG. 27 is a block diagram of an illustrative arrangement in which thesecure data parser is integrated into a system in accordance with oneembodiment of the present invention.

FIG. 28 is a block diagram of an illustrative data in motion system inaccordance with one embodiment of the present invention.

FIG. 29 is a block diagram of another illustrative data in motion systemin accordance with one embodiment of the present invention.

FIG. 30-32 are block diagrams of an illustrative system having thesecure data parser integrated in accordance with one embodiment of thepresent invention.

FIG. 33 is a process flow diagram of an illustrative process for parsingand splitting data in accordance with one embodiment of the presentinvention.

FIG. 34 is a process flow diagram of an illustrative process forrestoring portions of data into original data in accordance with oneembodiment of the present invention.

FIG. 35 is a process flow diagram of an illustrative process forsplitting data at the bit level in accordance with one embodiment of thepresent invention.

FIG. 36 depicts an exemplary bit-splitting technique in accordance withone embodiment of the present invention.

FIG. 37 depicts a data flow for distributing the output of abit-splitting process into one or more shares in accordance with oneembodiment of the present invention.

FIG. 38 depicts an exemplary bit scatter technique for the distributionof data into shares in accordance with one embodiment of the presentinvention.

FIG. 39 depicts an exemplary technique for restoring data that wasdistributed to a share using the bit scatter technique.

FIG. 40 illustrates example of such an allocation for a 2 of 4 key splitwith a ratio of 75% in accordance with one embodiment of the presentinvention.

FIG. 41 is an illustrative overview process for using the secure dataparser of the present invention.

FIG. 42 depicts an exemplary secure parser system in accordance with oneembodiment of the present invention.

FIG. 43 depicts an exemplary integration of a secure parser into asystem utilizing an Application Programming Interface (API).

FIG. 44 depicts an example configuration of a share fault tolerancesystem in accordance with one embodiment of the present invention.

FIG. 45 depicts an example configuration of a share fault tolerancesystem with a mandatory share in accordance with one embodiment of thepresent invention.

FIG. 46 depicts an illustrative process for parsing and distributingdata into shares in accordance with one embodiment of the presentinvention.

FIG. 47 depicts an illustrative process for recovering data from sharesin accordance with one embodiment of the present invention.

FIG. 48 Panels A and B depict various parameters used in parsingoperations in accordance with one embodiment of the present invention.

FIG. 49 Panels A and B depict data structures for the parser, keys, andshares in accordance with one embodiment of the present invention.

FIG. 50 Panels A and B depict data structures relating to encryption,authentication, and hashing functionality in accordance with oneembodiment of the present invention.

FIG. 51 Panels A and B depict data formats in accordance with oneembodiment of the present invention.

FIG. 52A Panels A and B and FIG. 52B Panels A and B depict a functionlibrary in accordance with one embodiment of the present invention.

FIG. 53 depicts an exemplary implementation of a secure parser within ahardware system in accordance with one embodiment of the presentinvention.

FIG. 54 depicts an exemplary implementation of a secure parser for datamasking in accordance with one embodiment of the present invention.

FIG. 55 depicts an exemplary data record in a data maskingimplementation in accordance with one embodiment of the presentinvention.

FIG. 56 depicts an exemplary set of workgroup keys in accordance withone embodiment of the present invention.

FIG. 57 depicts the use of workgroup keys in an example application ofmilitary use in accordance with one embodiment of the present invention.

FIG. 58 depicts the use of workgroup keys in a multi-level security(MLS) solution in accordance with one embodiment of the presentinvention.

FIG. 59 depicts a backup application in accordance with one embodimentof the present invention.

FIG. 60 depicts another backup application in accordance with oneembodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

One aspect of the present invention is to provide a cryptographic systemwhere one or more secure servers, or a trust engine, storescryptographic keys and user authentication data. Users access thefunctionality of conventional cryptographic systems through networkaccess to the trust engine, however, the trust engine does not releaseactual keys and other authentication data and therefore, the keys anddata remain secure. This server-centric storage of keys andauthentication data provides for user-independent security, portability,availability, and straightforwardness.

Because users can be confident in, or trust, the cryptographic system toperform user and document authentication and other cryptographicfunctions, a wide variety of functionality may be incorporated into thesystem. For example, the trust engine provider can ensure againstagreement repudiation by, for example, authenticating the agreementparticipants, digitally signing the agreement on behalf of or for theparticipants, and storing a record of the agreement digitally signed byeach participant. In addition, the cryptographic system may monitoragreements and determine to apply varying degrees of authentication,based on, for example, price, user, vendor, geographic location, placeof use, or the like.

To facilitate a complete understanding of the invention, the remainderof the detailed description describes the invention with reference tothe figures, wherein like elements are referenced with like numeralsthroughout.

FIG. 1 illustrates a block diagram of a cryptographic system 100,according to aspects of an embodiment of the invention. As shown in FIG.1, the cryptographic system 100 includes a user system 105, a trustengine 110, a certificate authority 115, and a vendor system 120,communicating through a communication link 125.

According to one embodiment of the invention, the user system 105comprises a conventional general-purpose computer having one or moremicroprocessors, such as, for example, an Intel-based processor.Moreover, the user system 105 includes an appropriate operating system,such as, for example, an operating system capable of including graphicsor windows, such as Windows, Unix, Linux, or the like. As shown in FIG.1, the user system 105 may include a biometric device 107. The biometricdevice 107 may advantageously capture a user's biometric and transferthe captured biometric to the trust engine 110. According to oneembodiment of the invention, the biometric device may advantageouslycomprise a device having attributes and features similar to thosedisclosed in U.S. patent application Ser. No. 08/926,277, filed on Sep.5, 1997, entitled “RELIEF OBJECT IMAGE GENERATOR,” U.S. patentapplication Ser. No. 09/558,634, filed on Apr. 26, 2000, entitled“IMAGING DEVICE FOR A RELIEF OBJECT AND SYSTEM AND METHOD OF USING THEIMAGE DEVICE,” U.S. patent application Ser. No. 09/435,011, filed onNov. 5, 1999, entitled “RELIEF OBJECT SENSOR ADAPTOR,” and U.S. patentapplication Ser. No. 09/477,943, filed on Jan. 5, 2000, entitled “PLANAROPTICAL IMAGE SENSOR AND SYSTEM FOR GENERATING AN ELECTRONIC IMAGE OF ARELIEF OBJECT FOR FINGERPRINT READING,” all of which are owned by theinstant assignee, and all of which are hereby incorporated by referenceherein.

In addition, the user system 105 may connect to the communication link125 through a conventional service provider, such as, for example, adial up, digital subscriber line (DSL), cable modem, fiber connection,or the like. According to another embodiment, the user system 105connects the communication link 125 through network connectivity suchas, for example, a local or wide area network. According to oneembodiment, the operating system includes a TCP/IP stack that handlesall incoming and outgoing message traffic passed over the communicationlink 125.

Although the user system 105 is disclosed with reference to theforegoing embodiments, the invention is not intended to be limitedthereby. Rather, a skilled artisan will recognize from the disclosureherein, a wide number of alternatives embodiments of the user system105, including almost any computing device capable of sending orreceiving information from another computer system. For example, theuser system 105 may include, but is not limited to, a computerworkstation, an interactive television, an interactive kiosk, a personalmobile computing device, such as a digital assistant, mobile phone,laptop, or the like, a wireless communications device, a smartcard, anembedded computing device, or the like, which can interact with thecommunication link 125. In such alternative systems, the operatingsystems will likely differ and be adapted for the particular device.However, according to one embodiment, the operating systemsadvantageously continue to provide the appropriate communicationsprotocols needed to establish communication with the communication link125.

FIG. 1 illustrates the trust engine 110. According to one embodiment,the trust engine 110 comprises one or more secure servers for accessingand storing sensitive information, which may be any type or form ofdata, such as, but not limited to text, audio, video, userauthentication data and public and private cryptographic keys. Accordingto one embodiment, the authentication data includes data designed touniquely identify a user of the cryptographic system 100. For example,the authentication data may include a user identification number, one ormore biometrics, and a series of questions and answers generated by thetrust engine 110 or the user, but answered initially by the user atenrollment. The foregoing questions may include demographic data, suchas place of birth, address, anniversary, or the like, personal data,such as mother's maiden name, favorite ice cream, or the like, or otherdata designed to uniquely identify the user. The trust engine 110compares a user's authentication data associated with a currenttransaction, to the authentication data provided at an earlier time,such as, for example, during enrollment. The trust engine 110 mayadvantageously require the user to produce the authentication data atthe time of each transaction, or, the trust engine 110 mayadvantageously allow the user to periodically produce authenticationdata, such as at the beginning of a string of transactions or thelogging onto a particular vendor website.

According to the embodiment where the user produces biometric data, theuser provides a physical characteristic, such as, but not limited to,facial scan, hand scan, ear scan, iris scan, retinal scan, vascularpattern, DNA, a fingerprint, writing or speech, to the biometric device107. The biometric device advantageously produces an electronic pattern,or biometric, of the physical characteristic. The electronic pattern istransferred through the user system 105 to the trust engine 110 foreither enrollment or authentication purposes.

Once the user produces the appropriate authentication data and the trustengine 110 determines a positive match between that authentication data(current authentication data) and the authentication data provided atthe time of enrollment (enrollment authentication data), the trustengine 110 provides the user with complete cryptographic functionality.For example, the properly authenticated user may advantageously employthe trust engine 110 to perform hashing, digitally signing, encryptingand decrypting (often together referred to only as encrypting), creatingor distributing digital certificates, and the like. However, the privatecryptographic keys used in the cryptographic functions will not beavailable outside the trust engine 110, thereby ensuring the integrityof the cryptographic keys.

According to one embodiment, the trust engine 110 generates and storescryptographic keys. According to another embodiment, at least onecryptographic key is associated with each user. Moreover, when thecryptographic keys include public-key technology, each private keyassociated with a user is generated within, and not released from, thetrust engine 110. Thus, so long as the user has access to the trustengine 110, the user may perform cryptographic functions using his orher private or public key. Such remote access advantageously allowsusers to remain completely mobile and access cryptographic functionalitythrough practically any Internet connection, such as cellular andsatellite phones, kiosks, laptops, hotel rooms and the like.

According to another embodiment, the trust engine 110 performs thecryptographic functionality using a key pair generated for the trustengine 110. According to this embodiment, the trust engine 110 firstauthenticates the user, and after the user has properly producedauthentication data matching the enrollment authentication data, thetrust engine 110 uses its own cryptographic key pair to performcryptographic functions on behalf of the authenticated user.

A skilled artisan will recognize from the disclosure herein that thecryptographic keys may advantageously include some or all of symmetrickeys, public keys, and private keys. In addition, a skilled artisan willrecognize from the disclosure herein that the foregoing keys may beimplemented with a wide number of algorithms available from commercialtechnologies, such as, for example, RSA, ELGAMAL, or the like.

FIG. 1 also illustrates the certificate authority 115. According to oneembodiment, the certificate authority 115 may advantageously comprise atrusted third-party organization or company that issues digitalcertificates, such as, for example, VeriSign, Baltimore, Entrust, or thelike. The trust engine 110 may advantageously transmit requests fordigital certificates, through one or more conventional digitalcertificate protocols, such as, for example, PKCS10, to the certificateauthority 115. In response, the certificate authority 115 will issue adigital certificate in one or more of a number of differing protocols,such as, for example, PKCS7. According to one embodiment of theinvention, the trust engine 110 requests digital certificates fromseveral or all of the prominent certificate authorities 115 such thatthe trust engine 110 has access to a digital certificate correspondingto the certificate standard of any requesting party.

According to another embodiment, the trust engine 110 internallyperforms certificate issuances. In this embodiment, the trust engine 110may access a certificate system for generating certificates and/or mayinternally generate certificates when they are requested, such as, forexample, at the time of key generation or in the certificate standardrequested at the time of the request. The trust engine 110 will bedisclosed in greater detail below.

FIG. 1 also illustrates the vendor system 120. According to oneembodiment, the vendor system 120 advantageously comprises a Web server.Typical Web servers generally serve content over the Internet using oneof several Internet markup languages or document format standards, suchas the Hyper-Text Markup Language (HTML) or the Extensible MarkupLanguage (XML). The Web server accepts requests from browsers likeNetscape and Internet Explorer and then returns the appropriateelectronic documents. A number of server or client-side technologies canbe used to increase the power of the Web server beyond its ability todeliver standard electronic documents. For example, these technologiesinclude Common Gateway Interface (CGI) scripts, Secure Sockets Layer(SSL) security, and Active Server Pages (ASPs). The vendor system 120may advantageously provide electronic content relating to commercial,personal, educational, or other transactions.

Although the vendor system 120 is disclosed with reference to theforegoing embodiments, the invention is not intended to be limitedthereby. Rather, a skilled artisan will recognize from the disclosureherein that the vendor system 120 may advantageously comprise any of thedevices described with reference to the user system 105 or combinationthereof.

FIG. 1 also illustrates the communication link 125 connecting the usersystem 105, the trust engine 110, the certificate authority 115, and thevendor system 120. According to one embodiment, the communication link125 preferably comprises the Internet. The Internet, as used throughoutthis disclosure is a global network of computers. The structure of theInternet, which is well known to those of ordinary skill in the art,includes a network backbone with networks branching from the backbone.These branches, in turn, have networks branching from them, and so on.Routers move information packets between network levels, and then fromnetwork to network, until the packet reaches the neighborhood of itsdestination. From the destination, the destination network's hostdirects the information packet to the appropriate terminal, or node. Inone advantageous embodiment, the Internet routing hubs comprise domainname system (DNS) servers using Transmission Control Protocol/InternetProtocol (TCP/IP) as is well known in the art. The routing hubs connectto one or more other routing hubs via high-speed communication links.

One popular part of the Internet is the World Wide Web. The World WideWeb contains different computers, which store documents capable ofdisplaying graphical and textual information. The computers that provideinformation on the World Wide Web are typically called “websites.” Awebsite is defined by an Internet address that has an associatedelectronic page. The electronic page can be identified by a UniformResource Locator (URL). Generally, an electronic page is a document thatorganizes the presentation of text, graphical images, audio, video, andso forth.

Although the communication link 125 is disclosed in terms of itspreferred embodiment, one of ordinary skill in the art will recognizefrom the disclosure herein that the communication link 125 may include awide range of interactive communications links. For example, thecommunication link 125 may include interactive television networks,telephone networks, wireless data transmission systems, two-way cablesystems, customized private or public computer networks, interactivekiosk networks, automatic teller machine networks, direct links,satellite or cellular networks, and the like.

FIG. 2 illustrates a block diagram of the trust engine 110 of FIG. 1according to aspects of an embodiment of the invention. As shown in FIG.2, the trust engine 110 includes a transaction engine 205, a depository210, an authentication engine 215, and a cryptographic engine 220.According to one embodiment of the invention, the trust engine 110 alsoincludes mass storage 225. As further shown in FIG. 2, the transactionengine 205 communicates with the depository 210, the authenticationengine 215, and the cryptographic engine 220, along with the massstorage 225. In addition, the depository 210 communicates with theauthentication engine 215, the cryptographic engine 220, and the massstorage 225. Moreover, the authentication engine 215 communicates withthe cryptographic engine 220. According to one embodiment of theinvention, some or all of the foregoing communications mayadvantageously comprise the transmission of XML documents to IPaddresses that correspond to the receiving device. As mentioned in theforegoing, XML documents advantageously allow designers to create theirown customized document tags, enabling the definition, transmission,validation, and interpretation of data between applications and betweenorganizations. Moreover, some or all of the foregoing communications mayinclude conventional SSL technologies.

According to one embodiment, the transaction engine 205 comprises a datarouting device, such as a conventional Web server available fromNetscape, Microsoft, Apache, or the like. For example, the Web servermay advantageously receive incoming data from the communication link125. According to one embodiment of the invention, the incoming data isaddressed to a front-end security system for the trust engine 110. Forexample, the front-end security system may advantageously include afirewall, an intrusion detection system searching for known attackprofiles, and/or a virus scanner. After clearing the front-end securitysystem, the data is received by the transaction engine 205 and routed toone of the depository 210, the authentication engine 215, thecryptographic engine 220, and the mass storage 225. In addition, thetransaction engine 205 monitors incoming data from the authenticationengine 215 and cryptographic engine 220, and routes the data toparticular systems through the communication link 125. For example, thetransaction engine 205 may advantageously route data to the user system105, the certificate authority 115, or the vendor system 120.

According to one embodiment, the data is routed using conventional HTTProuting techniques, such as, for example, employing URLs or UniformResource Indicators (URIs). URIs are similar to URLs, however, URIstypically indicate the source of files or actions, such as, for example,executables, scripts, and the like. Therefore, according to the oneembodiment, the user system 105, the certificate authority 115, thevendor system 120, and the components of the trust engine 210,advantageously include sufficient data within communication URLs or URIsfor the transaction engine 205 to properly route data throughout thecryptographic system.

Although the data routing is disclosed with reference to its preferredembodiment, a skilled artisan will recognize a wide number of possibledata routing solutions or strategies. For example, XML or other datapackets may advantageously be unpacked and recognized by their format,content, or the like, such that the transaction engine 205 may properlyroute data throughout the trust engine 110. Moreover, a skilled artisanwill recognize that the data routing may advantageously be adapted tothe data transfer protocols conforming to particular network systems,such as, for example, when the communication link 125 comprises a localnetwork.

According to yet another embodiment of the invention, the transactionengine 205 includes conventional SSL encryption technologies, such thatthe foregoing systems may authenticate themselves, and vise-versa, withtransaction engine 205, during particular communications. As will beused throughout this disclosure, the term “½ SSL” refers tocommunications where a server but not necessarily the client, is SSLauthenticated, and the term “FULL SSL” refers to communications wherethe client and the server are SSL authenticated. When the instantdisclosure uses the term “SSL”, the communication may comprise ½ or FULLSSL.

As the transaction engine 205 routes data to the various components ofthe cryptographic system 100, the transaction engine 205 mayadvantageously create an audit trail. According to one embodiment, theaudit trail includes a record of at least the type and format of datarouted by the transaction engine 205 throughout the cryptographic system100. Such audit data may advantageously be stored in the mass storage225.

FIG. 2 also illustrates the depository 210. According to one embodiment,the depository 210 comprises one or more data storage facilities, suchas, for example, a directory server, a database server, or the like. Asshown in FIG. 2, the depository 210 stores cryptographic keys andenrollment authentication data. The cryptographic keys mayadvantageously correspond to the trust engine 110 or to users of thecryptographic system 100, such as the user or vendor. The enrollmentauthentication data may advantageously include data designed to uniquelyidentify a user, such as, user ID, passwords, answers to questions,biometric data, or the like. This enrollment authentication data mayadvantageously be acquired at enrollment of a user or anotheralternative later time. For example, the trust engine 110 may includeperiodic or other renewal or reissue of enrollment authentication data.

According to one embodiment, the communication from the transactionengine 205 to and from the authentication engine 215 and thecryptographic engine 220 comprises secure communication, such as, forexample conventional SSL technology. In addition, as mentioned in theforegoing, the data of the communications to and from the depository 210may be transferred using URLs, URIs, HTTP or XML documents, with any ofthe foregoing advantageously having data requests and formats embeddedtherein.

As mentioned above, the depository 210 may advantageously comprises aplurality of secure data storage facilities. In such an embodiment, thesecure data storage facilities may be configured such that a compromiseof the security in one individual data storage facility will notcompromise the cryptographic keys or the authentication data storedtherein. For example, according to this embodiment, the cryptographickeys and the authentication data are mathematically operated on so as tostatistically and substantially randomize the data stored in each datastorage facility. According to one embodiment, the randomization of thedata of an individual data storage facility renders that dataundecipherable. Thus, compromise of an individual data storage facilityproduces only a randomized undecipherable number and does not compromisethe security of any cryptographic keys or the authentication data as awhole.

FIG. 2 also illustrates the trust engine 110 including theauthentication engine 215. According to one embodiment, theauthentication engine 215 comprises a data comparator configured tocompare data from the transaction engine 205 with data from thedepository 210. For example, during authentication, a user suppliescurrent authentication data to the trust engine 110 such that thetransaction engine 205 receives the current authentication data. Asmentioned in the foregoing, the transaction engine 205 recognizes thedata requests, preferably in the URL or URI, and routes theauthentication data to the authentication engine 215. Moreover, uponrequest, the depository 210 forwards enrollment authentication datacorresponding to the user to the authentication engine 215. Thus, theauthentication engine 215 has both the current authentication data andthe enrollment authentication data for comparison.

According to one embodiment, the communications to the authenticationengine comprise secure communications, such as, for example, SSLtechnology. Additionally, security can be provided within the trustengine 110 components, such as, for example, super-encryption usingpublic key technologies. For example, according to one embodiment, theuser encrypts the current authentication data with the public key of theauthentication engine 215. In addition, the depository 210 also encryptsthe enrollment authentication data with the public key of theauthentication engine 215. In this way, only the authentication engine'sprivate key can be used to decrypt the transmissions.

As shown in FIG. 2, the trust engine 110 also includes the cryptographicengine 220. According to one embodiment, the cryptographic enginecomprises a cryptographic handling module, configured to advantageouslyprovide conventional cryptographic functions, such as, for example,public-key infrastructure (PKI) functionality. For example, thecryptographic engine 220 may advantageously issue public and privatekeys for users of the cryptographic system 100. In this manner, thecryptographic keys are generated at the cryptographic engine 220 andforwarded to the depository 210 such that at least the privatecryptographic keys are not available outside of the trust engine 110.According to another embodiment, the cryptographic engine 220 randomizesand splits at least the private cryptographic key data, thereby storingonly the randomized split data. Similar to the splitting of theenrollment authentication data, the splitting process ensures the storedkeys are not available outside the cryptographic engine 220. Accordingto another embodiment, the functions of the cryptographic engine can becombined with and performed by the authentication engine 215.

According to one embodiment, communications to and from thecryptographic engine include secure communications, such as SSLtechnology. In addition, XML documents may advantageously be employed totransfer data and/or make cryptographic function requests.

FIG. 2 also illustrates the trust engine 110 having the mass storage225. As mentioned in the foregoing, the transaction engine 205 keepsdata corresponding to an audit trail and stores such data in the massstorage 225. Similarly, according to one embodiment of the invention,the depository 210 keeps data corresponding to an audit trail and storessuch data in the mass storage device 225. The depository audit traildata is similar to that of the transaction engine 205 in that the audittrail data comprises a record of the requests received by the depository210 and the response thereof. In addition, the mass storage 225 may beused to store digital certificates having the public key of a usercontained therein.

Although the trust engine 110 is disclosed with reference to itspreferred and alternative embodiments, the invention is not intended tobe limited thereby. Rather, a skilled artisan will recognize in thedisclosure herein, a wide number of alternatives for the trust engine110. For example, the trust engine 110, may advantageously perform onlyauthentication, or alternatively, only some or all of the cryptographicfunctions, such as data encryption and decryption. According to suchembodiments, one of the authentication engine 215 and the cryptographicengine 220 may advantageously be removed, thereby creating a morestraightforward design for the trust engine 110. In addition, thecryptographic engine 220 may also communicate with a certificateauthority such that the certificate authority is embodied within thetrust engine 110. According to yet another embodiment, the trust engine110 may advantageously perform authentication and one or morecryptographic functions, such as, for example, digital signing.

FIG. 3 illustrates a block diagram of the transaction engine 205 of FIG.2, according to aspects of an embodiment of the invention. According tothis embodiment, the transaction engine 205 comprises an operatingsystem 305 having a handling thread and a listening thread. Theoperating system 305 may advantageously be similar to those found inconventional high volume servers, such as, for example, Web serversavailable from Apache. The listening thread monitors the incomingcommunication from one of the communication link 125, the authenticationengine 215, and the cryptographic engine 220 for incoming data flow. Thehandling thread recognizes particular data structures of the incomingdata flow, such as, for example, the foregoing data structures, therebyrouting the incoming data to one of the communication link 125, thedepository 210, the authentication engine 215, the cryptographic engine220, or the mass storage 225. As shown in FIG. 3, the incoming andoutgoing data may advantageously be secured through, for example, SSLtechnology.

FIG. 4 illustrates a block diagram of the depository 210 of FIG. 2according to aspects of an embodiment of the invention. According tothis embodiment, the depository 210 comprises one or more lightweightdirectory access protocol (LDAP) servers. LDAP directory servers areavailable from a wide variety of manufacturers such as Netscape, ISO,and others. FIG. 4 also shows that the directory server preferablystores data 405 corresponding to the cryptographic keys and data 410corresponding to the enrollment authentication data. According to oneembodiment, the depository 210 comprises a single logical memorystructure indexing authentication data and cryptographic key data to aunique user ID. The single logical memory structure preferably includesmechanisms to ensure a high degree of trust, or security, in the datastored therein. For example, the physical location of the depository 210may advantageously include a wide number of conventional securitymeasures, such as limited employee access, modern surveillance systems,and the like. In addition to, or in lieu of, the physical securities,the computer system or server may advantageously include softwaresolutions to protect the stored data. For example, the depository 210may advantageously create and store data 415 corresponding to an audittrail of actions taken. In addition, the incoming and outgoingcommunications may advantageously be encrypted with public keyencryption coupled with conventional SSL technologies.

According to another embodiment, the depository 210 may comprisedistinct and physically separated data storage facilities, as disclosedfurther with reference to FIG. 7.

FIG. 5 illustrates a block diagram of the authentication engine 215 ofFIG. 2 according to aspects of an embodiment of the invention. Similarto the transaction engine 205 of FIG. 3, the authentication engine 215comprises an operating system 505 having at least a listening and ahandling thread of a modified version of a conventional Web server, suchas, for example, Web servers available from Apache. As shown in FIG. 5,the authentication engine 215 includes access to at least one privatekey 510. The private key 510 may advantageously be used for example, todecrypt data from the transaction engine 205 or the depository 210,which was encrypted with a corresponding public key of theauthentication engine 215.

FIG. 5 also illustrates the authentication engine 215 comprising acomparator 515, a data splitting module 520, and a data assemblingmodule 525. According to the preferred embodiment of the invention, thecomparator 515 includes technology capable of comparing potentiallycomplex patterns related to the foregoing biometric authentication data.The technology may include hardware, software, or combined solutions forpattern comparisons, such as, for example, those representing fingerprint patterns or voice patterns. In addition, according to oneembodiment, the comparator 515 of the authentication engine 215 mayadvantageously compare conventional hashes of documents in order torender a comparison result. According to one embodiment of theinvention, the comparator 515 includes the application of heuristics 530to the comparison. The heuristics 530 may advantageously addresscircumstances surrounding an authentication attempt, such as, forexample, the time of day, IP address or subnet mask, purchasing profile,email address, processor serial number or ID, or the like.

Moreover, the nature of biometric data comparisons may result in varyingdegrees of confidence being produced from the matching of currentbiometric authentication data to enrollment data. For example, unlike atraditional password which may only return a positive or negative match,a fingerprint may be determined to be a partial match, e.g. a 90% match,a 75% match, or a 10% match, rather than simply being correct orincorrect. Other biometric identifiers such as voice print analysis orface recognition may share this property of probabilisticauthentication, rather than absolute authentication.

When working with such probabilistic authentication or in other caseswhere an authentication is considered less than absolutely reliable, itis desirable to apply the heuristics 530 to determine whether the levelof confidence in the authentication provided is sufficiently high toauthenticate the transaction which is being made.

It will sometimes be the case that the transaction at issue is arelatively low value transaction where it is acceptable to beauthenticated to a lower level of confidence. This could include atransaction which has a low dollar value associated with it (e.g., a $10purchase) or a transaction with low risk (e.g., admission to amembers-only web site).

Conversely, for authenticating other transactions, it may be desirableto require a high degree of confidence in the authentication beforeallowing the transaction to proceed. Such transactions may includetransactions of large dollar value (e.g., signing a multi-million dollarsupply contract) or transaction with a high risk if an improperauthentication occurs (e.g., remotely logging onto a governmentcomputer).

The use of the heuristics 530 in combination with confidence levels andtransactions values may be used as will be described below to allow thecomparator to provide a dynamic context-sensitive authentication system.

According to another embodiment of the invention, the comparator 515 mayadvantageously track authentication attempts for a particulartransaction. For example, when a transaction fails, the trust engine 110may request the user to re-enter his or her current authentication data.The comparator 515 of the authentication engine 215 may advantageouslyemploy an attempt limiter 535 to limit the number of authenticationattempts, thereby prohibiting brute-force attempts to impersonate auser's authentication data. According to one embodiment, the attemptlimiter 535 comprises a software module monitoring transactions forrepeating authentication attempts and, for example, limiting theauthentication attempts for a given transaction to three. Thus, theattempt limiter 535 will limit an automated attempt to impersonate anindividual's authentication data to, for example, simply three“guesses.” Upon three failures, the attempt limiter 535 mayadvantageously deny additional authentication attempts. Such denial mayadvantageously be implemented through, for example, the comparator 515returning a negative result regardless of the current authenticationdata being transmitted. On the other hand, the transaction engine 205may advantageously block any additional authentication attemptspertaining to a transaction in which three attempts have previouslyfailed.

The authentication engine 215 also includes the data splitting module520 and the data assembling module 525. The data splitting module 520advantageously comprises a software, hardware, or combination modulehaving the ability to mathematically operate on various data so as tosubstantially randomize and split the data into portions. According toone embodiment, original data is not recreatable from an individualportion. The data assembling module 525 advantageously comprises asoftware, hardware, or combination module configured to mathematicallyoperate on the foregoing substantially randomized portions, such thatthe combination thereof provides the original deciphered data. Accordingto one embodiment, the authentication engine 215 employs the datasplitting module 520 to randomize and split enrollment authenticationdata into portions, and employs the data assembling module 525 toreassemble the portions into usable enrollment authentication data.

FIG. 6 illustrates a block diagram of the cryptographic engine 220 ofthe trust engine 200 of FIG. 2 according to aspects of one embodiment ofthe invention. Similar to the transaction engine 205 of FIG. 3, thecryptographic engine 220 comprises an operating system 605 having atleast a listening and a handling thread of a modified version of aconventional Web server, such as, for example, Web servers availablefrom Apache. As shown in FIG. 6, the cryptographic engine 220 comprisesa data splitting module 610 and a data assembling module 620 thatfunction similar to those of FIG. 5. However, according to oneembodiment, the data splitting module 610 and the data assembling module620 process cryptographic key data, as opposed to the foregoingenrollment authentication data. Although, a skilled artisan willrecognize from the disclosure herein that the data splitting module 910and the data splitting module 620 may be combined with those of theauthentication engine 215.

The cryptographic engine 220 also comprises a cryptographic handlingmodule 625 configured to perform one, some or all of a wide number ofcryptographic functions. According to one embodiment, the cryptographichandling module 625 may comprise software modules or programs, hardware,or both. According to another embodiment, the cryptographic handlingmodule 625 may perform data comparisons, data parsing, data splitting,data separating, data hashing, data encryption or decryption, digitalsignature verification or creation, digital certificate generation,storage, or requests, cryptographic key generation, or the like.Moreover, a skilled artisan will recognize from the disclosure hereinthat the cryptographic handling module 825 may advantageously comprisesa public-key infrastructure, such as Pretty Good Privacy (PGP), anRSA-based public-key system, or a wide number of alternative keymanagement systems. In addition, the cryptographic handling module 625may perform public-key encryption, symmetric-key encryption, or both. Inaddition to the foregoing, the cryptographic handling module 625 mayinclude one or more computer programs or modules, hardware, or both, forimplementing seamless, transparent, interoperability functions.

A skilled artisan will also recognize from the disclosure herein thatthe cryptographic functionality may include a wide number or variety offunctions generally relating to cryptographic key management systems.

FIG. 7 illustrates a simplified block diagram of a depository system 700according to aspects of an embodiment of the invention. As shown in FIG.7, the depository system 700 advantageously comprises multiple datastorage facilities, for example, data storage facilities D1, D2, D3, andD4. However, it is readily understood by those of ordinary skill in theart that the depository system may have only one data storage facility.According to one embodiment of the invention, each of the data storagefacilities D1 through D4 may advantageously comprise some or all of theelements disclosed with reference to the depository 210 of FIG. 4.Similar to the depository 210, the data storage facilities D1 through D4communicate with the transaction engine 205, the authentication engine215, and the cryptographic engine 220, preferably through conventionalSSL. Communication links transferring, for example, XML documents.Communications from the transaction engine 205 may advantageouslyinclude requests for data, wherein the request is advantageouslybroadcast to the IP address of each data storage facility D1 through D4.On the other hand, the transaction engine 205 may broadcast requests toparticular data storage facilities based on a wide number of criteria,such as, for example, response time, server loads, maintenanceschedules, or the like.

In response to requests for data from the transaction engine 205, thedepository system 700 advantageously forwards stored data to theauthentication engine 215 and the cryptographic engine 220. Therespective data assembling modules receive the forwarded data andassemble the data into useable formats. On the other hand,communications from the authentication engine 215 and the cryptographicengine 220 to the data storage facilities D1 through D4 may include thetransmission of sensitive data to be stored. For example, according toone embodiment, the authentication engine 215 and the cryptographicengine 220 may advantageously employ their respective data splittingmodules to divide sensitive data into undecipherable portions, and thentransmit one or more undecipherable portions of the sensitive data to aparticular data storage facility.

According to one embodiment, each data storage facility, D1 through D4,comprises a separate and independent storage system, such as, forexample, a directory server. According to another embodiment of theinvention, the depository system 700 comprises multiple geographicallyseparated independent data storage systems. By distributing thesensitive data into distinct and independent storage facilities D1through D4, some or all of which may be advantageously geographicallyseparated, the depository system 700 provides redundancy along withadditional security measures. For example, according to one embodiment,only data from two of the multiple data storage facilities, D1 throughD4, are needed to decipher and reassemble the sensitive data. Thus, asmany as two of the four data storage facilities D1 through D4 may beinoperative due to maintenance, system failure, power failure, or thelike, without affecting the functionality of the trust engine 110. Inaddition, because, according to one embodiment, the data stored in eachdata storage facility is randomized and undecipherable, compromise ofany individual data storage facility does not necessarily compromise thesensitive data. Moreover, in the embodiment having geographicalseparation of the data storage facilities, a compromise of multiplegeographically remote facilities becomes increasingly difficult. Infact, even a rogue employee will be greatly challenged to subvert theneeded multiple independent geographically remote data storagefacilities.

Although the depository system 700 is disclosed with reference to itspreferred and alternative embodiments, the invention is not intended tobe limited thereby. Rather, a skilled artisan will recognize from thedisclosure herein, a wide number of alternatives for the depositorysystem 700. For example, the depository system 700 may comprise one, twoor more data storage facilities. In addition, sensitive data may bemathematically operated such that portions from two or more data storagefacilities are needed to reassemble and decipher the sensitive data.

As mentioned in the foregoing, the authentication engine 215 and thecryptographic engine 220 each include a data splitting module 520 and610, respectively, for splitting any type or form of sensitive data,such as, for example, text, audio, video, the authentication data andthe cryptographic key data. FIG. 8 illustrates a flowchart of a datasplitting process 800 performed by the data splitting module accordingto aspects of an embodiment of the invention. As shown in FIG. 8, thedata splitting process 800 begins at step 805 when sensitive data “S” isreceived by the data splitting module of the authentication engine 215or the cryptographic engine 220. Preferably, in step 810, the datasplitting module then generates a substantially random number, value, orstring or set of bits, “A.” For example, the random number A may begenerated in a wide number of varying conventional techniques availableto one of ordinary skill in the art, for producing high quality randomnumbers suitable for use in cryptographic applications. In addition,according to one embodiment, the random number A comprises a bit lengthwhich may be any suitable length, such as shorter, longer or equal tothe bit length of the sensitive data, S.

In addition, in step 820 the data splitting process 800 generatesanother statistically random number “C.” According to the preferredembodiment, the generation of the statistically random numbers A and Cmay advantageously be done in parallel. The data splitting module thencombines the numbers A and C with the sensitive data S such that newnumbers “B” and “D” are generated. For example, number B may comprisethe binary combination of A XOR S and number D may comprise the binarycombination of C XOR S. The XOR function, or the “exclusive-or”function, is well known to those of ordinary skill in the art. Theforegoing combinations preferably occur in steps 825 and 830,respectively, and, according to one embodiment, the foregoingcombinations also occur in parallel. The data splitting process 800 thenproceeds to step 835 where the random numbers A and C and the numbers Band D are paired such that none of the pairings contain sufficient data,by themselves, to reorganize and decipher the original sensitive data S.For example, the numbers may be paired as follows: AC, AD, BC, and BD.According to one embodiment, each of the foregoing pairings isdistributed to one of the depositories D1 through D4 of FIG. 7.According to another embodiment, each of the foregoing pairings israndomly distributed to one of the depositories D1 through D4. Forexample, during a first data splitting process 800, the pairing AC maybe sent to depository D2, through, for example, a random selection ofD2's IP address. Then, during a second data splitting process 800, thepairing AC may be sent to depository D4, through, for example, a randomselection of D4's IP address. In addition, the pairings may all bestored on one depository, and may be stored in separate locations onsaid depository.

Based on the foregoing, the data splitting process 800 advantageouslyplaces portions of the sensitive data in each of the four data storagefacilities D1 through D4, such that no single data storage facility D1through D4 includes sufficient encrypted data to recreate the originalsensitive data S. As mentioned in the foregoing, such randomization ofthe data into individually unusable encrypted portions increasessecurity and provides for maintained trust in the data even if one ofthe data storage facilities, D1 through D4, is compromised.

Although the data splitting process 800 is disclosed with reference toits preferred embodiment, the invention is not intended to be limitedthereby. Rather a skilled artisan will recognize from the disclosureherein, a wide number of alternatives for the data splitting process800. For example, the data splitting process may advantageously splitthe data into two numbers, for example, random number A and number Band, randomly distribute A and B through two data storage facilities.Moreover, the data splitting process 800 may advantageously split thedata among a wide number of data storage facilities through generationof additional random numbers. The data may be split into any desired,selected, predetermined, or randomly assigned size unit, including butnot limited to, a bit, bits, bytes, kilobytes, megabytes or larger, orany combination or sequence of sizes. In addition, varying the sizes ofthe data units resulting from the splitting process may render the datamore difficult to restore to a useable form, thereby increasing securityof sensitive data. It is readily apparent to those of ordinary skill inthe art that the split data unit sizes may be a wide variety of dataunit sizes or patterns of sizes or combinations of sizes. For example,the data unit sizes may be selected or predetermined to be all of thesame size, a fixed set of different sizes, a combination of sizes, orrandomly generates sizes. Similarly, the data units may be distributedinto one or more shares according to a fixed or predetermined data unitsize, a pattern or combination of data unit sizes, or a randomlygenerated data unit size or sizes per share.

As mentioned in the foregoing, in order to recreate the sensitive dataS, the data portions need to be derandomized and reorganized. Thisprocess may advantageously occur in the data assembling modules, 525 and620, of the authentication engine 215 and the cryptographic engine 220,respectively. The data assembling module, for example, data assemblymodule 525, receives data portions from the data storage facilities D1through D4, and reassembles the data into useable form. For example,according to one embodiment where the data splitting module 520 employedthe data splitting process 800 of FIG. 8, the data assembling module 525uses data portions from at least two of the data storage facilities D1through D4 to recreate the sensitive data S. For example, the pairingsof AC, AD, BC, and BD, were distributed such that any two provide one ofA and B, or, C and D. Noting that S=A XOR B or S=C XOR D indicates thatwhen the data assembling module receives one of A and B, or, C and D,the data assembling module 525 can advantageously reassemble thesensitive data S. Thus, the data assembling module 525 may assemble thesensitive data S, when, for example, it receives data portions from atleast the first two of the data storage facilities D1 through D4 torespond to an assemble request by the trust engine 110.

Based on the above data splitting and assembling processes, thesensitive data S exists in usable format only in a limited area of thetrust engine 110. For example, when the sensitive data S includesenrollment authentication data, usable, nonrandomized enrollmentauthentication data is available only in the authentication engine 215.Likewise, when the sensitive data S includes private cryptographic keydata, usable, nonrandomized private cryptographic key data is availableonly in the cryptographic engine 220.

Although the data splitting and assembling processes are disclosed withreference to their preferred embodiments, the invention is not intendedto be limited thereby. Rather, a skilled artisan will recognize from thedisclosure herein, a wide number of alternatives for splitting andreassembling the sensitive data S. For example, public-key encryptionmay be used to further secure the data at the data storage facilities D1through D4. In addition, it is readily apparent to those of ordinaryskill in the art that the data splitting module described herein is alsoa separate and distinct embodiment of the present invention that may beincorporated into, combined with or otherwise made part of anypre-existing computer systems, software suites, database, orcombinations thereof, or other embodiments of the present invention,such as the trust engine, authentication engine, and transaction enginedisclosed and described herein.

FIG. 9A illustrates a data flow of an enrollment process 900 accordingto aspects of an embodiment of the invention. As shown in FIG. 9A, theenrollment process 900 begins at step 905 when a user desires to enrollwith the trust engine 110 of the cryptographic system 100. According tothis embodiment, the user system 105 advantageously includes aclient-side applet, such as a Java-based, that queries the user to enterenrollment data, such as demographic data and enrollment authenticationdata. According to one embodiment, the enrollment authentication dataincludes user ID, password(s), biometric(s), or the like. According toone embodiment, during the querying process, the client-side appletpreferably communicates with the trust engine 110 to ensure that achosen user ID is unique. When the user ID is nonunique, the trustengine 110 may advantageously suggest a unique user ID. The client-sideapplet gathers the enrollment data and transmits the enrollment data,for example, through and XML document, to the trust engine 110, and inparticular, to the transaction engine 205. According to one embodiment,the transmission is encoded with the public key of the authenticationengine 215.

According to one embodiment, the user performs a single enrollmentduring step 905 of the enrollment process 900. For example, the userenrolls himself or herself as a particular person, such as Joe User.When Joe User desires to enroll as Joe User, CEO of Mega Corp., thenaccording to this embodiment, Joe User enrolls a second time, receives asecond unique user ID and the trust engine 110 does not associate thetwo identities. According to another embodiment of the invention, theenrollment process 900 provides for multiple user identities for asingle user ID. Thus, in the above example, the trust engine 110 willadvantageously associate the two identities of Joe User. As will beunderstood by a skilled artisan from the disclosure herein, a user mayhave many identities, for example, Joe User the head of household, JoeUser the member of the Charitable Foundations, and the like. Even thoughthe user may have multiple identities, according to this embodiment, thetrust engine 110 preferably stores only one set of enrollment data.Moreover, users may advantageously add, edit/update, or deleteidentities as they are needed.

Although the enrollment process 900 is disclosed with reference to itspreferred embodiment, the invention is not intended to be limitedthereby. Rather, a skilled artisan will recognize from the disclosureherein, a wide number of alternatives for gathering of enrollment data,and in particular, enrollment authentication data. For example, theapplet may be common object model (COM) based applet or the like.

On the other hand, the enrollment process may include graded enrollment.For example, at a lowest level of enrollment, the user may enroll overthe communication link 125 without producing documentation as to his orher identity. According to an increased level of enrollment, the userenrolls using a trusted third party, such as a digital notary. Forexample, and the user may appear in person to the trusted third party,produce credentials such as a birth certificate, driver's license,military ID, or the like, and the trusted third party may advantageouslyinclude, for example, their digital signature in enrollment submission.The trusted third party may include an actual notary, a governmentagency, such as the Post Office or Department of Motor Vehicles, a humanresources person in a large company enrolling an employee, or the like.A skilled artisan will understand from the disclosure herein that a widenumber of varying levels of enrollment may occur during the enrollmentprocess 900.

After receiving the enrollment authentication data, at step 915, thetransaction engine 205, using conventional FULL SSL technology forwardsthe enrollment authentication data to the authentication engine 215. Instep 920, the authentication engine 215 decrypts the enrollmentauthentication data using the private key of the authentication engine215. In addition, the authentication engine 215 employs the datasplitting module to mathematically operate on the enrollmentauthentication data so as to split the data into at least twoindependently undecipherable, randomized, numbers. As mentioned in theforegoing, at least two numbers may comprise a statistically randomnumber and a binary XORed number. In step 925, the authentication engine215 forwards each portion of the randomized numbers to one of the datastorage facilities D1 through D4. As mentioned in the foregoing, theauthentication engine 215 may also advantageously randomize whichportions are transferred to which depositories.

Often during the enrollment process 900, the user will also desire tohave a digital certificate issued such that he or she may receiveencrypted documents from others outside the cryptographic system 100. Asmentioned in the foregoing, the certificate authority 115 generallyissues digital certificates according to one or more of severalconventional standards. Generally, the digital certificate includes apublic key of the user or system, which is known to everyone.

Whether the user requests a digital certificate at enrollment, or atanother time, the request is transferred through the trust engine 110 tothe authentication engine 215. According to one embodiment, the requestincludes an XML document having, for example, the proper name of theuser. According to step 935, the authentication engine 215 transfers therequest to the cryptographic engine 220 instructing the cryptographicengine 220 to generate a cryptographic key or key pair.

Upon request, at step 935, the cryptographic engine 220 generates atleast one cryptographic key. According to one embodiment, thecryptographic handling module 625 generates a key pair, where one key isused as a private key, and one is used as a public key. Thecryptographic engine 220 stores the private key and, according to oneembodiment, a copy of the public key. In step 945, the cryptographicengine 220 transmits a request for a digital certificate to thetransaction engine 205. According to one embodiment, the requestadvantageously includes a standardized request, such as PKCS10, embeddedin, for example, an XML document. The request for a digital certificatemay advantageously correspond to one or more certificate authorities andthe one or more standard formats the certificate authorities require.

In step 950 the transaction engine 205 forwards this request to thecertificate authority 115, who, in step 955, returns a digitalcertificate. The return digital certificate may advantageously be in astandardized format, such as PKCS7, or in a proprietary format of one ormore of the certificate authorities 115. In step 960, the digitalcertificate is received by the transaction engine 205, and a copy isforwarded to the user and a copy is stored with the trust engine 110.The trust engine 110 stores a copy of the certificate such that thetrust engine 110 will not need to rely on the availability of thecertificate authority 115. For example, when the user desires to send adigital certificate, or a third party requests the user's digitalcertificate, the request for the digital certificate is typically sentto the certificate authority 115. However, if the certificate authority115 is conducting maintenance or has been victim of a failure orsecurity compromise, the digital certificate may not be available.

At any time after issuing the cryptographic keys, the cryptographicengine 220 may advantageously employ the data splitting process 800described above such that the cryptographic keys are split intoindependently undecipherable randomized numbers. Similar to theauthentication data, at step 965 the cryptographic engine 220 transfersthe randomized numbers to the data storage facilities D1 through D4.

A skilled artisan will recognize from the disclosure herein that theuser may request a digital certificate anytime after enrollment.Moreover, the communications between systems may advantageously includeFULL SSL or public-key encryption technologies. Moreover, the enrollmentprocess may issue multiple digital certificates from multiplecertificate authorities, including one or more proprietary certificateauthorities internal or external to the trust engine 110.

As disclosed in steps 935 through 960, one embodiment of the inventionincludes the request for a certificate that is eventually stored on thetrust engine 110. Because, according to one embodiment, thecryptographic handling module 625 issues the keys used by the trustengine 110, each certificate corresponds to a private key. Therefore,the trust engine 110 may advantageously provide for interoperabilitythrough monitoring the certificates owned by, or associated with, auser. For example, when the cryptographic engine 220 receives a requestfor a cryptographic function, the cryptographic handling module 625 mayinvestigate the certificates owned by the requesting user to determinewhether the user owns a private key matching the attributes of therequest. When such a certificate exists, the cryptographic handlingmodule 625 may use the certificate or the public or private keysassociated therewith, to perform the requested function. When such acertificate does not exist, the cryptographic handling module 625 mayadvantageously and transparently perform a number of actions to attemptto remedy the lack of an appropriate key. For example, FIG. 9Billustrates a flowchart of an interoperability process 970, whichaccording to aspects of an embodiment of the invention, discloses theforegoing steps to ensure the cryptographic handling module 625 performscryptographic functions using appropriate keys.

As shown in FIG. 9B, the interoperability process 970 begins with step972 where the cryptographic handling module 925 determines the type ofcertificate desired. According to one embodiment of the invention, thetype of certificate may advantageously be specified in the request forcryptographic functions, or other data provided by the requestor.According to another embodiment, the certificate type may be ascertainedby the data format of the request. For example, the cryptographichandling module 925 may advantageously recognize the request correspondsto a particular type.

According to one embodiment, the certificate type may include one ormore algorithm standards, for example, RSA, ELGAMAL, or the like. Inaddition, the certificate type may include one or more key types, suchas symmetric keys, public keys, strong encryption keys such as 256 bitkeys, less secure keys, or the like. Moreover, the certificate type mayinclude upgrades or replacements of one or more of the foregoingalgorithm standards or keys, one or more message or data formats, one ormore data encapsulation or encoding schemes, such as Base 32 or Base 64.The certificate type may also include compatibility with one or morethird-party cryptographic applications or interfaces, one or morecommunication protocols, or one or more certificate standards orprotocols. A skilled artisan will recognize from the disclosure hereinthat other differences may exist in certificate types, and translationsto and from those differences may be implemented as disclosed herein.

Once the cryptographic handling module 625 determines the certificatetype, the interoperability process 970 proceeds to step 974, anddetermines whether the user owns a certificate matching the typedetermined in step 974. When the user owns a matching certificate, forexample, the trust engine 110 has access to the matching certificatethrough, for example, prior storage thereof, the cryptographic handlingmodule 825 knows that a matching private key is also stored within thetrust engine 110. For example, the matching private key may be storedwithin the depository 210 or depository system 700. The cryptographichandling module 625 may advantageously request the matching private keybe assembled from, for example, the depository 210, and then in step976, use the matching private key to perform cryptographic actions orfunctions. For example, as mentioned in the foregoing, the cryptographichandling module 625 may advantageously perform hashing, hashcomparisons, data encryption or decryption, digital signatureverification or creation, or the like.

When the user does not own a matching certificate, the interoperabilityprocess 970 proceeds to step 978 where the cryptographic handling module625 determines whether the users owns a cross-certified certificate.According to one embodiment, cross-certification between certificateauthorities occurs when a first certificate authority determines totrust certificates from a second certificate authority. In other words,the first certificate authority determines that certificates from thesecond certificate authority meets certain quality standards, andtherefore, may be “certified” as equivalent to the first certificateauthority's own certificates. Cross-certification becomes more complexwhen the certificate authorities issue, for example, certificates havinglevels of trust. For example, the first certificate authority mayprovide three levels of trust for a particular certificate, usuallybased on the degree of reliability in the enrollment process, while thesecond certificate authority may provide seven levels of trust.Cross-certification may advantageously track which levels and whichcertificates from the second certificate authority may be substitutedfor which levels and which certificates from the first. When theforegoing cross-certification is done officially and publicly betweentwo certification authorities, the mapping of certificates and levels toone another is often called “chaining.”

According to another embodiment of the invention, the cryptographichandling module 625 may advantageously develop cross-certificationsoutside those agreed upon by the certificate authorities. For example,the cryptographic handling module 625 may access a first certificateauthority's certificate practice statement (CPS), or other publishedpolicy statement, and using, for example, the authentication tokensrequired by particular trust levels, match the first certificateauthority's certificates to those of another certificate authority.

When, in step 978, the cryptographic handling module 625 determines thatthe users owns a cross-certified certificate, the interoperabilityprocess 970 proceeds to step 976, and performs the cryptographic actionor function using the cross-certified public key, private key, or both.Alternatively, when the cryptographic handling module 625 determinesthat the users does not own a cross-certified certificate, theinteroperability process 970 proceeds to step 980, where thecryptographic handling module 625 selects a certificate authority thatissues the requested certificate type, or a certificate cross-certifiedthereto. In step 982, the cryptographic handling module 625 determineswhether the user enrollment authentication data, discussed in theforegoing, meets the authentication requirements of the chosencertificate authority. For example, if the user enrolled over a networkby, for example, answering demographic and other questions, theauthentication data provided may establish a lower level of trust than auser providing biometric data and appearing before a third-party, suchas, for example, a notary. According to one embodiment, the foregoingauthentication requirements may advantageously be provided in the chosenauthentication authority's CPS.

When the user has provided the trust engine 110 with enrollmentauthentication data meeting the requirements of chosen certificateauthority, the interoperability process 970 proceeds to step 984, wherethe cryptographic handling module 825 acquires the certificate from thechosen certificate authority. According to one embodiment, thecryptographic handling module 625 acquires the certificate by followingsteps 945 through 960 of the enrollment process 900. For example, thecryptographic handling module 625 may advantageously employ one or morepublic keys from one or more of the key pairs already available to thecryptographic engine 220, to request the certificate from thecertificate authority. According to another embodiment, thecryptographic handling module 625 may advantageously generate one ormore new key pairs, and use the public keys corresponding thereto, torequest the certificate from the certificate authority.

According to another embodiment, the trust engine 110 may advantageouslyinclude one or more certificate issuing modules capable of issuing oneor more certificate types. According to this embodiment, the certificateissuing module may provide the foregoing certificate. When thecryptographic handling module 625 acquires the certificate, theinteroperability process 970 proceeds to step 976, and performs thecryptographic action or function using the public key, private key, orboth corresponding to the acquired certificate.

When the user, in step 982, has not provided the trust engine 110 withenrollment authentication data meeting the requirements of chosencertificate authority, the cryptographic handling module 625 determines,in step 986 whether there are other certificate authorities that havedifferent authentication requirements. For example, the cryptographichandling module 625 may look for certificate authorities having lowerauthentication requirements, but still issue the chosen certificates, orcross-certifications thereof.

When the foregoing certificate authority having lower requirementsexists, the interoperability process 970 proceeds to step 980 andchooses that certificate authority. Alternatively, when no suchcertificate authority exists, in step 988, the trust engine 110 mayrequest additional authentication tokens from the user. For example, thetrust engine 110 may request new enrollment authentication datacomprising, for example, biometric data. Also, the trust engine 110 mayrequest the user appear before a trusted third party and provideappropriate authenticating credentials, such as, for example, appearingbefore a notary with a drivers license, social security card, bank card,birth certificate, military ID, or the like. When the trust engine 110receives updated authentication data, the interoperability process 970proceeds to step 984 and acquires the foregoing chosen certificate.

Through the foregoing interoperability process 970, the cryptographichandling module 625 advantageously provides seamless, transparent,translations and conversions between differing cryptographic systems. Askilled artisan will recognize from the disclosure herein, a wide numberof advantages and implementations of the foregoing interoperable system.For example, the foregoing step 986 of the interoperability process 970may advantageously include aspects of trust arbitrage, discussed infurther detail below, where the certificate authority may under specialcircumstances accept lower levels of cross-certification. In addition,the interoperability process 970 may include ensuring interoperabilitybetween and employment of standard certificate revocations, such asemploying certificate revocation lists (CRL), online certificate statusprotocols (OCSP), or the like.

FIG. 10 illustrates a data flow of an authentication process 1000according to aspects of an embodiment of the invention. According to oneembodiment, the authentication process 1000 includes gathering currentauthentication data from a user and comparing that to the enrollmentauthentication data of the user. For example, the authentication process1000 begins at step 1005 where a user desires to perform a transactionwith, for example, a vendor. Such transactions may include, for example,selecting a purchase option, requesting access to a restricted area ordevice of the vendor system 120, or the like. At step 1010, a vendorprovides the user with a transaction ID and an authentication request.The transaction ID may advantageously include a 192 bit quantity havinga 32 bit timestamp concatenated with a 128 bit random quantity, or a“nonce,” concatenated with a 32 bit vendor specific constant. Such atransaction ID uniquely identifies the transaction such that copycattransactions can be refused by the trust engine 110.

The authentication request may advantageously include what level ofauthentication is needed for a particular transaction. For example, thevendor may specify a particular level of confidence that is required forthe transaction at issue. If authentication cannot be made to this levelof confidence, as will be discussed below, the transaction will notoccur without either further authentication by the user to raise thelevel of confidence, or a change in the terms of the authenticationbetween the vendor and the server. These issues are discussed morecompletely below.

According to one embodiment, the transaction ID and the authenticationrequest may be advantageously generated by a vendor-side applet or othersoftware program. In addition, the transmission of the transaction IDand authentication data may include one or more XML documents encryptedusing conventional SSL technology, such as, for example, ½ SSL, or, inother words vendor-side authenticated SSL.

After the user system 105 receives the transaction ID and authenticationrequest, the user system 105 gathers the current authentication data,potentially including current biometric information, from the user. Theuser system 105, at step 1015, encrypts at least the currentauthentication data “B” and the transaction ID, with the public key ofthe authentication engine 215, and transfers that data to the trustengine 110. The transmission preferably comprises XML documentsencrypted with at least conventional ½ SSL technology. In step 1020, thetransaction engine 205 receives the transmission, preferably recognizesthe data format or request in the URL or URI, and forwards thetransmission to the authentication engine 215.

During steps 1015 and 1020, the vendor system 120, at step 1025,forwards the transaction ID and the authentication request to the trustengine 110, using the preferred FULL SSL technology. This communicationmay also include a vendor ID, although vendor identification may also becommunicated through a non-random portion of the transaction ID. Atsteps 1030 and 1035, the transaction engine 205 receives thecommunication, creates a record in the audit trail, and generates arequest for the user's enrollment authentication data to be assembledfrom the data storage facilities D1 through D4. At step 1040, thedepository system 700 transfers the portions of the enrollmentauthentication data corresponding to the user to the authenticationengine 215. At step 1045, the authentication engine 215 decrypts thetransmission using its private key and compares the enrollmentauthentication data to the current authentication data provided by theuser.

The comparison of step 1045 may advantageously apply heuristical contextsensitive authentication, as referred to in the forgoing, and discussedin further detail below. For example, if the biometric informationreceived does not match perfectly, a lower confidence match results. Inparticular embodiments, the level of confidence of the authentication isbalanced against the nature of the transaction and the desires of boththe user and the vendor. Again, this is discussed in greater detailbelow.

At step 1050, the authentication engine 215 fills in the authenticationrequest with the result of the comparison of step 1045. According to oneembodiment of the invention, the authentication request is filled with aYES/NO or TRUE/FALSE result of the authentication process 1000. In step1055 the filled-in authentication request is returned to the vendor forthe vendor to act upon, for example, allowing the user to complete thetransaction that initiated the authentication request. According to oneembodiment, a confirmation message is passed to the user.

Based on the foregoing, the authentication process 1000 advantageouslykeeps sensitive data secure and produces results configured to maintainthe integrity of the sensitive data. For example, the sensitive data isassembled only inside the authentication engine 215. For example, theenrollment authentication data is undecipherable until it is assembledin the authentication engine 215 by the data assembling module, and thecurrent authentication data is undecipherable until it is unwrapped bythe conventional SSL technology and the private key of theauthentication engine 215. Moreover, the authentication resulttransmitted to the vendor does not include the sensitive data, and theuser may not even know whether he or she produced valid authenticationdata.

Although the authentication process 1000 is disclosed with reference toits preferred and alternative embodiments, the invention is not intendedto be limited thereby. Rather, a skilled artisan will recognize from thedisclosure herein, a wide number of alternatives for the authenticationprocess 1000. For example, the vendor may advantageously be replaced byalmost any requesting application, even those residing with the usersystem 105. For example, a client application, such as Microsoft Word,may use an application program interface (API) or a cryptographic API(CAPI) to request authentication before unlocking a document.Alternatively, a mail server, a network, a cellular phone, a personal ormobile computing device, a workstation, or the like, may all makeauthentication requests that can be filled by the authentication process1000. In fact, after providing the foregoing trusted authenticationprocess 1000, the requesting application or device may provide access toor use of a wide number of electronic or computer devices or systems.

Moreover, the authentication process 1000 may employ a wide number ofalternative procedures in the event of authentication failure. Forexample, authentication failure may maintain the same transaction ID andrequest that the user reenter his or her current authentication data. Asmentioned in the foregoing, use of the same transaction ID allows thecomparator of the authentication engine 215 to monitor and limit thenumber of authentication attempts for a particular transaction, therebycreating a more secure cryptographic system 100.

In addition, the authentication process 1000 may be advantageously beemployed to develop elegant single sign-on solutions, such as, unlockinga sensitive data vault. For example, successful or positiveauthentication may provide the authenticated user the ability toautomatically access any number of passwords for an almost limitlessnumber of systems and applications. For example, authentication of auser may provide the user access to password, login, financialcredentials, or the like, associated with multiple online vendors, alocal area network, various personal computing devices, Internet serviceproviders, auction providers, investment brokerages, or the like. Byemploying a sensitive data vault, users may choose truly large andrandom passwords because they no longer need to remember them throughassociation. Rather, the authentication process 1000 provides accessthereto. For example, a user may choose a random alphanumeric stringthat is twenty plus digits in length rather than something associatedwith a memorable data, name, etc.

According to one embodiment, a sensitive data vault associated with agiven user may advantageously be stored in the data storage facilitiesof the depository 210, or split and stored in the depository system 700.According to this embodiment, after positive user authentication, thetrust engine 110 serves the requested sensitive data, such as, forexample, to the appropriate password to the requesting application.According to another embodiment, the trust engine 110 may include aseparate system for storing the sensitive data vault. For example, thetrust engine 110 may include a stand-alone software engine implementingthe data vault functionality and figuratively residing “behind” theforegoing front-end security system of the trust engine 110. Accordingto this embodiment, the software engine serves the requested sensitivedata after the software engine receives a signal indicating positiveuser authentication from the trust engine 110.

In yet another embodiment, the data vault may be implemented by athird-party system. Similar to the software engine embodiment, thethird-party system may advantageously serve the requested sensitive dataafter the third-party system receives a signal indicating positive userauthentication from the trust engine 110. According to yet anotherembodiment, the data vault may be implemented on the user system 105. Auser-side software engine may advantageously serve the foregoing dataafter receiving a signal indicating positive user authentication fromthe trust engine 110.

Although the foregoing data vaults are disclosed with reference toalternative embodiments, a skilled artisan will recognize from thedisclosure herein, a wide number of additional implementations thereof.For example, a particular data vault may include aspects from some orall of the foregoing embodiments. In addition, any of the foregoing datavaults may employ one or more authentication requests at varying times.For example, any of the data vaults may require authentication every oneor more transactions, periodically, every one or more sessions, everyaccess to one or more Webpages or Websites, at one or more otherspecified intervals, or the like.

FIG. 11 illustrates a data flow of a signing process 1100 according toaspects of an embodiment of the invention. As shown in FIG. 11, thesigning process 1100 includes steps similar to those of theauthentication process 1000 described in the foregoing with reference toFIG. 10. According to one embodiment of the invention, the signingprocess 1100 first authenticates the user and then performs one or moreof several digital signing functions as will be discussed in furtherdetail below. According to another embodiment, the signing process 1100may advantageously store data related thereto, such as hashes ofmessages or documents, or the like. This data may advantageously be usedin an audit or any other event, such as for example, when aparticipating party attempts to repudiate a transaction.

As shown in FIG. 11, during the authentication steps, the user andvendor may advantageously agree on a message, such as, for example, acontract. During signing, the signing process 1100 advantageouslyensures that the contract signed by the user is identical to thecontract supplied by the vendor. Therefore, according to one embodiment,during authentication, the vendor and the user include a hash of theirrespective copies of the message or contract, in the data transmitted tothe authentication engine 215. By employing only a hash of a message orcontract, the trust engine 110 may advantageously store a significantlyreduced amount of data, providing for a more efficient and costeffective cryptographic system. In addition, the stored hash may beadvantageously compared to a hash of a document in question to determinewhether the document in question matches one signed by any of theparties. The ability to determine whether the document is identical toone relating to a transaction provides for additional evidence that canbe used against a claim for repudiation by a party to a transaction.

In step 1103, the authentication engine 215 assembles the enrollmentauthentication data and compares it to the current authentication dataprovided by the user. When the comparator of the authentication engine215 indicates that the enrollment authentication data matches thecurrent authentication data, the comparator of the authentication engine215 also compares the hash of the message supplied by the vendor to thehash of the message supplied by the user. Thus, the authenticationengine 215 advantageously ensures that the message agreed to by the useris identical to that agreed to by the vendor.

In step 1105, the authentication engine 215 transmits a digitalsignature request to the cryptographic engine 220. According to oneembodiment of the invention, the request includes a hash of the messageor contract. However, a skilled artisan will recognize from thedisclosure herein that the cryptographic engine 220 may encryptvirtually any type of data, including, but not limited to, video, audio,biometrics, images or text to form the desired digital signature.Returning to step 1105, the digital signature request preferablycomprises an XML document communicated through conventional SSLtechnologies.

In step 1110, the authentication engine 215 transmits a request to eachof the data storage facilities D1 through D4, such that each of the datastorage facilities D1 through D4 transmit their respective portion ofthe cryptographic key or keys corresponding to a signing party.According to another embodiment, the cryptographic engine 220 employssome or all of the steps of the interoperability process 970 discussedin the foregoing, such that the cryptographic engine 220 firstdetermines the appropriate key or keys to request from the depository210 or the depository system 700 for the signing party, and takesactions to provide appropriate matching keys. According to still anotherembodiment, the authentication engine 215 or the cryptographic engine220 may advantageously request one or more of the keys associated withthe signing party and stored in the depository 210 or depository system700.

According to one embodiment, the signing party includes one or both theuser and the vendor. In such case, the authentication engine 215advantageously requests the cryptographic keys corresponding to the userand/or the vendor. According to another embodiment, the signing partyincludes the trust engine 110.

In this embodiment, the trust engine 110 is certifying that theauthentication process 1000 properly authenticated the user, vendor, orboth. Therefore, the authentication engine 215 requests thecryptographic key of the trust engine 110, such as, for example, the keybelonging to the cryptographic engine 220, to perform the digitalsignature. According to another embodiment, the trust engine 110performs a digital notary-like function. In this embodiment, the signingparty includes the user, vendor, or both, along with the trust engine110. Thus, the trust engine 110 provides the digital signature of theuser and/or vendor, and then indicates with its own digital signaturethat the user and/or vendor were properly authenticated. In thisembodiment, the authentication engine 215 may advantageously requestassembly of the cryptographic keys corresponding to the user, thevendor, or both. According to another embodiment, the authenticationengine 215 may advantageously request assembly of the cryptographic keyscorresponding to the trust engine 110.

According to another embodiment, the trust engine 110 performs power ofattorney-like functions. For example, the trust engine 110 may digitallysign the message on behalf of a third party. In such case, theauthentication engine 215 requests the cryptographic keys associatedwith the third party. According to this embodiment, the signing process1100 may advantageously include authentication of the third party,before allowing power of attorney-like functions. In addition, theauthentication process 1000 may include a check for third partyconstraints, such as, for example, business logic or the like dictatingwhen and in what circumstances a particular third-party's signature maybe used.

Based on the foregoing, in step 1110, the authentication enginerequested the cryptographic keys from the data storage facilities D1through D4 corresponding to the signing party. In step 1115, the datastorage facilities D1 through D4 transmit their respective portions ofthe cryptographic key corresponding to the signing party to thecryptographic engine 220. According to one embodiment, the foregoingtransmissions include SSL technologies. According to another embodiment,the foregoing transmissions may advantageously be super-encrypted withthe public key of the cryptographic engine 220.

In step 1120, the cryptographic engine 220 assembles the foregoingcryptographic keys of the signing party and encrypts the messagetherewith, thereby forming the digital signature(s). In step 1125 of thesigning process 1100, the cryptographic engine 220 transmits the digitalsignature(s) to the authentication engine 215. In step 1130, theauthentication engine 215 transmits the filled-in authentication requestalong with a copy of the hashed message and the digital signature(s) tothe transaction engine 205. In step 1135, the transaction engine 205transmits a receipt comprising the transaction ID, an indication ofwhether the authentication was successful, and the digital signature(s),to the vendor. According to one embodiment, the foregoing transmissionmay advantageously include the digital signature of the trust engine110. For example, the trust engine 110 may encrypt the hash of thereceipt with its private key, thereby forming a digital signature to beattached to the transmission to the vendor.

According to one embodiment, the transaction engine 205 also transmits aconfirmation message to the user. Although the signing process 1100 isdisclosed with reference to its preferred and alternative embodiments,the invention is not intended to be limited thereby. Rather, a skilledartisan will recognize from the disclosure herein, a wide number ofalternatives for the signing process 1100. For example, the vendor maybe replaced with a user application, such as an email application. Forexample, the user may wish to digitally sign a particular email with hisor her digital signature. In such an embodiment, the transmissionthroughout the signing process 1100 may advantageously include only onecopy of a hash of the message. Moreover, a skilled artisan willrecognize from the disclosure herein that a wide number of clientapplications may request digital signatures. For example, the clientapplications may comprise word processors, spreadsheets, emails,voicemail, access to restricted system areas, or the like.

In addition, a skilled artisan will recognize from the disclosure hereinthat steps 1105 through 1120 of the signing process 1100 mayadvantageously employ some or all of the steps of the interoperabilityprocess 970 of FIG. 9B, thereby providing interoperability betweendiffering cryptographic systems that may, for example, need to processthe digital signature under differing signature types.

FIG. 12 illustrates a data flow of an encryption/decryption process 1200according to aspects of an embodiment of the invention. As shown in FIG.12, the decryption process 1200 begins by authenticating the user usingthe authentication process 1000. According to one embodiment, theauthentication process 1000 includes in the authentication request, asynchronous session key. For example, in conventional PKI technologies,it is understood by skilled artisans that encrypting or decrypting datausing public and private keys is mathematically intensive and mayrequire significant system resources. However, in symmetric keycryptographic systems, or systems where the sender and receiver of amessage share a single common key that is used to encrypt and decrypt amessage, the mathematical operations are significantly simpler andfaster. Thus, in the conventional PKI technologies, the sender of amessage will generate synchronous session key, and encrypt the messageusing the simpler, faster symmetric key system. Then, the sender willencrypt the session key with the public key of the receiver. Theencrypted session key will be attached to the synchronously encryptedmessage and both data are sent to the receiver. The receiver uses his orher private key to decrypt the session key, and then uses the sessionkey to decrypt the message. Based on the foregoing, the simpler andfaster symmetric key system is used for the majority of theencryption/decryption processing. Thus, in the decryption process 1200,the decryption advantageously assumes that a synchronous key has beenencrypted with the public key of the user. Thus, as mentioned in theforegoing, the encrypted session key is included in the authenticationrequest.

Returning to the decryption process 1200, after the user has beenauthenticated in step 1205, the authentication engine 215 forwards theencrypted session key to the cryptographic engine 220. In step 1210, theauthentication engine 215 forwards a request to each of the data storagefacilities, D1 through D4, requesting the cryptographic key data of theuser. In step 1215, each data storage facility, D1 through D4, transmitstheir respective portion of the cryptographic key to the cryptographicengine 220. According to one embodiment, the foregoing transmission isencrypted with the public key of the cryptographic engine 220.

In step 1220 of the decryption process 1200, the cryptographic engine220 assembles the cryptographic key and decrypts the session keytherewith. In step 1225, the cryptographic engine forwards the sessionkey to the authentication engine 215. In step 1227, the authenticationengine 215 fills in the authentication request including the decryptedsession key, and transmits the filled-in authentication request to thetransaction engine 205. In step 1230, the transaction engine 205forwards the authentication request along with the session key to therequesting application or vendor. Then, according to one embodiment, therequesting application or vendor uses the session key to decrypt theencrypted message.

Although the decryption process 1200 is disclosed with reference to itspreferred and alternative embodiments, a skilled artisan will recognizefrom the disclosure herein, a wide number of alternatives for thedecryption process 1200. For example, the decryption process 1200 mayforego synchronous key encryption and rely on full public-keytechnology. In such an embodiment, the requesting application maytransmit the entire message to the cryptographic engine 220, or, mayemploy some type of compression or reversible hash in order to transmitthe message to the cryptographic engine 220. A skilled artisan will alsorecognize from the disclosure herein that the foregoing communicationsmay advantageously include XML documents wrapped in SSL technology.

The encryption/decryption process 1200 also provides for encryption ofdocuments or other data. Thus, in step 1235, a requesting application orvendor may advantageously transmit to the transaction engine 205 of thetrust engine 110, a request for the public key of the user. Therequesting application or vendor makes this request because therequesting application or vendor uses the public key of the user, forexample, to encrypt the session key that will be used to encrypt thedocument or message. As mentioned in the enrollment process 900, thetransaction engine 205 stores a copy of the digital certificate of theuser, for example, in the mass storage 225. Thus, in step 1240 of theencryption process 1200, the transaction engine 205 requests the digitalcertificate of the user from the mass storage 225. In step 1245, themass storage 225 transmits the digital certificate corresponding to theuser, to the transaction engine 205. In step 1250, the transactionengine 205 transmits the digital certificate to the requestingapplication or vendor. According to one embodiment, the encryptionportion of the encryption process 1200 does not include theauthentication of a user. This is because the requesting vendor needsonly the public key of the user, and is not requesting any sensitivedata.

A skilled artisan will recognize from the disclosure herein that if aparticular user does not have a digital certificate, the trust engine110 may employ some or all of the enrollment process 900 in order togenerate a digital certificate for that particular user. Then, the trustengine 110 may initiate the encryption/decryption process 1200 andthereby provide the appropriate digital certificate. In addition, askilled artisan will recognize from the disclosure herein that steps1220 and 1235 through 1250 of the encryption/decryption process 1200 mayadvantageously employ some or all of the steps of the interoperabilityprocess of FIG. 9B, thereby providing interoperability between differingcryptographic systems that may, for example, need to process theencryption.

FIG. 13 illustrates a simplified block diagram of a trust engine system1300 according to aspects of yet another embodiment of the invention. Asshown in FIG. 13, the trust engine system 1300 comprises a plurality ofdistinct trust engines 1305, 1310, 1315, and 1320, respectively. Tofacilitate a more complete understanding of the invention, FIG. 13illustrates each trust engine, 1305, 1310, 1315, and 1320 as having atransaction engine, a depository, and an authentication engine. However,a skilled artisan will recognize that each transaction engine mayadvantageously comprise some, a combination, or all of the elements andcommunication channels disclosed with reference to FIGS. 1-8. Forexample, one embodiment may advantageously include trust engines havingone or more transaction engines, depositories, and cryptographic serversor any combinations thereof.

According to one embodiment of the invention, each of the trust engines1305, 1310, 1315 and 1320 are geographically separated, such that, forexample, the trust engine 1305 may reside in a first location, the trustengine 1310 may reside in a second location, the trust engine 1315 mayreside in a third location, and the trust engine 1320 may reside in afourth location. The foregoing geographic separation advantageouslydecreases system response time while increasing the security of theoverall trust engine system 1300.

For example, when a user logs onto the cryptographic system 100, theuser may be nearest the first location and may desire to beauthenticated. As described with reference to FIG. 10, to beauthenticated, the user provides current authentication data, such as abiometric or the like, and the current authentication data is comparedto that user's enrollment authentication data. Therefore, according toone example, the user advantageously provides current authenticationdata to the geographically nearest trust engine 1305. The transactionengine 1321 of the trust engine 1305 then forwards the currentauthentication data to the authentication engine 1322 also residing atthe first location. According to another embodiment, the transactionengine 1321 forwards the current authentication data to one or more ofthe authentication engines of the trust engines 1310, 1315, or 1320.

The transaction engine 1321 also requests the assembly of the enrollmentauthentication data from the depositories of, for example, each of thetrust engines, 1305 through 1320. According to this embodiment, eachdepository provides its portion of the enrollment authentication data tothe authentication engine 1322 of the trust engine 1305. Theauthentication engine 1322 then employs the encrypted data portionsfrom, for example, the first two depositories to respond, and assemblesthe enrollment authentication data into deciphered form. Theauthentication engine 1322 compares the enrollment authentication datawith the current authentication data and returns an authenticationresult to the transaction engine 1321 of the trust engine 1305.

Based on the above, the trust engine system 1300 employs the nearest oneof a plurality of geographically separated trust engines, 1305 through1320, to perform the authentication process. According to one embodimentof the invention, the routing of information to the nearest transactionengine may advantageously be performed at client-side applets executingon one or more of the user system 105, vendor system 120, or certificateauthority 115. According to an alternative embodiment, a moresophisticated decision process may be employed to select from the trustengines 1305 through 1320. For example, the decision may be based on theavailability, operability, speed of connections, load, performance,geographic proximity, or a combination thereof, of a given trust engine.

In this way, the trust engine system 1300 lowers its response time whilemaintaining the security advantages associated with geographicallyremote data storage facilities, such as those discussed with referenceto FIG. 7 where each data storage facility stores randomized portions ofsensitive data. For example, a security compromise at, for example, thedepository 1325 of the trust engine 1315 does not necessarily compromisethe sensitive data of the trust engine system 1300. This is because thedepository 1325 contains only non-decipherable randomized data that,without more, is entirely useless.

According to another embodiment, the trust engine system 1300 mayadvantageously include multiple cryptographic engines arranged similarto the authentication engines. The cryptographic engines mayadvantageously perform cryptographic functions such as those disclosedwith reference to FIGS. 1-8. According to yet another embodiment, thetrust engine system 1300 may advantageously replace the multipleauthentication engines with multiple cryptographic engines, therebyperforming cryptographic functions such as those disclosed withreference to FIGS. 1-8. According to yet another embodiment of theinvention, the trust engine system 1300 may replace each multipleauthentication engine with an engine having some or all of thefunctionality of the authentication engines, cryptographic engines, orboth, as disclosed in the foregoing,

Although the trust engine system 1300 is disclosed with reference to itspreferred and alternative embodiments, a skilled artisan will recognizethat the trust engine system 1300 may comprise portions of trust engines1305 through 1320. For example, the trust engine system 1300 may includeone or more transaction engines, one or more depositories, one or moreauthentication engines, or one or more cryptographic engines orcombinations thereof.

FIG. 14 illustrates a simplified block diagram of a trust engine System1400 according to aspects of yet another embodiment of the invention. Asshown in FIG. 14, the trust engine system 1400 includes multiple trustengines 1405, 1410, 1415 and 1420. According to one embodiment, each ofthe trust engines 1405, 1410, 1415 and 1420, comprise some or all of theelements of trust engine 110 disclosed with reference to FIGS. 1-8.According to this embodiment, when the client side applets of the usersystem 105, the vendor system 120, or the certificate authority 115,communicate with the trust engine system 1400, those communications aresent to the IP address of each of the trust engines 1405 through 1420.Further, each transaction engine of each of the trust engines, 1405,1410, 1415, and 1420, behaves similar to the transaction engine 1321 ofthe trust engine 1305 disclosed with reference to FIG. 13. For example,during an authentication process, each transaction engine of each of thetrust engines 1405, 1410, 1415, and 1420 transmits the currentauthentication data to their respective authentication engines andtransmits a request to assemble the randomized data stored in each ofthe depositories of each of the trust engines 1405 through 1420. FIG. 14does not illustrate all of these communications; as such illustrationwould become overly complex. Continuing with the authentication process,each of the depositories then communicates its portion of the randomizeddata to each of the authentication engines of the each of the trustengines 1405 through 1420. Each of the authentication engines of theeach of the trust engines employs its comparator to determine whetherthe current authentication data matches the enrollment authenticationdata provided by the depositories of each of the trust engines 1405through 1420. According to this embodiment, the result of the comparisonby each of the authentication engines is then transmitted to aredundancy module of the other three trust engines. For example, theresult of the authentication engine from the trust engine 1405 istransmitted to the redundancy modules of the trust engines 1410, 1415,and 1420. Thus, the redundancy module of the trust engine 1405 likewisereceives the result of the authentication engines from the trust engines1410, 1415, and 1420.

FIG. 15 illustrates a block diagram of the redundancy module of FIG. 14.The redundancy module comprises a comparator configured to receive theauthentication result from three authentication engines and transmitthat result to the transaction engine of the fourth trust engine. Thecomparator compares the authentication result form the threeauthentication engines, and if two of the results agree, the comparatorconcludes that the authentication result should match that of the twoagreeing authentication engines. This result is then transmitted back tothe transaction engine corresponding to the trust engine not associatedwith the three authentication engines.

Based on the foregoing, the redundancy module determines anauthentication result from data received from authentication enginesthat are preferably geographically remote from the trust engine of thatthe redundancy module. By providing such redundancy functionality, thetrust engine system 1400 ensures that a compromise of the authenticationengine of one of the trust engines 1405 through 1420, is insufficient tocompromise the authentication result of the redundancy module of thatparticular trust engine. A skilled artisan will recognize thatredundancy module functionality of the trust engine system 1400 may alsobe applied to the cryptographic engine of each of the trust engines 1405through 1420. However, such cryptographic engine communication was notshown in FIG. 14 to avoid complexity. Moreover, a skilled artisan willrecognize a wide number of alternative authentication result conflictresolution algorithms for the comparator of FIG. 15 are suitable for usein the present invention.

According to yet another embodiment of the invention, the trust enginesystem 1400 may advantageously employ the redundancy module duringcryptographic comparison steps. For example, some or all of theforegoing redundancy module disclosure with reference to FIGS. 14 and 15may advantageously be implemented during a hash comparison of documentsprovided by one or more parties during a particular transaction.

Although the foregoing invention has been described in terms of certainpreferred and alternative embodiments, other embodiments will beapparent to those of ordinary skill in the art from the disclosureherein. For example, the trust engine 110 may issue short-termcertificates, where the private cryptographic key is released to theuser for a predetermined period of time. For example, currentcertificate standards include a validity field that can be set to expireafter a predetermined amount of time. Thus, the trust engine 110 mayrelease a private key to a user where the private key would be validfor, for example, 24 hours. According to such an embodiment, the trustengine 110 may advantageously issue a new cryptographic key pair to beassociated with a particular user and then release the private key ofthe new cryptographic key pair. Then, once the private cryptographic keyis released, the trust engine 110 immediately expires any internal validuse of such private key, as it is no longer securable by the trustengine 110.

In addition, a skilled artisan will recognize that the cryptographicsystem 100 or the trust engine 110 may include the ability to recognizeany type of devices, such as, but not limited to, a laptop, a cellphone, a network, a biometric device or the like. According to oneembodiment, such recognition may come from data supplied in the requestfor a particular service, such as, a request for authentication leadingto access or use, a request for cryptographic functionality, or thelike. According to one embodiment, the foregoing request may include aunique device identifier, such as, for example, a processor ID.Alternatively, the request may include data in a particular recognizabledata format. For example, mobile and satellite phones often do notinclude the processing power for full X509.v3 heavy encryptioncertificates, and therefore do not request them. According to thisembodiment, the trust engine 110 may recognize the type of data formatpresented, and respond only in kind.

In an additional aspect of the system described above, context sensitiveauthentication can be provided using various techniques as will bedescribed below. Context sensitive authentication, for example as shownin FIG. 16, provides the possibility of evaluating not only the actualdata which is sent by the user when attempting to authenticate himself,but also the circumstances surrounding the generation and delivery ofthat data. Such techniques may also support transaction specific trustarbitrage between the user and trust engine 110 or between the vendorand trust engine 110, as will be described below.

As discussed above, authentication is the process of proving that a useris who he says he is. Generally, authentication requires demonstratingsome fact to an authentication authority. The trust engine 110 of thepresent invention represents the authority to which a user mustauthenticate himself. The user must demonstrate to the trust engine 110that he is who he says he is by either: knowing something that only theuser should know (knowledge-based authentication), having something thatonly the user should have (token-based authentication), or by beingsomething that only the user should be (biometric-based authentication).

Examples of knowledge-based authentication include without limitation apassword, PIN number, or lock combination. Examples of token-basedauthentication include without limitation a house key, a physical creditcard, a driver's license, or a particular phone number. Examples ofbiometric-based authentication include without limitation a fingerprint,handwriting analysis, facial scan, hand scan, ear scan, iris scan,vascular pattern, DNA, a voice analysis, or a retinal scan.

Each type of authentication has particular advantages and disadvantages,and each provides a different level of security. For example, it isgenerally harder to create a false fingerprint that matches someoneelse's than it is to overhear someone's password and repeat it. Eachtype of authentication also requires a different type of data to beknown to the authenticating authority in order to verify someone usingthat form of authentication.

As used herein, “authentication” will refer broadly to the overallprocess of verifying someone's identity to be who he says he is. An“authentication technique” will refer to a particular type ofauthentication based upon a particular piece of knowledge, physicaltoken, or biometric reading. “Authentication data” refers to informationwhich is sent to or otherwise demonstrated to an authenticationauthority in order to establish identity. “Enrollment data” will referto the data which is initially submitted to an authentication authorityin order to establish a baseline for comparison with authenticationdata. An “authentication instance” will refer to the data associatedwith an attempt to authenticate by an authentication technique.

The internal protocols and communications involved in the process ofauthenticating a user is described with reference to FIG. 10 above. Thepart of this process within which the context sensitive authenticationtakes place occurs within the comparison step shown as step 1045 of FIG.10. This step takes place within the authentication engine 215 andinvolves assembling the enrollment data 410 retrieved from thedepository 210 and comparing the authentication data provided by theuser to it. One particular embodiment of this process is shown in FIG.16 and described below.

The current authentication data provided by the user and the enrollmentdata retrieved from the depository 210 are received by theauthentication engine 215 in step 1600 of FIG. 16. Both of these sets ofdata may contain data which is related to separate techniques ofauthentication. The authentication engine 215 separates theauthentication data associated with each individual authenticationinstance in step 1605. This is necessary so that the authentication datais compared with the appropriate subset of the enrollment data for theuser (e.g. fingerprint authentication data should be compared withfingerprint enrollment data, rather than password enrollment data).

Generally, authenticating a user involves one or more individualauthentication instances, depending on which authentication techniquesare available to the user. These methods are limited by the enrollmentdata which were provided by the user during his enrollment process (ifthe user did not provide a retinal scan when enrolling, he will not beable to authenticate himself using a retinal scan), as well as the meanswhich may be currently available to the user (e.g. if the user does nothave a fingerprint reader at his current location, fingerprintauthentication will not be practical). In some cases, a singleauthentication instance may be sufficient to authenticate a user;however, in certain circumstances a combination of multipleauthentication instances may be used in order to more confidentlyauthenticate a user for a particular transaction.

Each authentication instance consists of data related to a particularauthentication technique (e.g. fingerprint, password, smart card, etc.)and the circumstances which surround the capture and delivery of thedata for that particular technique. For example, a particular instanceof attempting to authenticate via password will generate not only thedata related to the password itself, but also circumstantial data, knownas “metadata”, related to that password attempt. This circumstantialdata includes information such as: the time at which the particularauthentication instance took place, the network address from which theauthentication information was delivered, as well as any otherinformation as is known to those of skill in the art which may bedetermined about the origin of the authentication data (the type ofconnection, the processor serial number, etc.).

In many cases, only a small amount of circumstantial metadata will beavailable. For example, if the user is located on a network which usesproxies or network address translation or another technique which masksthe address of the originating computer, only the address of the proxyor router may be determined. Similarly, in many cases information suchas the processor serial number will not be available because of eitherlimitations of the hardware or operating system being used, disabling ofsuch features by the operator of the system, or other limitations of theconnection between the user's system and the trust engine 110.

As shown in FIG. 16, once the individual authentication instancesrepresented within the authentication data are extracted and separatedin step 1605, the authentication engine 215 evaluates each instance forits reliability in indicating that the user is who he claims to be. Thereliability for a single authentication instance will generally bedetermined based on several factors. These may be grouped as factorsrelating to the reliability associated with the authenticationtechnique, which are evaluated in step 1610, and factors relating to thereliability of the particular authentication data provided, which areevaluated in step 1815. The first group includes without limitation theinherent reliability of the authentication technique being used, and thereliability of the enrollment data being used with that method. Thesecond group includes without limitation the degree of match between theenrollment data and the data provided with the authentication instance,and the metadata associated with that authentication instance. Each ofthese factors may vary independently of the others.

The inherent reliability of an authentication technique is based on howhard it is for an imposter to provide someone else's correct data, aswell as the overall error rates for the authentication technique. Forpasswords and knowledge based authentication methods, this reliabilityis often fairly low because there is nothing that prevents someone fromrevealing their password to another person and for that second person touse that password. Even a more complex knowledge based system may haveonly moderate reliability since knowledge may be transferred from personto person fairly easily. Token based authentication, such as having aproper smart card or using a particular terminal to perform theauthentication, is similarly of low reliability used by itself, sincethere is no guarantee that the right person is in possession of theproper token.

However, biometric techniques are more inherently reliable because it isgenerally difficult to provide someone else with the ability to use yourfingerprints in a convenient manner, even intentionally. Becausesubverting biometric authentication techniques is more difficult, theinherent reliability of biometric methods is generally higher than thatof purely knowledge or token based authentication techniques. However,even biometric techniques may have some occasions in which a falseacceptance or false rejection is generated. These occurrences may bereflected by differing reliabilities for different implementations ofthe same biometric technique. For example, a fingerprint matching systemprovided by one company may provide a higher reliability than oneprovided by a different company because one uses higher quality opticsor a better scanning resolution or some other improvement which reducesthe occurrence of false acceptances or false rejections.

Note that this reliability may be expressed in different manners. Thereliability is desirably expressed in some metric which can be used bythe heuristics 530 and algorithms of the authentication engine 215 tocalculate the confidence level of each authentication. One preferredmode of expressing these reliabilities is as a percentage or fraction.For instance, fingerprints might be assigned an inherent reliability of97%, while passwords might only be assigned an inherent reliability of50%. Those of skill in the art will recognize that these particularvalues are merely exemplary and may vary between specificimplementations.

The second factor for which reliability must be assessed is thereliability of the enrollment. This is part of the “graded enrollment”process referred to above. This reliability factor reflects thereliability of the identification provided during the initial enrollmentprocess. For instance, if the individual initially enrolls in a mannerwhere they physically produce evidence of their identity to a notary orother public official, and enrollment data is recorded at that time andnotarized, the data will be more reliable than data which is providedover a network during enrollment and only vouched for by a digitalsignature or other information which is not truly tied to theindividual.

Other enrollment techniques with varying levels of reliability includewithout limitation: enrollment at a physical office of the trust engine110 operator; enrollment at a user's place of employment; enrollment ata post office or passport office; enrollment through an affiliated ortrusted party to the trust engine 110 operator; anonymous orpseudonymous enrollment in which the enrolled identity is not yetidentified with a particular real individual, as well as such othermeans as are known in the art.

These factors reflect the trust between the trust engine 110 and thesource of identification provided during the enrollment process. Forinstance, if enrollment is performed in association with an employerduring the initial process of providing evidence of identity, thisinformation may be considered extremely reliable for purposes within thecompany, but may be trusted to a lesser degree by a government agency,or by a competitor. Therefore, trust engines operated by each of theseother organizations may assign different levels of reliability to thisenrollment.

Similarly, additional data which is submitted across a network, butwhich is authenticated by other trusted data provided during a previousenrollment with the same trust engine 110 may be considered as reliableas the original enrollment data was, even though the latter data weresubmitted across an open network. In such circumstances, a subsequentnotarization will effectively increase the level of reliabilityassociated with the original enrollment data. In this way for example,an anonymous or pseudonymous enrollment may then be raised to a fullenrollment by demonstrating to some enrollment official the identity ofthe individual matching the enrolled data.

The reliability factors discussed above are generally values which maybe determined in advance of any particular authentication instance. Thisis because they are based upon the enrollment and the technique, ratherthan the actual authentication. In one embodiment, the step ofgenerating reliability based upon these factors involves looking uppreviously determined values for this particular authenticationtechnique and the enrollment data of the user. In a further aspect of anadvantageous embodiment of the present invention, such reliabilities maybe included with the enrollment data itself. In this way, these factorsare automatically delivered to the authentication engine 215 along withthe enrollment data sent from the depository 210.

While these factors may generally be determined in advance of anyindividual authentication instance, they still have an effect on eachauthentication instance which uses that particular technique ofauthentication for that user. Furthermore, although the values maychange over time (e.g. if the user re-enrolls in a more reliablefashion), they are not dependent on the authentication data itself. Bycontrast, the reliability factors associated with a single specificinstance's data may vary on each occasion. These factors, as discussedbelow, must be evaluated for each new authentication in order togenerate reliability scores in step 1815.

The reliability of the authentication data reflects the match betweenthe data provided by the user in a particular authentication instanceand the data provided during the authentication enrollment. This is thefundamental question of whether the authentication data matches theenrollment data for the individual the user is claiming to be. Normally,when the data do not match, the user is considered to not besuccessfully authenticated, and the authentication fails. The manner inwhich this is evaluated may change depending on the authenticationtechnique used. The comparison of such data is performed by thecomparator 515 function of the authentication engine 215 as shown inFIG. 5.

For instance, matches of passwords are generally evaluated in a binaryfashion. In other words, a password is either a perfect match, or afailed match. It is usually not desirable to accept as even a partialmatch a password which is close to the correct password if it is notexactly correct. Therefore, when evaluating a password authentication,the reliability of the authentication returned by the comparator 515 istypically either 100% (correct) or 0% (wrong), with no possibility ofintermediate values.

Similar rules to those for passwords are generally applied to tokenbased authentication methods, such as smart cards. This is becausehaving a smart card which has a similar identifier or which is similarto the correct one, is still just as wrong as having any other incorrecttoken. Therefore tokens tend also to be binary authenticators: a usereither has the right token, or he doesn't.

However, certain types of authentication data, such as questionnairesand biometrics, are generally not binary authenticators. For example, afingerprint may match a reference fingerprint to varying degrees. Tosome extent, this may be due to variations in the quality of the datacaptured either during the initial enrollment or in subsequentauthentications. (A fingerprint may be smudged or a person may have astill healing scar or burn on a particular finger.) In other instancesthe data may match less than perfectly because the information itself issomewhat variable and based upon pattern matching. (A voice analysis mayseem close but not quite right because of background noise, or theacoustics of the environment in which the voice is recorded, or becausethe person has a cold.) Finally, in situations where large amounts ofdata are being compared, it may simply be the case that much of the datamatches well, but some doesn't. (A ten-question questionnaire may haveresulted in eight correct answers to personal questions, but twoincorrect answers.) For any of these reasons, the match between theenrollment data and the data for a particular authentication instancemay be desirably assigned a partial match value by the comparator 515.In this way, the fingerprint might be said to be a 85% match, the voiceprint a 65% match, and the questionnaire an 80% match, for example.

This measure (degree of match) produced by the comparator 515 is thefactor representing the basic issue of whether an authentication iscorrect or not. However, as discussed above, this is only one of thefactors which may be used in determining the reliability of a givenauthentication instance. Note also that even though a match to somepartial degree may be determined, that ultimately, it may be desirableto provide a binary result based upon a partial match. In an alternatemode of operation, it is also possible to treat partial matches asbinary, i.e. either perfect (100%) or failed (0%) matches, based uponwhether or not the degree of match passes a particular threshold levelof match. Such a process may be used to provide a simple pass/fail levelof matching for systems which would otherwise produce partial matches.

Another factor to be considered in evaluating the reliability of a givenauthentication instance concerns the circumstances under which theauthentication data for this particular instance are provided. Asdiscussed above, the circumstances refer to the metadata associated witha particular authentication instance. This may include withoutlimitation such information as: the network address of theauthenticator, to the extent that it can be determined; the time of theauthentication; the mode of transmission of the authentication data(phone line, cellular, network, etc.); and the serial number of thesystem of the authenticator.

These factors can be used to produce a profile of the type ofauthentication that is normally requested by the user. Then, thisinformation can be used to assess reliability in at least two manners.One manner is to consider whether the user is requesting authenticationin a manner which is consistent with the normal profile ofauthentication by this user. If the user normally makes authenticationrequests from one network address during business days (when she is atwork) and from a different network address during evenings or weekends(when she is at home), an authentication which occurs from the homeaddress during the business day is less reliable because it is outsidethe normal authentication profile. Similarly, if the user normallyauthenticates using a fingerprint biometric and in the evenings, anauthentication which originates during the day using only a password isless reliable.

An additional way in which the circumstantial metadata can be used toevaluate the reliability of an instance of authentication is todetermine how much corroboration the circumstance provides that theauthenticator is the individual he claims to be. For instance, if theauthentication comes from a system with a serial number known to beassociated with the user, this is a good circumstantial indicator thatthe user is who they claim to be. Conversely, if the authentication iscoming from a network address which is known to be in Los Angeles whenthe user is known to reside in London, this is an indication that thisauthentication is less reliable based on its circumstances.

It is also possible that a cookie or other electronic data may be placedupon the system being used by a user when they interact with a vendorsystem or with the trust engine 110. This data is written to the storageof the system of the user and may contain an identification which may beread by a Web browser or other software on the user system. If this datais allowed to reside on the user system between sessions (a “persistentcookie”), it may be sent with the authentication data as furtherevidence of the past use of this system during authentication of aparticular user. In effect, the metadata of a given instance,particularly a persistent cookie, may form a sort of token basedauthenticator itself.

Once the appropriate reliability factors based on the technique and dataof the authentication instance are generated as described above in steps1610 and 1615 respectively, they are used to produce an overallreliability for the authentication instance provided in step 1620. Onemeans of doing this is simply to express each reliability as apercentage and then to multiply them together.

For example, suppose the authentication data is being sent in from anetwork address known to be the user's home computer completely inaccordance with the user's past authentication profile (100%), and thetechnique being used is fingerprint identification (97%), and theinitial finger print data was roistered through the user's employer withthe trust engine 110 (90%), and the match between the authenticationdata and the original fingerprint template in the enrollment data isvery good (99%). The overall reliability of this authentication instancecould then be calculated as the product of these reliabilities:100%*97%*90%*99%−86.4% reliability.

This calculated reliability represents the reliability of one singleinstance of authentication. The overall reliability of a singleauthentication instance may also be calculated using techniques whichtreat the different reliability factors differently, for example byusing formulas where different weights are assigned to each reliabilityfactor. Furthermore, those of skill in the art will recognize that theactual values used may represent values other than percentages and mayuse non-arithmetic systems. One embodiment may include a module used byan authentication requestor to set the weights for each factor and thealgorithms used in establishing the overall reliability of theauthentication instance.

The authentication engine 215 may use the above techniques andvariations thereof to determine the reliability of a singleauthentication instance, indicated as step 1620. However, it may beuseful in many authentication situations for multiple authenticationinstances to be provided at the same time. For example, while attemptingto authenticate himself using the system of the present invention, auser may provide a user identification, fingerprint authentication data,a smart card, and a password. In such a case, three independentauthentication instances are being provided to the trust engine 110 forevaluation. Proceeding to step 1625, if the authentication engine 215determines that the data provided by the user includes more than oneauthentication instance, then each instance in turn will be selected asshown in step 1630 and evaluated as described above in steps 1610, 1615and 1620.

Note that many of the reliability factors discussed may vary from one ofthese instances to another. For instance, the inherent reliability ofthese techniques is likely to be different, as well as the degree ofmatch provided between the authentication data and the enrollment data.Furthermore, the user may have provided enrollment data at differenttimes and under different circumstances for each of these techniques,providing different enrollment reliabilities for each of these instancesas well. Finally, even though the circumstances under which the data foreach of these instances is being submitted is the same, the use of suchtechniques may each fit the profile of the user differently, and so maybe assigned different circumstantial reliabilities. (For example, theuser may normally use their password and fingerprint, but not theirsmart card.)

As a result, the final reliability for each of these authenticationinstances may be different from One another. However, by using multipleinstances together, the overall confidence level for the authenticationwill tend to increase.

Once the authentication engine has performed steps 1610 through 1620 forall of the authentication instances provided in the authentication data,the reliability of each instance is used in step 1635 to evaluate theoverall authentication confidence level. This process of combining theindividual authentication instance reliabilities into the authenticationconfidence level may be modeled by various methods relating theindividual reliabilities produced, and may also address the particularinteraction between some of these authentication techniques. (Forexample, multiple knowledge-based systems such as passwords may produceless confidence than a single password and even a fairly weak biometric,such as a basic voice analysis.)

One means in which the authentication engine 215 may combine thereliabilities of multiple concurrent authentication instances togenerate a final confidence level is to multiply the unreliability ofeach instance to arrive at a total unreliability. The unreliability isgenerally the complementary percentage of the reliability. For example,a technique which is 84% reliable is 16% unreliable. The threeauthentication instances described above (fingerprint, smart card,password) which produce reliabilities of 86%, 75%, and 72% would havecorresponding unreliabilities of (100−86) %, (100−75) % and (100−72) %,or 14%, 25%, and 28%, respectively. By multiplying theseunreliabilities, we get a cumulative unreliability of 14%*25%*28%−0.98%unreliability, which corresponds to a reliability of 99.02%.

In an additional mode of operation, additional factors and heuristics530 may be applied within the authentication engine 215 to account forthe interdependence of various authentication techniques. For example,if someone has unauthorized access to a particular home computer, theyprobably have access to the phone line at that address as well.Therefore, authenticating based on an originating phone number as wellas upon the serial number of the authenticating system does not add muchto the overall confidence in the authentication. However, knowledgebased authentication is largely independent of token basedauthentication (i.e. if someone steals your cellular phone or keys, theyare no more likely to know your PIN or password than if they hadn't).

Furthermore, different vendors or other authentication requestors maywish to weigh different aspects of the authentication differently. Thismay include the use of separate weighing factors or algorithms used incalculating the reliability of individual instances as well as the useof different means to evaluate authentication events with multipleinstances.

For instance, vendors for certain types of transactions, for instancecorporate email systems, may desire to authenticate primarily based uponheuristics and other circumstantial data by default. Therefore, they mayapply high weights to factors related to the metadata and other profilerelated information associated with the circumstances surroundingauthentication events. This arrangement could be used to ease the burdenon users during normal operating hours, by not requiring more from theuser than that he be logged on to the correct machine during businesshours. However, another vendor may weigh authentications coming from aparticular technique most heavily, for instance fingerprint matching,because of a policy decision that such a technique is most suited toauthentication for the particular vendor's purposes.

Such varying weights may be defined by the authentication requestor ingenerating the authentication request and sent to the trust engine 110with the authentication request in one mode of operation. Such optionscould also be set as preferences during an initial enrollment processfor the authentication requestor and stored within the authenticationengine in another mode of operation.

Once the authentication engine 215 produces an authentication confidencelevel for the authentication data provided, this confidence level isused to complete the authentication request in step 1640, and thisinformation is forwarded from the authentication engine 215 to thetransaction engine 205 for inclusion in a message to the authenticationrequestor.

The process described above is merely exemplary, and those of skill inthe art will recognize that the steps need not be performed in the ordershown or that only certain of the steps are desired to be performed, orthat a variety of combinations of steps may be desired. Furthermore,certain steps, such as the evaluation of the reliability of eachauthentication instance provided, may be carried out in parallel withone another if circumstances permit.

In a further aspect of this invention, a method is provided toaccommodate conditions when the authentication confidence level producedby the process described above fails to meet the required trust level ofthe vendor or other party requiring the authentication. In circumstancessuch as these where a gap exists between the level of confidenceprovided and the level of trust desired, the operator of the trustengine 110 is in a position to provide opportunities for one or bothparties to provide alternate data or requirements in order to close thistrust gap. This process will be referred to as “trust arbitrage” herein.

Trust arbitrage may take place within a framework of cryptographicauthentication as described above with reference to FIGS. 10 and 11. Asshown therein, a vendor or other party will request authentication of aparticular user in association with a particular transaction. In onecircumstance, the vendor simply requests an authentication, eitherpositive or negative, and after receiving appropriate data from theuser, the trust engine 110 will provide such a binary authentication. Incircumstances such as these, the degree of confidence required in orderto secure a positive authentication is determined based upon preferencesset within the trust engine 110.

However, it is also possible that the vendor may request a particularlevel of trust in order to complete a particular transaction. Thisrequired level may be included with the authentication request (e.g.authenticate this user to 98% confidence) or may be determined by thetrust engine 110 based on other factors associated with the transaction(i.e. authenticate this user as appropriate for this transaction). Onesuch factor might be the economic value of the transaction. Fortransactions which have greater economic value, a higher degree of trustmay be required. Similarly, for transactions with high degrees of risk ahigh degree of trust may be required. Conversely, for transactions whichare either of low risk or of low value, lower trust levels may berequired by the vendor or other authentication requestor.

The process of trust arbitrage occurs between the steps of the trustengine 110 receiving the authentication data in step 1050 of FIG. 10 andthe return of an authentication result to the vendor in step 1055 ofFIG. 10. Between these steps, the process which leads to the evaluationof trust levels and the potential trust arbitrage occurs as shown inFIG. 17. In circumstances where simple binary authentication isperformed, the process shown in FIG. 17 reduces to having thetransaction engine 205 directly compare the authentication data providedwith the enrollment data for the identified user as discussed above withreference to FIG. 10, flagging any difference as a negativeauthentication.

As shown in FIG. 17, the first step after receiving the data in step1050 is for the transaction engine 205 to determine the trust levelwhich is required for a positive authentication for this particulartransaction in step 1710. This step may be performed by one of severaldifferent methods. The required trust level may be specified to thetrust engine 110 by the authentication requestor at the time when theauthentication request is made. The authentication requestor may alsoset a preference in advance which is stored within the depository 210 orother storage which is accessible by the transaction engine 205. Thispreference may then be read and used each time an authentication requestis made by this authentication requestor. The preference may also beassociated with a particular user as a security measure such that aparticular level of trust is always required in order to authenticatethat user, the user preference being stored in the depository 210 orother storage media accessible by the transaction engine 205. Therequired level may also be derived by the transaction engine 205 orauthentication engine 215 based upon information provided in theauthentication request, such as the value and risk level of thetransaction to be authenticated.

In one mode of operation, a policy management module or other softwarewhich is used when generating the authentication request is used tospecify the required degree of trust for the authentication of thetransaction. This may be used to provide a series of rules to followwhen assigning the required level of trust based upon the policies whichare specified within the policy management module. One advantageous modeof operation is for such a module to be incorporated with the web serverof a vendor in order to appropriately determine required level of trustfor transactions initiated with the vendor's web server. In this way,transaction requests from users may be assigned a required trust levelin accordance with the policies of the vendor and such information maybe forwarded to the trust engine 110 along with the authenticationrequest.

This required trust level correlates with the degree of certainty thatthe vendor wants to have that the individual authenticating is in factwho he identifies himself as. For example, if the transaction is onewhere the vendor wants a fair degree of certainty because goods arechanging hands, the vendor may require a trust level of 85%. Forsituation where the vendor is merely authenticating the user to allowhim to view members only content or exercise privileges on a chat room,the downside risk may be small enough that the vendor requires only a60% trust level. However, to enter into a production contract with avalue of tens of thousands of dollars, the vendor may require a trustlevel of 99% or more.

This required trust level represents a metric to which the user mustauthenticate himself in order to complete the transaction. If therequired trust level is 85% for example, the user must provideauthentication to the trust engine 110 sufficient for the trust engine110 to say with 85% confidence that the user is who they say they are.It is the balance between this required trust level and theauthentication confidence level which produces either a positiveauthentication (to the satisfaction of the vendor) or a possibility oftrust arbitrage.

As shown in FIG. 17, after the transaction engine 205 receives therequired trust level, it compares in step 1720 the required trust levelto the authentication confidence level which the authentication engine215 calculated for the current authentication (as discussed withreference to FIG. 16). If the authentication confidence level is higherthan the required trust level for the transaction in step 1730, then theprocess moves to step 1740 where a positive authentication for thistransaction is produced by the transaction engine 205. A message to thiseffect will then be inserted into the authentication results andreturned to the vendor by the transaction engine 205 as shown in step1055 (see FIG. 10).

However, if the authentication confidence level does not fulfill therequired trust level in step 1730, then a confidence gap exists for thecurrent authentication, and trust arbitrage is conducted in step 1750.Trust arbitrage is described more completely with reference to FIG. 18below. This process as described below takes place within thetransaction engine 205 of the trust engine 110. Because noauthentication or other cryptographic operations are needed to executetrust arbitrage (other than those required for the SSL communicationbetween the transaction engine 205 and other components), the processmay be performed outside the authentication engine 215. However, as willbe discussed below, any reevaluation of authentication data or othercryptographic or authentication events will require the transactionengine 205 to resubmit the appropriate data to the authentication engine215. Those of skill in the art will recognize that the trust arbitrageprocess could alternately be structured to take place partially orentirely within the authentication engine 215 itself.

As mentioned above, trust arbitrage is a process where the trust engine110 mediates a negotiation between the vendor and user in an attempt tosecure a positive authentication where appropriate. As shown in step1805, the transaction engine 205 first determines whether or not thecurrent situation is appropriate for trust arbitrage. This may bedetermined based upon the circumstances of the authentication, e.g.whether this authentication has already been through multiple cycles ofarbitrage, as well as upon the preferences of either the vendor or user,as will be discussed further below.

In such circumstances where arbitrage is not possible, the processproceeds to step 1810 where the transaction engine 205 generates anegative authentication and then inserts it into the authenticationresults which are sent to the vendor in step 1055 (see FIG. 10). Onelimit which may be advantageously used to prevent authentications frompending indefinitely is to set a time-out period from the initialauthentication request. In this way, any transaction which is notpositively authenticated within the time limit is denied furtherarbitrage and negatively authenticated. Those of skill in the art willrecognize that such a time limit may vary depending upon thecircumstances of the transaction and the desires of the user and vendor.Limitations may also be placed upon the number of attempts that may bemade at providing a successful authentication. Such limitations may behandled by an attempt limiter 535 as shown in FIG. 5.

If arbitrage is not prohibited in step 1805, the transaction engine 205will then engage in negotiation with one or both of the transactingparties. The transaction engine 205 may send a message to the userrequesting some form of additional authentication in order to boost theauthentication confidence level produced as shown in step 1820. In thesimplest form, this may simply indicates that authentication wasinsufficient. A request to produce one or more additional authenticationinstances to improve the overall confidence level of the authenticationmay also be sent.

If the user provides some additional authentication instances in step1825, then the transaction engine 205 adds these authenticationinstances to the authentication data for the transaction and forwards itto the authentication engine 215 as shown in step 1015 (see FIG. 10),and the authentication is reevaluated based upon both the pre-existingauthentication instances for this transaction and the newly providedauthentication instances.

An additional type of authentication may be a request from the trustengine 110 to make some form of person-to-person contact between thetrust engine 110 operator (or a trusted associate) and the user, forexample, by phone call. This phone call or other non-computerauthentication can be used to provide personal contact with theindividual and also to conduct some form of questionnaire basedauthentication. This also may give the opportunity to verify anoriginating telephone number and potentially a voice analysis of theuser when he calls in. Even if no additional authentication data can beprovided, the additional context associated with the user's phone numbermay improve the reliability of the authentication context. Any reviseddata or circumstances based upon this phone call are fed into the trustengine 110 for use in consideration of the authentication request.

Additionally, in step 1820 the trust engine 110 may provide anopportunity for the user to purchase insurance, effectively buying amore confident authentication. The operator of the trust engine 110 may,at times, only want to make such an option available if the confidencelevel of the authentication is above a certain threshold to begin with.In effect, this user side insurance is a way for the trust engine 110 tovouch for the user when the authentication meets the normal requiredtrust level of the trust engine 110 for authentication, but does notmeet the required trust level of the vendor for this transaction. Inthis way, the user may still successfully authenticate to a very highlevel as may be required by the vendor, even though he only hasauthentication instances which produce confidence sufficient for thetrust engine 110.

This function of the trust engine 110 allows the trust engine 110 tovouch for someone who is authenticated to the satisfaction of the trustengine 110, but not of the vendor. This is analogous to the functionperformed by a notary in adding his signature to a document in order toindicate to someone reading the document at a later time that the personwhose signature appears on the document is in fact the person who signedit. The signature of the notary testifies to the act of signing by theuser. In the same way, the trust engine is providing an indication thatthe person transacting is who they say they are.

However, because the trust engine 110 is artificially boosting the levelof confidence provided by the user, there is a greater risk to the trustengine 110 operator, since the user is not actually meeting the requiredtrust level of the vendor. The cost of the insurance is designed tooffset the risk of a false positive authentication to the trust engine110 (who may be effectively notarizing the authentications of the user).The user pays the trust engine 110 operator to take the risk ofauthenticating to a higher level of confidence than has actually beenprovided.

Because such an insurance system allows someone to effectively buy ahigher confidence rating from the trust engine 110, both vendors andusers may wish to prevent the use of user side insurance in certaintransactions. Vendors may wish to limit positive authentications tocircumstances where they know that actual authentication data supportsthe degree of confidence which they require and so may indicate to thetrust engine 110 that user side insurance is not to be allowed.Similarly, to protect his online identity, a user may wish to preventthe use of user side insurance on his account, or may wish to limit itsuse to situations where the authentication confidence level without theinsurance is higher than a certain limit. This may be used as a securitymeasure to prevent someone from overhearing a password or stealing asmart card and using them to falsely authenticate to a low level ofconfidence, and then purchasing insurance to produce a very high levelof (false) confidence. These factors may be evaluated in determiningwhether user side insurance is allowed.

If user purchases insurance in step 1840, then the authenticationconfidence level is adjusted based upon the insurance purchased in step1845, and the authentication confidence level and required trust levelare again compared in step 1730 (see FIG. 17). The process continuesfrom there, and may lead to either a positive authentication in step1740 (see FIG. 17), or back into the trust arbitrage process in step1750 for either further arbitrage (if allowed) or a negativeauthentication in step 1810 if further arbitrage is prohibited.

In addition to sending a message to the user in step 1820, thetransaction engine 205 may also send a message to the vendor in step1830 which indicates that a pending authentication is currently belowthe required trust level. The message may also offer various options onhow to proceed to the vendor. One of these Options is to simply informthe vendor of what the current authentication confidence level is andask if the vendor wishes to maintain their current unfulfilled requiredtrust level. This may be beneficial because in some cases, the vendormay have independent means for authenticating the transaction or mayhave been using a default set of requirements which generally result ina higher required level being initially specified than is actuallyneeded for the particular transaction at hand.

For instance, it may be standard practice that all incoming purchaseorder transactions with the vendor are expected to meet a 98% trustlevel. However, if an order was recently discussed by phone between thevendor and a long-standing customer, and immediately thereafter thetransaction is authenticated, but only to a 93% confidence level, thevendor may wish to simply lower the acceptance threshold for thistransaction, because the phone call effectively provides additionalauthentication to the vendor. In certain circumstances, the vendor maybe willing to lower their required trust level, but not all the way tothe level of the current authentication confidence. For instance, thevendor in the above example might consider that the phone call prior tothe order might merit a 4% reduction in the degree of trust needed;however, this is still greater than the 93% confidence produced by theuser.

If the vendor does adjust their required trust level in step 1835, thenthe authentication confidence level produced by the authentication andthe required trust level are compared in step 1730 (see FIG. 17). If theconfidence level now exceeds the required trust level, a positiveauthentication may be generated in the transaction engine 205 in step1740 (see FIG. 17). If not, further arbitrage may be attempted asdiscussed above if it is permitted.

In addition to requesting an adjustment to the required trust level, thetransaction engine 205 may also offer vendor side insurance to thevendor requesting the authentication. This insurance serves a similarpurpose to that described above for the user side insurance. Here,however, rather than the cost corresponding to the risk being taken bythe trust engine 110 in authenticating above the actual authenticationconfidence level produced, the cost of the insurance corresponds to therisk being taken by the vendor in accepting a lower trust level in theauthentication.

Instead of just lowering their actual required trust level, the vendorhas the option of purchasing insurance to protect itself from theadditional risk associated with a lower level of trust in theauthentication of the user. As described above, it may be advantageousfor the vendor to only consider purchasing such insurance to cover thetrust gap in conditions where the existing authentication is alreadyabove a certain threshold.

The availability of such vendor side insurance allows the vendor theoption to either: lower his trust requirement directly at no additionalcost to himself, bearing the risk of a false authentication himself(based on the lower trust level required); or, buying insurance for thetrust gap between the authentication confidence level and hisrequirement, with the trust engine 110 operator bearing the risk of thelower confidence level which has been provided. By purchasing theinsurance, the vendor effectively keeps his high trust levelrequirement; because the risk of a false authentication is shifted tothe trust engine 110 operator.

If the vendor purchases insurance in step 1840, the authenticationconfidence level and required trust levels are compared in step 1730(see FIG. 17), and the process continues as described above.

Note that it is also possible that both the user and the vendor respondto messages from the trust engine 110. Those of skill in the art willrecognize that there are multiple ways in which such situations can behandled. One advantageous mode of handling the possibility of multipleresponses is simply to treat the responses in a first-come, first-servedmanner. For example, if the vendor responds with a lowered requiredtrust level and immediately thereafter the user also purchases insuranceto raise his authentication level, the authentication is firstreevaluated based upon the lowered trust requirement from the vendor. Ifthe authentication is now positive, the user's insurance purchase isignored. In another advantageous mode of operation, the user might onlybe charged for the level of insurance required to meet the new, loweredtrust requirement of the vendor (if a trust gap remained even with thelowered vendor trust requirement).

If no response from either party is received during the trust arbitrageprocess at step 1850 within the time limit set for the authentication,the arbitrage is reevaluated in step 1805. This effectively begins thearbitrage process again. If the time limit was final or othercircumstances prevent further arbitrage in step 1805, a negativeauthentication is generated by the transaction engine 205 in step 1810and returned to the vendor in step 1055 (see FIG. 10). If not, newmessages may be sent to the user and vendor, and the process may berepeated as desired.

Note that for certain types of transactions, for instance, digitallysigning documents which are not part of a transaction, there may notnecessarily be a vendor or other third party; therefore the transactionis primarily between the user and the trust engine 110. In circumstancessuch as these, the trust engine 110 will have its own required trustlevel which must be satisfied in order to generate a positiveauthentication. However, in such circumstances, it will often not bedesirable for the trust engine 110 to offer insurance to the user inorder for him to raise the confidence of his own signature.

The process described above and shown in FIGS. 16-18 may be carried outusing various communications modes as described above with reference tothe trust engine 110. For instance, the messages may be web-based andsent using SSL connections between the trust engine 110 and appletsdownloaded in real time to browsers running on the user or vendorsystems. In an alternate mode of operation, certain dedicatedapplications may be in use by the user and vendor which facilitate sucharbitrage and insurance transactions. In another alternate mode ofoperation, secure email operations may be used to mediate the arbitragedescribed above, thereby allowing deferred evaluations and batchprocessing of authentications. Those of skill in the art will recognizethat different communications modes may be used as are appropriate forthe circumstances and authentication requirements of the vendor.

The following description with reference to FIG. 19 describes a sampletransaction which integrates the various aspects of the presentinvention as described above. This example illustrates the overallprocess between a user and a vendor as mediates by the trust engine 110.Although the various steps and components as described in detail abovemay be used to carry out the following transaction, the processillustrated focuses on the interaction between the trust engine 110,user and vendor.

The transaction begins when the user, while viewing web pages online,fills out an order form on the web site of the vendor in step 1900. Theuser wishes to submit this order form to the vendor, signed with hisdigital signature. In order to do this, the user submits the order formwith his request for a signature to the trust engine 110 in step 1905.The user will also provide authentication data which will be used asdescribed above to authenticate his identity.

In step 1910 the authentication data is compared to the enrollment databy the trust engine 110 as discussed above, and if a positiveauthentication is produced, the hash of the order form, signed with theprivate key of the user, is forwarded to the vendor along with the orderform itself.

The vendor receives the signed form in step 1915, and then the vendorwill generate an invoice or other contract related to the purchase to bemade in step 1920. This contract is sent back to the user with a requestfor a signature in step 1925. The vendor also sends an authenticationrequest for this contract transaction to the trust engine 110 in step1930 including a hash of the contract which will be signed by bothparties. To allow the contract to be digitally signed by both parties,the vendor also includes authentication data for itself so that thevendor's signature upon the contract can later be verified if necessary.

As discussed above, the trust engine 110 then verifies theauthentication data provided by the vendor to confirm the vendor'sidentity, and if the data produces a positive authentication in step1935, continues with step 1955 when the data is received from the user.If the vendor's authentication data does not match the enrollment dataof the vendor to the desired degree, a message is returned to the vendorrequesting further authentication. Trust arbitrage may be performed hereif necessary, as described above, in order for the vendor tosuccessfully authenticate itself to the trust engine 110.

When the user receives the contract in step 1940, he reviews it,generates authentication data to sign it if it is acceptable in step1945, and then sends a hash of the contract and his authentication datato the trust engine 110 in step 1950. The trust engine 110 verifies theauthentication data in step 1955 and if the authentication is good,proceeds to process the contract as described below. As discussed abovewith reference to FIGS. 17 and 18, trust arbitrage may be performed asappropriate to close any trust gap which exists between theauthentication confidence level and the required authentication levelfor the transaction.

The trust engine 110 signs the hash of the contract with the user'sprivate key, and sends this signed hash to the vendor in step 1960,signing the complete message on its own behalf, i.e., including a hashof the complete message (including the user's signature) encrypted withthe private key 510 of the trust engine 110. This message is received bythe vendor in step 1965. The message represents a signed contract (hashof contract encrypted using user's private key) and a receipt from thetrust engine 110 (the hash of the message including the signed contract,encrypted using the trust engine 110's private key).

The trust engine 110 similarly prepares a hash of the contract with thevendor's private key in step 1970, and forwards this to the user, signedby the trust engine 110. In this way, the user also receives a copy ofthe contract, signed by the vendor, as well as a receipt, signed by thetrust engine 110, for delivery of the signed contract in step 1975.

In addition to the foregoing, an additional aspect of the inventionprovides a cryptographic Service Provider Module (SPM) which may beavailable to a client side application as a means to access functionsprovided by the trust engine 110 described above. One advantageous wayto provide such a service is for the cryptographic SPM is to mediatecommunications between a third party Application Programming Interface(API) and a trust engine 110 which is accessible via a network or otherremote connection. A sample cryptographic SPM is described below withreference to FIG. 20.

For example, on a typical system, a number of API's are available toprogrammers. Each API provides a set of function calls which may be madeby an application 2000 running upon the system. Examples of API's whichprovide programming interfaces suitable for cryptographic functions,authentication functions, and other security function include theCryptographic API (CAPI) 2010 provided by Microsoft with its Windowsoperating systems, and the Common Data Security Architecture (CDSA),sponsored by IBM, Intel and other members of the Open Group. CAPI willbe used as an exemplary security API in the discussion that follows.However, the cryptographic SPM described could be used with CDSA orother security API's as are known in the art.

This API is used by a user system 105 or vendor system 120 when a callis made for a cryptographic function. Included among these functions maybe requests associated with performing various cryptographic operations,such as encrypting a document with a particular key, signing a document,requesting a digital certificate, verifying a signature upon a signeddocument, and such other cryptographic functions as are described hereinor known to those of skill in the art.

Such cryptographic functions are normally performed locally to thesystem upon which CAPI 2010 is located. This is because generally thefunctions called require the use of either resources of the local usersystem 105, such as a fingerprint reader, or software functions whichare programmed using libraries which are executed on the local machine.Access to these local resources is normally provided by one or moreService Provider Modules (SPM's) 2015, 2020 as referred to above whichprovide resources with which the cryptographic functions are carriedout. Such SPM's may include software libraries 2015 to performencrypting or decrypting operations, or drivers and applications 2020which are capable of accessing specialized hardware 2025, such asbiometric scanning devices. In much the way that CAPI 2010 providesfunctions which may be used by an application 2000 of the system 105,the SPM's 2015, 2020 provide CAPI with access to the lower levelfunctions and resources associated with the available services upon thesystem.

In accordance with the invention, it is possible to provide acryptographic SPM 2030 which is capable of accessing the cryptographicfunctions provided by the trust engine 110 and making these functionsavailable to an application 2000 through CAPI 2010. Unlike embodimentswhere CAPI 2010 is only able to access resources which are locallyavailable through SPM's 2015, 2020, a cryptographic SPM 2030 asdescribed herein would be able to submit requests for cryptographicoperations to a remotely-located, network-accessible trust engine 110 inorder to perform the operations desired.

For instance, if an application 2000 has a need for a cryptographicoperation, such as signing a document, the application 2000 makes afunction call to the appropriate CAPI 2010 function. CAPI 2010 in turnwill execute this function, making use of the resources which are madeavailable to it by the SPM's 2015, 2020 and the cryptographic SPM 2030.In the case of a digital signature function, the cryptographic SPM 2030will generate an appropriate request which will be sent to the trustengine 110 across the communication link 125.

The operations which occur between the cryptographic SPM 2030 and thetrust engine 110 are the same operations that would be possible betweenany other system and the trust engine 110. However, these functions areeffectively made available to a user system 105 through CAPI 2010 suchthat they appear to be locally available upon the user system 105itself. However, unlike ordinary SPM's 2015, 2020, the functions arebeing carried out on the remote trust engine 110 and the results relayedto the cryptographic SPM 2030 in response to appropriate requests acrossthe communication link 125.

This cryptographic SPM 2030 makes a number of operations available tothe user system 105 or a vendor system 120 which might not otherwise beavailable. These functions include without limitation: encryption anddecryption of documents; issuance of digital certificates; digitalsigning of documents; verification of digital signatures; and such otheroperations as will be apparent to those of skill in the art.

In a separate embodiment, the present invention comprises a completesystem for performing the data securing methods of the present inventionon any data set. The computer system of this embodiment comprises a datasplitting module that comprises the functionality shown in FIG. 8 anddescribed herein. In one embodiment of the present invention, the datasplitting module, sometimes referred to herein as a secure data parser,comprises a parser program or software suite which comprises datasplitting, encryption and decryption, reconstitution or reassemblyfunctionality. This embodiment may further comprise a data storagefacility or multiple data storage facilities, as well. The datasplitting module, or secure data parser, comprises a cross-platformsoftware module suite which integrates within an electronicinfrastructure, or as an add-on to any application which requires theultimate security of its data elements. This parsing process operates onany type of data set, and on any and all file types, or in a database onany row, column or cell of data in that database.

The parsing process of the present invention may, in one embodiment, bedesigned in a modular tiered fashion, and any encryption process issuitable for use in the process of the present invention. The modulartiers of the parsing and splitting process of the present invention mayinclude, but are not limited to, 1) cryptographic split, dispersed andsecurely stored in multiple locations; 2) encrypt, cryptographicallysplit, dispersed and securely stored in multiple locations; 3) encrypt,cryptographically split, encrypt each share, then dispersed and securelystored in multiple locations; and 4) encrypt, cryptographically split,encrypt each share with a different type of encryption than was used inthe first step, then dispersed and securely stored in multiplelocations.

The process comprises, in one embodiment, splitting of the dataaccording to the contents of a generated random number, or key andperforming the same cryptographic splitting of the key used in theencryption of splitting of the data to be secured into two or moreportions, or shares, of parsed and split data, and in one embodiment,preferably into four or more portions of parsed and split data,encrypting all of the portions, then scattering and storing theseportions back into the database, or relocating them to any named device,fixed or removable, depending on the requestor's need for privacy andsecurity. Alternatively, in another embodiment, encryption may occurprior to the splitting of the data set by the splitting module or securedata parser. The original data processed as described in this embodimentis encrypted and obfuscated and is secured. The dispersion of theencrypted elements, if desired, can be virtually anywhere, including,but not limited to, a single server or data storage device, or amongseparate data storage facilities or devices. Encryption key managementin one embodiment may be included within the software suite, or inanother embodiment may be integrated into an existing infrastructure orany other desired location.

A cryptographic split (cryptosplit) partitions the data into N number ofshares. The partitioning can be on any size unit of data, including anindividual bit, bits, bytes, kilobytes, megabytes, or larger units, aswell as any pattern or combination of data unit sizes whetherpredetermined or randomly generated. The units can also be of differentsized, based on either a random or predetermined set of values. Thismeans the data can be viewed as a sequence of these units. In thismanner the size of the data units themselves may render the data moresecure, for example by using one or more predetermined or randomlygenerated pattern, sequence or combination of data unit sizes. The unitsare then distributed (either randomly or by a predetermined set ofvalues) into the N shares. This distribution could also involve ashuffling of the order of the units in the shares. It is readilyapparent to those of ordinary skill in the art that the distribution ofthe data units into the shares may be performed according to a widevariety of possible selections, including but not limited to size-fixed,predetermined sizes, or one or more combination, pattern or sequence ofdata unit sizes that are predetermined or randomly generated.

One example of this cryptographic split process, or cryptosplit, wouldbe to consider the data to be 23 bytes in size, with the data unit sizechosen to be one byte, and with the number of shares selected to be 4.Each byte would be distributed into one of the 4 shares. Assuming arandom distribution, a key would be obtained to create a sequence of 23random numbers (r1, r2, r3 through r23), each with a value between 1 and4 corresponding to the four shares. Each of the units of data (in thisexample 23 individual bytes of data) is associated with one of the 23random numbers corresponding to one of the four shares. The distributionof the bytes of data into the four shares would occur by placing thefirst byte of the data into share number r1, byte two into share r2,byte three into share r3, through the 23^(rd) byte of data into sharer23. It is readily apparent to those of ordinary skill in the art that awide variety of other possible steps or combination or sequence ofsteps, including the size of the data units, may be used in thecryptosplit process of the present invention, and the above example is anon-limiting description of one process for cryptosplitting data. Torecreate the original data, the reverse operation would be performed.

In another embodiment of the cryptosplit process of the presentinvention, an option for the cryptosplitting process is to providesufficient redundancy in the shares such that only a subset of theshares are needed to reassemble or restore the data to its original oruseable form. As a non-limiting example, the cryptosplit may be done asa “3 of 4” cryptosplit such that only three of the four shares arenecessary to reassemble or restore the data to its original or useableform. This is also referred to as a “M of N cryptosplit” wherein N isthe total number of shares, and M is at least one less than N. It isreadily apparent to those of ordinary skill in the art that there aremany possibilities for creating this redundancy in the cryptosplittingprocess of the present invention.

In one embodiment of the cryptosplitting process of the presentinvention, each unit of data is stored in two shares, the primary shareand the backup share. Using the “3 of 4” cryptosplitting processdescribed above, any one share can be missing, and this is sufficient toreassemble or restore the original data with no missing data units sinceonly three of the total four shares are required. As described herein, arandom number is generated that corresponds to one of the shares. Therandom number is associated with a data unit, and stored in thecorresponding share, based on a key. One key is used, in thisembodiment, to generate the primary and backup share random number. Asdescribed herein for the cryptosplitting process of the presentinvention, a set of random numbers (also referred to as primary sharenumbers) from 0 to 3 are generated equal to the number of data units.Then another set of random numbers is generated (also referred to asbackup share numbers) from 1 to 3 equal to the number of data units.Each unit of data is then associated with a primary share number and abackup share number. Alternatively, a set of random numbers may begenerated that is fewer than the number of data units, and repeating therandom number set, but this may reduce the security of the sensitivedata. The primary share number is used to determine into which share thedata unit is stored. The backup share number is combined with theprimary share number to create a third share number between 0 and 3, andthis number is used to determine into which share the data unit isstored. In this example, the equation to determine the third sharenumber is:(primary share number+backup share number) MOD 4=third share number.

In the embodiment described above where the primary share number isbetween 0 and 3, and the backup share number is between 1 and 3 ensuresthat the third share number is different from the primary share number.This results in the data unit being stored in two different shares. Itis readily apparent to those of ordinary skill in the art that there aremany ways of performing redundant cryptosplitting and non-redundantcryptosplitting in addition to the embodiments disclosed herein. Forexample, the data units in each share could be shuffled utilizing adifferent algorithm. This data unit shuffling may be performed as theoriginal data is split into the data units, or after the data units areplaced into the shares, or after the share is full, for example.

The various cryptosplitting processes and data shuffling processesdescribed herein, and all other embodiments of the cryptosplitting anddata shuffling methods of the present invention may be performed on dataunits of any size, including but not limited to, as small as anindividual bit, bits, bytes, kilobytes, megabytes or larger.

An example of one embodiment of source code that would perform thecryptosplitting process described herein is:

DATA [1:24] - array of bytes with the data to be split SHARES[0:3;1:24] - 2-dimensionalarray with each row representing one of the sharesRANDOM[1:24] - array random numbers in the range of 0..3 S1 = 1; S2 = 1;S3 = 1; S4 = 1; For J = 1 to 24 do Begin IF RANDOM[J[ ==0 then BeginSHARES[1,S1] = DATA [J]; S1 = S1 + 1; End ELSE IF RANDOM[J[ ==1 thenBegin SHARES[2,S2] = DATA [J]; S2 = S2 + 1; END ELSE IF RANDOM[J[ ==2then Begin Shares[3,S3] = data [J]; S3 = S3 + 1; End Else beginShares[4,S4] = data [J]; S4 = S4 + 1; End; END;

An example of one embodiment of source code that would perform thecryptosplitting RAID process described herein is:

Generate two sets of numbers, PrimaryShare is 0 to 3, BackupShare is 1to 3. Then put each data unit into share[primaryshare[1]] andshare[(primaryshare[1]+backupshare[1]) mod 4, with the same process asin cryptosplitting described above. This method will be scalable to anysize N, where only N−1 shares are necessary to restore the data.

The retrieval, recombining, reassembly or reconstituting of theencrypted data elements may utilize any number of authenticationtechniques, including, but not limited to, biometrics, such asfingerprint recognition, facial scan, hand scan, iris scan, retinalscan, ear scan, vascular pattern recognition or DNA analysis. The datasplitting and/or parser modules of the present invention may beintegrated into a wide variety of infrastructure products orapplications as desired.

Traditional encryption technologies known in the art rely on one or morekey used to encrypt the data and render it unusable without the key. Thedata, however, remains whole and intact and subject to attack. Thesecure data parser of the present invention, in one embodiment,addresses this problem by performing a cryptographic parsing andsplitting of the encrypted file into two or more portions or shares, andin another embodiment, preferably four or more shares, adding anotherlayer of encryption to each share of the data, then storing the sharesin different physical and/or logical locations. When one or more datashares are physically removed from the system, either by using aremovable device, such as a data storage device, or by placing the shareunder another party's control, any possibility of compromise of secureddata is effectively removed.

An example of one embodiment of the secure data parser of the presentinvention and an example of how it may be utilized is shown in FIG. 21and described below. However, it is readily apparent to those ofordinary skill in the art that the secure data parser of the presentinvention may be utilized in a wide variety of ways in addition to thenon-limiting example below. As a deployment option, and in oneembodiment, the secure data parser may be implemented with externalsession key management or secure internal storage of session keys. Uponimplementation, a Parser Master Key will be generated which will be usedfor securing the application and for encryption purposes. It should bealso noted that the incorporation of the Parser Master key in theresulting secured data allows for a flexibility of sharing of secureddata by individuals within a workgroup, enterprise or extended audience.

As shown in FIG. 21, this embodiment of the present invention shows thesteps of the process performed by the secure data parser on data tostore the session master key with the parsed data:

1. Generating a session master key and encrypt the data using RS1 streamcipher.

2. Separating the resulting encrypted data into four shares or portionsof parsed data according to the pattern of the session master key.

3. In this embodiment of the method, the session master key will bestored along with the secured data shares in a data depository.Separating the session master key according to the pattern of the ParserMaster Key and append the key data to the encrypted parsed data.

4. The resulting four shares of data will contain encrypted portions ofthe original data and portions of the session master key. Generate astream cipher key for each of the four data shares.

5. Encrypting each share, then store the encryption keys in differentlocations from the encrypted data portions or shares: Share 1 gets Key4, Share 2 gets Key 1, Share 3 gets Key 2, Share 4 gets Key 3.

To restore the original data format, the steps are reversed.

It is readily apparent to those of ordinary skill in the art thatcertain steps of the methods described herein may be performed indifferent order, or repeated multiple times, as desired. It is alsoreadily apparent to those skilled in the art that the portions of thedata may be handled differently from one another. For example, multipleparsing steps may be performed on only one portion of the parsed data.Each portion of parsed data may be uniquely secured in any desirable wayprovided only that the data may be reassembled, reconstituted, reformed,decrypted or restored to its original or other usable form.

As shown in FIG. 22 and described herein, another embodiment of thepresent invention comprises the steps of the process performed by thesecure data parser on data to store the session master key data in oneor more separate key management table:

1. Generating a session master key and encrypt the data using RS1 streamcipher.

2. Separating the resulting encrypted data into four shares or portionsof parsed data according to the pattern of the session master key.

3. In this embodiment of the method of the present invention, thesession master key will be stored in a separate key management table ina data depository. Generating a unique transaction ID for thistransaction. Storing the transaction ID and session master key in aseparate key management table. Separating the transaction ID accordingto the pattern of the Parser Master Key and append the data to theencrypted parsed or separated data.

4. The resulting four shares of data will contain encrypted portions ofthe original data and portions of the transaction ID.

5. Generating a stream cipher key for each of the four data shares.

6. Encrypting each share, then store the encryption keys in differentlocations from the encrypted data portions or shares: Share 1 gets Key4, Share 2 gets Key 1, Share 3 gets Key 2, Share 4 gets Key 3.

To restore the original data format, the steps are reversed.

It is readily apparent to those of ordinary skill in the art thatcertain steps of the method described herein may be performed indifferent order, or repeated multiple times, as desired. It is alsoreadily apparent to those skilled in the art that the portions of thedata may be handled differently from one another. For example, multipleseparating or parsing steps may be performed on only one portion of theparsed data. Each portion of parsed data may be uniquely secured in anydesirable way provided only that the data may be reassembled,reconstituted, reformed, decrypted or restored to its original or otherusable form.

As shown in FIG. 23, this embodiment of the present invention shows thesteps of the process performed by the secure data parser on data tostore the session master key with the parsed data:

1. Accessing the parser master key associated with the authenticateduser

2. Generating a unique Session Master key

3. Derive an Intermediary Key from an exclusive OR function of theParser Master Key and Session Master key

4. Optional encryption of the data using an existing or new encryptionalgorithm keyed with the Intermediary Key.

5. Separating the resulting optionally encrypted data into four sharesor portions of parsed data according to the pattern of the Intermediarykey.

6. In this embodiment of the method, the session master key will bestored along with the secured data shares in a data depository.Separating the session master key according to the pattern of the ParserMaster Key and append the key data to the optionally encrypted parseddata shares.

7. The resulting multiple shares of data will contain optionallyencrypted portions of the original data and portions of the sessionmaster key.

8. Optionally generate an encryption key for each of the four datashares.

9. Optionally encrypting each share with an existing or new encryptionalgorithm, then store the encryption keys in different locations fromthe encrypted data portions or shares: for example, Share 1 gets Key 4,Share 2 gets Key 1, Share 3 gets Key 2, Share 4 gets Key 3.

To restore the original data format, the steps are reversed.

It is readily apparent to those of ordinary skill in the art thatcertain steps of the methods described herein may be performed indifferent order, or repeated multiple times, as desired. It is alsoreadily apparent to those skilled in the art that the portions of thedata may be handled differently from one another. For example, multipleparsing steps may be performed on only one portion of the parsed data.Each portion of parsed data may be uniquely secured in any desirable wayprovided only that the data may be reassembled, reconstituted, reformed,decrypted or restored to its original or other usable form.

As shown in FIG. 24 and described herein, another embodiment of thepresent invention comprises the steps of the process performed by thesecure data parser on data to store the session master key data in oneor more separate key management table:

1. Accessing the Parser Master Key associated with the authenticateduser

2. Generating a unique Session Master Key

3. Derive an Intermediary Key from an exclusive OR function of theParser Master Key and Session Master key

4. Optionally encrypt the data using an existing or new encryptionalgorithm keyed with the Intermediary Key.

5. Separating the resulting optionally encrypted data into four sharesor portions of parsed data according to the pattern of the IntermediaryKey.

6. In this embodiment of the method of the present invention, thesession master key will be stored in a separate key management table ina data depository. Generating a unique transaction ID for thistransaction. Storing the transaction ID and session master key in aseparate key management table or passing the Session Master Key andtransaction ID back to the calling program for external management.Separating the transaction ID according to the pattern of the ParserMaster Key and append the data to the optionally encrypted parsed orseparated data.

7. The resulting four shares of data will contain optionally encryptedportions of the original data and portions of the transaction ID.

8. Optionally generate an encryption key for each of the four datashares.

9. Optionally encrypting each share, then store the encryption keys indifferent locations from the encrypted data portions or shares. Forexample: Share 1 gets Key 4, Share 2 gets Key 1, Share 3 gets Key 2,Share 4 gets Key 3.

To restore the original data format, the steps are reversed.

It is readily apparent to those of ordinary skill in the art thatcertain steps of the method described herein may be performed indifferent order, or repeated multiple times, as desired. It is alsoreadily apparent to those skilled in the art that the portions of thedata may be handled differently from one another. For example, multipleseparating or parsing steps may be performed on only one portion of theparsed data. Each portion of parsed data may be uniquely secured in anydesirable way provided only that the data may be reassembled,reconstituted, reformed, decrypted or restored to its original or otherusable form.

A wide variety of encryption methodologies are suitable for use in themethods of the present invention, as is readily apparent to thoseskilled in the art. The One Time Pad algorithm, is often considered oneof the most secure encryption methods, and is suitable for use in themethod of the present invention. Using the One Time Pad algorithmrequires that a key be generated which is as long as the data to besecured. The use of this method may be less desirable in certaincircumstances such as those resulting in the generation and managementof very long keys because of the size of the data set to be secured. Inthe One-Time Pad (OTP) algorithm, the simple exclusive-or function, XOR,is used. For two binary streams x and y of the same length, x XOR ymeans the bitwise exclusive-or of x and y.

At the bit level is generated:0 XOR 0=00 XOR 1=11 XOR 0=11 XOR 1=0

An example of this process is described herein for an n-byte secret, s,(or data set) to be split. The process will generate an n-byte randomvalue, a, and then set:b=a XOR s.

Note that one can derive “s” via the equation:s=a XOR b.

The values a and b are referred to as shares or portions and are placedin separate depositories. Once the secret s is split into two or moreshares, it is discarded in a secure manner.

The secure data parser of the present invention may utilize thisfunction, performing multiple XOR functions incorporating multipledistinct secret key values: K1, K2, K3, Kn, K5. At the beginning of theoperation, the data to be secured is passed through the first encryptionoperation, secure data=data XOR secret key 5:S=D XOR K5

In order to securely store the resulting encrypted data in, for example,four shares, S1, S2, S3, Sn, the data is parsed and split into “n”segments, or shares, according to the value of K5. This operationresults in “n” pseudorandom shares of the original encrypted data.Subsequent XOR functions may then be performed on each share with theremaining secret key values, for example: Secure data segment1=encrypted data share 1 XOR secret key 1:SD1=S1 XOR K1SD2=S2 XOR K2SD3=S3 XOR K3SDn=Sn XOR Kn.

In one embodiment, it may not be desired to have any one depositorycontain enough information to decrypt the information held there, so thekey required to decrypt the share is stored in a different datadepository:

Depository 1: SD1, Kn

Depository 2: SD2, K1

Depository 3: SD3, K2

Depository n: SDn, K3.

Additionally, appended to each share may be the information required toretrieve the original session encryption key, K5. Therefore, in the keymanagement example described herein, the original session master key isreferenced by a transaction ID split into “n” shares according to thecontents of the installation dependant Parser Master Key (TID1, TID2,TID3, TIDn):

Depository 1: SD1, Kn, TID1

Depository 2: SD2, K1, TID2

Depository 3: SD3, K2, TID3

Depository n: SDn, K3, TIDn.

In the incorporated session key example described herein, the sessionmaster key is split into “n” shares according to the contents of theinstallation dependant Parser Master Key (SK1, SK2, SK3, SKn):

Depository 1: SD1, Kn, SK1

Depository 2: SD2, K1, SK2

Depository 3: SD3, K2, SK3

Depository n: SDn, K3, SKn.

Unless all four shares are retrieved, the data cannot be reassembledaccording to this example. Even if all four shares are captured, thereis no possibility of reassembling or restoring the original informationwithout access to the session master key and the Parser Master Key.

This example has described an embodiment of the method of the presentinvention, and also describes, in another embodiment, the algorithm usedto place shares into depositories so that shares from all depositoriescan be combined to form the secret authentication material. Thecomputations needed are very simple and fast. However, with the One TimePad (OTP) algorithm there may be circumstances that cause it to be lessdesirable, such as a large data set to be secured, because the key sizeis the same size as the data to be stored. Therefore, there would be aneed to store and transmit about twice the amount of the original datawhich may be less desirable under certain circumstances.

Stream Cipher RS1

The stream cipher RS1 splitting technique is very similar to the OTPsplitting technique described herein. Instead of an n-byte random value,an n′=min(n, 16)-byte random value is generated and used to key the RS1Stream Cipher algorithm. The advantage of the RS1 Stream Cipheralgorithm is that a pseudorandom key is generated from a much smallerseed number. The speed of execution of the RS1 Stream Cipher encryptionis also rated at approximately 10 times the speed of the well known inthe art Triple DES encryption without compromising security. The RS1Stream Cipher algorithm is well known in the art, and may be used togenerate the keys used in the XOR function. The RS1 Stream Cipheralgorithm is interoperable with other commercially available streamcipher algorithms, such as the RC4™ stream cipher algorithm of RSASecurity, Inc and is suitable for use in the methods of the presentinvention.

Using the key notation above, K1 thru K5 are now an n′ byte randomvalues and we set:SD=S1 XOR E(K1)SD2=S2 XOR E(K2)SD3=S3 XOR E(K3)SDn=Sn XOR E(Kn)where E(K1) thru E(Kn) are the first n′ bytes of output from the RS1Stream Cipher algorithm keyed by K1 thru Kn. The shares are now placedinto data depositories as described herein.

In this stream cipher RS1 algorithm, the required computations neededare nearly as simple and fast as the OTP algorithm. The benefit in thisexample using the RS1 Stream Cipher is that the system needs to storeand transmit on average only about 16 bytes more than the size of theoriginal data to be secured per share. When the size of the originaldata is more than 16 bytes, this RS1 algorithm is more efficient thanthe OTP algorithm because it is simply shorter. It is readily apparentto those of ordinary skill in the art that a wide variety of encryptionmethods or algorithms are suitable for use in the present invention,including, but not limited to RS1, OTP, RC4™, Triple DES and AES.

There are major advantages provided by the data security methods andcomputer systems of the present invention over traditional encryptionmethods. One advantage is the security gained from moving shares of thedata to different locations on one or more data depositories or storagedevices, that may be in different logical, physical or geographicallocations. When the shares of data are split physically and under thecontrol of different personnel, for example, the possibility ofcompromising the data is greatly reduced.

Another advantage provided by the methods and system of the presentinvention is the combination of the steps of the method of the presentinvention for securing data to provide a comprehensive process ofmaintaining security of sensitive data. The data is encrypted with asecure key and split into one or more shares, and in one embodiment,four shares, according to the secure key. The secure key is storedsafely with a reference pointer which is secured into four sharesaccording to a secure key. The data shares are then encryptedindividually and the keys are stored safely with different encryptedshares. When combined, the entire process for securing data according tothe methods disclosed herein becomes a comprehensive package for datasecurity.

The data secured according to the methods of the present invention isreadily retrievable and restored, reconstituted, reassembled, decrypted,or otherwise returned into its original or other suitable form for use.In order to restore the original data, the following items may beutilized:

1. All shares or portions of the data set.

2. Knowledge of and ability to reproduce the process flow of the methodused to secure the data.

3. Access to the session master key.

4. Access to the Parser Master Key.

Therefore, it may be desirable to plan a secure installation wherein atleast one of the above elements may be physically separated from theremaining components of the system (under the control of a differentsystem administrator for example).

Protection against a rogue application invoking the data securingmethods application may be enforced by use of the Parser Master Key. Amutual authentication handshake between the secure data parser and theapplication may be required in this embodiment of the present inventionprior to any action taken.

The security of the system dictates that there be no “backdoor” methodfor recreation of the original data. For installations where datarecovery issues may arise, the secure data parser can be enhanced toprovide a mirror of the four shares and session master key depository.Hardware options such as RAID (redundant array of inexpensive disks,used to spread information over several disks) and software options suchas replication can assist as well in the data recovery planning.

Key Management

In one embodiment of the present invention, the data securing methoduses three sets of keys for an encryption operation. Each set of keysmay have individual key storage, retrieval, security and recoveryoptions, based on the installation. The keys that may be used, include,but are not limited to:

The Parser Master Key

This key is an individual key associated with the installation of thesecure data parser. It is installed on the server on which the securedata parser has been deployed. There are a variety of options suitablefor securing this key including, but not limited to, a smart card,separate hardware key store, standard key stores, custom key stores orwithin a secured database table, for example.

The Session Master Key

A Session Master Key may be generated each time data is secured. TheSession Master Key is used to encrypt the data prior to the parsing andsplitting operations. It may also be incorporated (if the Session MasterKey is not integrated into the parsed data) as a means of parsing theencrypted data. The Session Master Key may be secured in a variety ofmanners, including, but not limited to, a standard key store, custom keystore, separate database table, or secured within the encrypted shares,for example.

The Share Encryption Keys

For each share or portions of a data set that is created, an individualShare Encryption Key may be generated to further encrypt the shares. TheShare Encryption Keys may be stored in different shares than the sharethat was encrypted.

It is readily apparent to those of ordinary skill in the art that thedata securing methods and computer system of the present invention arewidely applicable to any type of data in any setting or environment. Inaddition to commercial applications conducted over the Internet orbetween customers and vendors, the data securing methods and computersystems of the present invention are highly applicable to non-commercialor private settings or environments. Any data set that is desired to bekept secure from any unauthorized user may be secured using the methodsand systems described herein. For example, access to a particulardatabase within a company or organization may be advantageouslyrestricted to only selected users by employing the methods and systemsof the present invention for securing data. Another example is thegeneration, modification or access to documents wherein it is desired torestrict access or prevent unauthorized or accidental access ordisclosure outside a group of selected individuals, computers orworkstations. These and other examples of the ways in which the methodsand systems of data securing of the present invention are applicable toany non-commercial or commercial environment or setting for any setting,including, but not limited to any organization, government agency orcorporation.

In another embodiment of the present invention, the data securing methoduses three sets of keys for an encryption operation. Each set of keysmay have individual key storage, retrieval, security and recoveryoptions, based on the installation. The keys that may be used, include,but are not limited to:

1. The Parser Master Key

This key is an individual key associated with the installation of thesecure data parser. It is installed on the server on which the securedata parser has been deployed. There are a variety of options suitablefor securing this key including, but not limited to, a smart card,separate hardware key store, standard key stores, custom key stores orwithin a secured database table, for example.

2. The Session Master Key

A Session Master Key may be generated each time data is secured. TheSession Master Key is used in conjunction with the Parser Master key toderive the Intermediary Key. The Session Master Key may be secured in avariety of manners, including, but not limited to, a standard key store,custom key store, separate database table, or secured within theencrypted shares, for example.

3. The Intermediary Key

An Intermediary Key may be generated each time data is secured. TheIntermediary Key is used to encrypt the data prior to the parsing andsplitting operation. It may also be incorporated as a means of parsingthe encrypted data.

4. The Share Encryption Keys

For each share or portions of a data set that is created, an individualShare Encryption Key may be generated to further encrypt the shares. TheShare Encryption Keys may be stored in different shares than the sharethat was encrypted.

It is readily apparent to those of ordinary skill in the art that thedata securing methods and computer system of the present invention arewidely applicable to any type of data in any setting or environment. Inaddition to commercial applications conducted over the Internet orbetween customers and vendors, the data securing methods and computersystems of the present invention are highly applicable to non-commercialor private settings or environments. Any data set that is desired to bekept secure from any unauthorized user may be secured using the methodsand systems described herein. For example, access to a particulardatabase within a company or organization may be advantageouslyrestricted to only selected users by employing the methods and systemsof the present invention for securing data. Another example is thegeneration, modification or access to documents wherein it is desired torestrict access or prevent unauthorized or accidental access ordisclosure outside a group of selected individuals, computers orworkstations. These and other examples of the ways in which the methodsand systems of data securing of the present invention are applicable toany non-commercial or commercial environment or setting for any setting,including, but not limited to any organization, government agency orcorporation.

Workgroup, Project, Individual PC/Laptop or Cross Platform Data Security

The data securing methods and computer systems of the present inventionare also useful in securing data by workgroup, project, individualPC/Laptop and any other platform that is in use in, for example,businesses, offices, government agencies, or any setting in whichsensitive data is created, handled or stored. The present inventionprovides methods and computer systems to secure data that is known to besought after by organizations, such as the U.S. Government, forimplementation across the entire government organization or betweengovernments at a state or federal level.

The data securing methods and computer systems of the present inventionprovide the ability to not only parse and split flat files but also datafields, sets and or table of any type. Additionally, all forms of dataare capable of being secured under this process, including, but notlimited to, text, video, images, biometrics and voice data. Scalability,speed and data throughput of the methods of securing data of the presentinvention are only limited to the hardware the user has at theirdisposal.

In one embodiment of the present invention, the data securing methodsare utilized as described below in a workgroup environment. In oneembodiment, as shown in FIG. 23 and described below, the Workgroup Scaledata securing method of the present invention uses the private keymanagement functionality of the TrustEngine to store the user/grouprelationships and the associated private keys (Parser Group Master Keys)necessary for a group of users to share secure data. The method of thepresent invention has the capability to secure data for an enterprise,workgroup, or individual user, depending on how the Parser Master Keywas deployed.

In one embodiment, additional key management and user/group managementprograms may be provided, enabling wide scale workgroup implementationwith a single point of administration and key management. Keygeneration, management and revocation are handled by the singlemaintenance program, which all become especially important as the numberof users increase. In another embodiment, key management may also be setup across one or several different system administrators, which may notallow any one person or group to control data as needed. This allows forthe management of secured data to be obtained by roles,responsibilities, membership, rights, etc., as defined by anorganization, and the access to secured data can be limited to justthose who are permitted or required to have access only to the portionthey are working on, while others, such as managers or executives, mayhave access to all of the secured data. This embodiment allows for thesharing of secured data among different groups within a company ororganization while at the same time only allowing certain selectedindividuals, such as those with the authorized and predetermined rolesand responsibilities, to observe the data as a whole. In addition, thisembodiment of the methods and systems of the present invention alsoallows for the sharing of data among, for example, separate companies,or separate departments or divisions of companies, or any separateorganization departments, groups, agencies, or offices, or the like, ofany government or organization or any kind, where some sharing isrequired, but not any one party may be permitted to have access to allthe data. Particularly apparent examples of the need and utility forsuch a method and system of the present invention are to allow sharing,but maintain security, in between government areas, agencies andoffices, and between different divisions, departments or offices of alarge company, or any other organization, for example.

An example of the applicability of the methods of the present inventionon a smaller scale is as follows. A Parser Master key is used as aserialization or branding of the secure data parser to an organization.As the scale of use of the Parser Master key is reduced from the wholeenterprise to a smaller workgroup, the data securing methods describedherein are used to share files within groups of users.

In the example shown in FIG. 25 and described below, there are six usersdefined along with their title or role within the organization. The sidebar represents five possible groups that the users can belong toaccording to their role. The arrow represents membership by the user inone or more of the groups.

When configuring the secure data parser for use in this example, thesystem administrator accesses the user and group information from theoperating system by a maintenance program. This maintenance programgenerates and assigns Parser Group Master Keys to users based on theirmembership in groups.

In this example, there are three members in the Senior Staff group. Forthis group, the actions would be:

1. Access Parser Group Master Key for the Senior Staff group (generate akey if not available);

2. Generate a digital certificate associating CEO with the Senior Staffgroup;

3. Generate a digital certificate associating CFO with the Senior Staffgroup;

4. Generate a digital certificate associating Vice President, Marketingwith the Senior Staff group.

The same set of actions would be done for each group, and each memberwithin each group. When the maintenance program is complete, the ParserGroup Master Key becomes a shared credential for each member of thegroup. Revocation of the assigned digital certificate may be doneautomatically when a user is removed from a group through themaintenance program without affecting the remaining members of thegroup.

Once the shared credentials have been defined, the parsing and splittingprocess remains the same. When a file, document or data element is to besecured, the user is prompted for the target group to be used whensecuring the data. The resulting secured data is only accessible byother members of the target group. This functionality of the methods andsystems of the present invention may be used with any other computersystem or software platform, any may be, for example, integrated intoexisting application programs or used standalone for file security.

It is readily apparent to those of ordinary skill in the art that anyone or combination of encryption algorithms are suitable for use in themethods and systems of the present invention. For example, theencryption steps may, in one embodiment, be repeated to produce amulti-layered encryption scheme. In addition, a different encryptionalgorithm, or combination of encryption algorithms, may be used inrepeat encryption steps such that different encryption algorithms areapplied to the different layers of the multi-layered encryption scheme.As such, the encryption scheme itself may become a component of themethods of the present invention for securing sensitive data fromunauthorized use or access.

The secure data parser may include as an internal component, as anexternal component, or as both an error-checking component. For example,in one suitable approach, as portions of data are created using thesecure data parser in accordance with the present invention, to assurethe integrity of the data within a portion, a hash value is taken atpreset intervals within the portion and is appended to the end of theinterval. The hash value is a predictable and reproducible numericrepresentation of the data. If any bit within the data changes, the hashvalue would be different. A scanning module (either as a stand-alonecomponent external to the secure data parser or as an internalcomponent) may then scan the portions of data generated by the securedata parser. Each portion of data (or alternatively, less than allportions of data according to some interval or by a random orpseudo-random sampling) is compared to the appended hash value or valuesand an action may be taken. This action may include a report of valuesthat match and do not match, an alert for values that do not match, orinvoking of some external or internal program to trigger a recovery ofthe data. For example, recovery of the data could be performed byinvoking a recovery module based on the concept that fewer than allportions may be needed to generate original data in accordance with thepresent invention.

Any other suitable integrity checking may be implemented using anysuitable integrity information appended anywhere in all or a subset ofdata portions. Integrity information may include any suitableinformation that can be used to determine the integrity of dataportions. Examples of integrity information may include hash valuescomputed based on any suitable parameter (e.g., based on respective dataportions), digital signature information, message authentication code(MAC) information, any other suitable information, or any combinationthereof.

The secure data parser of the present invention may be used in anysuitable application: Namely, the secure data parser described hereinhas a variety of applications in different areas of computing andtechnology. Several such areas are discussed below. It will beunderstood that these are merely illustrative in nature and that anyother suitable applications may make use of the secure data parser. Itwill further be understood that the examples described are merelyillustrative embodiments that may be modified in any suitable way inorder to satisfy any suitable desires. For example, parsing andsplitting may be based on any suitable units, such as by bits, by bytes,by kilobytes, by megabytes, by any combination thereof, or by any othersuitable unit.

The secure data parser of the present invention may be used to implementsecure physical tokens, whereby data stored in a physical token may berequired in order to access additional data stored in another storagearea. In one suitable approach, a physical token, such as a compact USBflash drive, a floppy disk, an optical disk, a smart card, or any othersuitable physical token, may be used to store one of at least twoportions of parsed data in accordance with the present invention. Inorder to access the original data, the USB flash drive would need to beaccessed. Thus, a personal computer holding one portion of parsed datawould need to have the USB flash drive, having the other portion ofparsed data, attached before the original data can be accessed. FIG. 26illustrates this application. Storage area 2500 includes a portion ofparsed data 2502. Physical token 2504, having a portion of parsed data2506 would need to be coupled to storage area 2500 using any suitablecommunications interface 2508 (e.g., USB, serial, parallel, Bluetooth,IR, IEEE 1394, ethernet, or any other suitable communications interface)in order to access the original data. This is useful in a situationwhere, for example, sensitive data on a computer is left alone andsubject to unauthorized access attempts. By removing the physical token(e.g., the USB flash drive), the sensitive data is inaccessible. It willbe understood that any other suitable approach for using physical tokensmay be used.

The secure data parser of the present invention may be used to implementa secure authentication system whereby user enrollment data (e.g.,passwords, private encryption keys, fingerprint templates, biometricdata or any other suitable user enrollment data) is parsed and splitusing the secure data parser. The user enrollment data may be parsed andsplit whereby one or more portions are stored on a smart card, agovernment Common Access Card, any suitable physical storage device(e.g., magnetic or optical disk, USB key drive, etc.), or any othersuitable device. One or more other portions of the parsed userenrollment data may be stored in the system performing theauthentication. This provides an added level of security to theauthentication process (e.g., in addition to the biometricauthentication information obtained from the biometric source, the userenrollment data must also be obtained via the appropriate parsed andsplit data portion).

The secure data parser of the present invention may be integrated intoany suitable existing system in order to provide the use of itsfunctionality in each system's respective environment. FIG. 27 shows ablock diagram of an illustrative system 2600, which may includesoftware, hardware, or both for implementing any suitable application.System 2600 may be an existing system in which secure data parser 2602may be retrofitted as an integrated component. Alternatively, securedata parser 2602 may be integrated into any suitable system 2600 from,for example, its earliest design stage. Secure data parser 2600 may beintegrated at any suitable level of system 2600. For example, securedata parser 2602 may be integrated into system 2600 at a sufficientlyback-end level such that the presence of secure data parser 2602 may besubstantially transparent to an end user of system 2600. Secure dataparser 2602 may be used for parsing and splitting data among one or morestorage devices 2604 in accordance with the present invention. Someillustrative examples of systems having the secure data parserintegrated therein are discussed below.

The secure data parser of the present invention may be integrated intoan operating system kernel (e.g., Linux, Unix, or any other suitablecommercial or proprietary operating system). This integration may beused to protect data at the device level whereby, for example, data thatwould ordinarily be stored in one or more devices is separated into acertain number of portions by the secure data parser integrated into theoperating system and stored among the one or more devices. When originaldata is attempted to be accessed, the appropriate software, alsointegrated into the operating system, may recombine the parsed dataportions into the original data in a way that may be transparent to theend user.

The secure data parser of the present invention may be integrated into avolume manager or any other suitable component of a storage system toprotect local and networked data storage across any or all supportedplatforms. For example, with the secure data parser integrated, astorage system may make use of the redundancy offered by the secure dataparser (i.e., which is used to implement the feature of needing fewerthan all separated portions of data in order to reconstruct the originaldata) to protect against data loss. The secure data parser also allowsall data written to storage devices, whether using redundancy or not, tobe in the form of multiple portions that are generated according to theparsing of the present invention. When original data is attempted to beaccessed, the appropriate software, also integrated into the volumemanager or other suitable component of the storage system, may recombinethe parsed data portions into the original data in a way that may betransparent to the end user.

In one suitable approach, the secure data parser of the presentinvention may be integrated into a RAID controller (as either hardwareor software). This allows for the secure storage of data to multipledrives while maintaining fault tolerance in case of drive failure.

The secure data parser of the present invention may be integrated into adatabase in order to, for example, protect sensitive table information.For example, in one suitable approach, data associated with particularcells of a database table (e.g., individual cells, one or moreparticular columns, one or more particular rows, any combinationthereof, or an entire database table) may be parsed and separatedaccording to the present invention (e.g., where the different portionsare stored on one or more storage devices at one or more locations or ona single storage device). Access to recombine the portions in order toview the original data may be granted by traditional authenticationmethods (e.g., username and password query).

The secure parser of the present invention may be integrated in anysuitable system that involves data in motion (i.e., transfer of datafrom one location to another). Such systems include, for example, email,streaming data broadcasts, and wireless (e.g., WiFi) communications.With respect to email, in one suitable approach, the secure parser maybe used to parse outgoing messages (i.e., containing text, binary data,or both (e.g., files attached to an email message)) and sending thedifferent portions of the parsed data along different paths thuscreating multiple streams of data. If any one of these streams of datais compromised, the original message remains secure because the systemmay require that more than one of the portions be combined, inaccordance with the present invention, in order to generate the originaldata. In another suitable approach, the different portions of data maybe communicated along one path sequentially so that if one portion isobtained, it may not be sufficient to generate the original data. Thedifferent portions arrive at the intended recipient's location and maybe combined to generate the original data in accordance with the presentinvention.

FIGS. 27 and 28 are illustrative block diagrams of such email systems.FIG. 28 shows a sender system 2700, which may include any suitablehardware, such as a computer terminal, personal computer, handhelddevice (e.g., PDA, Blackberry), cellular telephone, computer network,any other suitable hardware, or any combination thereof. Sender system2700 is used to generate and/or store a message 2704, which may be, forexample, an email message, a binary data file (e.g., graphics, voice,video, etc.), or both. Message 2704 is parsed and split by secure dataparser 2702 in accordance with the present invention. The resultant dataportions may be communicated across one or more separate communicationspaths 2706 over network 2708 (e.g., the Internet, an intranet, a LAN,WiFi, Bluetooth, any other suitable hard-wired or wirelesscommunications means, or any combination thereof) to recipient system2710. The data portions may be communicated parallel in time oralternatively, according to any suitable time delay between thecommunication of the different data portions. Recipient system 2710 maybe any suitable hardware as described above with respect to sendersystem 2700. The separate data portions carried along communicationspaths 2706 are recombined at recipient system 2710 to generate theoriginal message or data in accordance with the present invention.

FIG. 28 shows a sender system 2800, which may include any suitablehardware, such as a computer terminal, personal computer, handhelddevice (e.g., PDA), cellular telephone, computer network, any othersuitable hardware, or any combination thereof. Sender system 2800 isused to generate and/or store a message 2804, which may be, for example,an email message, a binary data file (e.g., graphics, voice, video,etc.), or both. Message 2804 is parsed and split by secure data parser2802 in accordance with the present invention. The resultant dataportions may be communicated across a single communications paths 2806over network 2808 (e.g., the Internet, an intranet, a LAN, WiFi,Bluetooth, any other suitable communications means, or any combinationthereof) to recipient system 2810. The data portions may be communicatedserially across communications path 2806 with respect to one another.Recipient system 2810 may be any suitable hardware as described abovewith respect to sender system 2800. The separate data portions carriedalong communications path 2806 are recombined at recipient system 2810to generate the original message or data in accordance with the presentinvention.

It will be understood that the arrangement of FIGS. 27 and 28 are merelyillustrative. Any other suitable arrangement may be used. For example,in another suitable approach, the systems of FIGS. 27 and 28 may beincorporated whereby the multi-path approach of FIG. 28 is used and inwhich one or more of communications paths 2706 are used to carry morethan one portion of data as communications path 2806 does in the contextof FIG. 29. In general

The secure data parser may be integrated at any suitable level of adata-in motion system. For example, in the context of an email system,the secure parser may be integrated at the user-interface level (e.g.,into Microsoft® Outlook) in which case, the user may have control overthe use of the secure data parser features when using email.Alternatively, the secure parser may be implemented in a back-endcomponent such as at the exchange server, in which case, messages may beautomatically parsed, split, and communicated along different paths inaccordance with the present invention without any user intervention.

Similarly, in the case of streaming broadcasts of data (e.g., audio,video), the outgoing data may be parsed and separated into multiplestreams each containing a portion of the parsed data. The multiplestreams may be transmitted along one or more paths and recombined at therecipient's location in accordance with the present invention. One ofthe benefits of this approach is that it avoids the relatively largeoverhead associated with traditional encryption of data followed bytransmission of the encrypted data over a single communications channel.The secure parser of the present invention allows data in motion to besent in multiple parallel streams, increasing speed and efficiency.

It will be understand that the secure data parser may be integrated forprotection of and fault tolerance of any type of data in motion throughany transport medium, including, for example, wired, wireless, orphysical. For example, voice over Internet protocol (VoIP) applicationsmay make use of the secure data parser of the present invention.Wireless or wired data transport from or to any suitable personaldigital assistant (PDA) devices such as Blackberries and SmartPhones maybe secured using the secure data parser of the present invention.Communications using wireless 802.11 protocols for peer to peer and hubbased wireless networks, satellite communications, point to pointwireless communications, Internet client/server communications, or anyother suitable communications may involve the data in motioncapabilities of the secure data parser in accordance with the presentinvention. Data communication between computer peripheral device (e.g.,printer, scanner, monitor, keyboard, network router, biometricauthentication device (e.g., fingerprint scanner), or any other suitableperipheral device) between a computer and a computer peripheral device,between a computer peripheral device and any other suitable device, orany combination thereof may make use of the data in motion features ofthe present invention.

The data in motion features of the present invention may also apply tophysical transportation of secure shares using for example, separateroutes, vehicles, methods, any other suitable physical transportation,or any combination thereof. For example, physical transportation of datamay take place on digital/magnetic tapes, floppy disks, optical disks,physical tokens, USB drives, removable hard drives, consumer electronicdevices with flash memory (e.g., Apple IPODs or other MP3 players),flash memory, any other suitable medium used for transporting data, orany combination thereof.

The secure data parser of the present invention may provide securitywith the ability for disaster recovery. According to the presentinvention, fewer than all portions of the separated data generated bythe secure data parser may be necessary in order to retrieve theoriginal data. That is, out of m portions stored, n may be the minimumnumber of these m portions necessary to retrieve the original data,where n<=m. For example, if each of four portions is stored in adifferent physical location relative to the other three portions, then,if n=2 in this example, two of the locations may be compromised wherebydata is destroyed or inaccessible, and the original data may still beretrieved from the portions in the other two locations. Any suitablevalue for n or m may be used.

In addition, the n of m feature of the present invention may be used tocreate a “two man rule” whereby in order to avoid entrusting a singleindividual or any other entity with full access to what may be sensitivedata, two or more distinct entities, each with a portion of theseparated data parsed by the secure parser of the present invention mayneed to agree to put their portions together in order to retrieve theoriginal data.

The secure data parser of the present invention may be used to provide agroup of entities with a group-wide key that allows the group members toaccess particular information authorized to be accessed by thatparticular group. The group key may be one of the data portionsgenerated by the secure parser in accordance with the present inventionthat may be required to be combined with another portion centrallystored, for example in order to retrieve the information sought. Thisfeature allows for, for example, secure collaboration among a group. Itmay be applied in for example, dedicated networks, virtual privatenetworks, intranets, or any other suitable network.

Specific applications of this use of the secure parser include, forexample, coalition information sharing in which, for example,multi-national friendly government forces are given the capability tocommunicate operational and otherwise sensitive data on a security levelauthorized to each respective country over a single network or a dualnetwork (i.e., as compared to the many networks involving relativelysubstantial manual processes currently used). This capability is alsoapplicable for companies or other organizations in which informationneeded to be known by one or more specific individuals (within theorganization or without) may be communicated over a single networkwithout the need to worry about unauthorized individuals viewing theinformation.

Another specific application includes a multi-level security hierarchyfor government systems. That is, the secure parser of the presentinvention may provide for the ability to operate a government system atdifferent levels of classified information (e.g., unclassified,classified, secret, top secret) using a single network. If desired, morenetworks may be used (e.g., a separate network for top secret), but thepresent invention allows for substantially fewer than currentarrangement in which a separate network is used for each level ofclassification.

It will be understood that any combination of the above describedapplications of the secure parser of the present invention may be used.For example, the group key application can be used together with thedata in motion security application (i.e., whereby data that iscommunicated over a network can only be accessed by a member of therespective group and where, while the data is in motion, it is splitamong multiple paths (or sent in sequential portions) in accordance withthe present invention).

The secure data parser of the present invention may be integrated intoany middleware application to enable applications to securely store datato different database products or to different devices withoutmodification to either the applications or the database. Middleware is ageneral term for any product that allows two separate and alreadyexisting programs to communicate. For example, in one suitable approach,middleware having the secure data parser integrated, may be used toallow programs written for a particular database to communicate withother databases without custom coding.

The secure data parser of the present invention may be implementedhaving any combination of any suitable capabilities, such as thosediscussed herein. In some embodiments of the present invention, forexample, the secure data parser may be implemented having only certaincapabilities whereas other capabilities may be obtained through the useof external software, hardware, or both interfaced either directly orindirectly with the secure data parser.

FIG. 30, for example, shows an illustrative implementation of the securedata parser as secure data parser 3000. Secure data parser 3000 isimplemented with very few built-in capabilities. As illustrated, securedata parser 3000 may include built-in capabilities for parsing andsplitting data into portions (also referred to herein as shares) of datausing module 3002 in accordance with the present invention. Secure dataparser 3000 may also include built in capabilities for performingredundancy in order to be able to implement, for example, the m of nfeature described above (i.e., recreating the original data using fewerthan all shares of parsed and split data) using module 3004. Secure dataparser 3000 may also include share distribution capabilities usingmodule 3006 for placing the shares of data into buffers from which theyare sent for communication to a remote location, for storage, etc. inaccordance with the present invention. It will be understood that anyother suitable capabilities may be built into secure data parser 3000.

Assembled data buffer 3008 may be any suitable memory used to store theoriginal data (although not necessarily in its original form) that willbe parsed and split by secure data parser 3000. In a splittingoperation, assembled data buffer 3008 provides input to secure dataparser 3008. In a restore operation, assembled data buffer 3008 may beused to store the output of secure data parser 3000.

Split shares buffers 3010 may be one or more memory modules that may beused to store the multiple shares of data that resulted from the parsingand splitting of original data. In a splitting operation, split sharesbuffers 3010 hold the output of the secure data parser. In a restoreoperation, split shares buffers hold the input to secure data parser3000.

It will be understood that any other suitable arrangement ofcapabilities may be built-in for secure data parser 3000. Any additionalfeatures may be built-in and any of the features illustrated may beremoved, made more robust, made less robust, or may otherwise bemodified in any suitable way. Buffers 3008 and 3010 are likewise merelyillustrative and may be modified, removed, or added to in any suitableway.

Any suitable modules implemented in software, hardware or both may becalled by or may call to secure data parser 3000. If desired, evencapabilities that are built into secure data parser 3000 may be replacedby one or more external modules. As illustrated, some external modulesinclude random number generator 3012, cipher feedback key generator3014, hash algorithm 3016, any one or more types of encryption 3018, andkey management 3020. It will be understood that these are merelyillustrative external modules. Any other suitable modules may be used inaddition to or in place of those illustrated.

Cipher feedback key generator 3014 may, externally to secure data parser3000, generate for each secure data parser operation, a unique key, orrandom number (using for example random number generator 3012), to beused as a seed value for an operation that extends an original sessionkey size (e.g., a value of 128, 256, 512, or 1024 bits) into a valueequal to the length of the data to be parsed and split. Any suitablealgorithm may be used for the cipher feedback key generation, including,for example, the AES cipher feedback key generation algorithm.

In order to facilitate integration of secure data parser 3000 and itsexternal modules (i.e., secure data parser layer 3026) into anapplication layer 3024 (e.g., email application, database application,etc.), a wrapping layer that may make use of, for example, API functioncalls may be used. Any other suitable arrangement for facilitatingintegration of secure data parser layer 3026 into application layer 3024may be used.

FIG. 31 illustratively shows how the arrangement of FIG. 30 may be usedwhen a write (e.g., to a storage device), insert (e.g., in a databasefield), or transmit (e.g., across a network) command is issued inapplication layer 3024. At step 3100 data to be secured is identifiedand a call is made to the secure data parser. The call is passed throughwrapper layer 3022 where at step 3102, wrapper layer 3022 streams theinput data identified at step 3100 into assembled data buffer 3008. Alsoat step 3102, any suitable share information, filenames, any othersuitable information, or any combination thereof may be stored (e.g., asinformation 3106 at wrapper layer 3022). Secure data processor 3000 thenparses and splits the data it takes as input from assembled data buffer3008 in accordance with the present invention. It outputs the datashares into split shares buffers 3010. At step 3104, wrapper layer 3022obtains from stored information 3106 any suitable share information(i.e., stored by wrapper 3022 at step 3102) and share location(s) (e.g.,from one or more configuration files). Wrapper layer 3022 then writesthe output shares (obtained from split shares buffers 3010)appropriately (e.g., written to one or more storage devices,communicated onto a network, etc.).

FIG. 32 illustratively shows how the arrangement of FIG. 30 may be usedwhen a read (e.g., from a storage device), select (e.g., from a databasefield), or receive (e.g., from a network) occurs. At step 3200, data tobe restored is identified and a call to secure data parser 3000 is madefrom application layer 3024. At step 3202, from wrapper layer 3022, anysuitable share information is obtained and share location is determined.Wrapper layer 3022 loads the portions of data identified at step 3200into split shares buffers 3010. Secure data parser 3000 then processesthese shares in accordance with the present invention (e.g., if onlythree of four shares are available, then the redundancy capabilities ofsecure data parser 3000 may be used to restore the original data usingonly the three shares). The restored data is then stored in assembleddata buffer 3008. At step 3204, application layer 3022 converts the datastored in assembled data buffer 3008 into its original data format (ifnecessary) and provides the original data in its original format toapplication layer 3024.

It will be understood that the parsing and splitting of original dataillustrated in FIG. 31 and the restoring of portions of data intooriginal data illustrated in FIG. 32 is merely illustrative. Any othersuitable processes, components, or both may be used in addition to or inplace of those illustrated.

FIG. 33 is a block diagram of an illustrative process flow for parsingand splitting original data into two or more portions of data inaccordance with one embodiment of the present invention. As illustrated,the original data desired to be parsed and split is plain text 3306(i.e., the word “SUMMIT” is used as an example). It will be understoodthat any other type of data may be parsed and split in accordance withthe present invention. A session key 3300 is generated. If the length ofsession key 3300 is not compatible with the length of original data3306, then cipher feedback session key 3304 may be generated.

In one suitable approach, original data 3306 may be encrypted prior toparsing, splitting, or both. For example, as FIG. 33 illustrates,original data 3306 may be XORed with any suitable value (e.g., withcipher feedback session key 3304, or with any other suitable value). Itwill be understood that any other suitable encryption technique may beused in place of or in addition to the XOR technique illustrate. It willfurther be understood that although FIG. 33 is illustrated in terms ofbyte by byte operations, the operation may take place at the bit levelor at any other suitable level. It will further be understood that, ifdesired, there need not be any encryption whatsoever of original data3306.

The resultant encrypted data (or original data if no encryption tookplace) is then hashed to determine how to split the encrypted (ororiginal) data among the output buckets (e.g., of which there are fourin the illustrated example). In the illustrated example, the hashingtakes place by bytes and is a function of cipher feedback session key3304. It will be understood that this is merely illustrative. Thehashing may be performed at the bit level, if desired. The hashing maybe a function of any other suitable value besides cipher feedbacksession key 3304. In another suitable approach, hashing need not beused. Rather, any other suitable technique for splitting data may beemployed.

FIG. 34 is a block diagram of an illustrative process flow for restoringoriginal data 3306 from two or more parsed and split portions oforiginal data 3306 in accordance with one embodiment of the presentinvention. The process involves hashing the portions in reverse (i.e.,to the process of FIG. 33) as a function of cipher feedback session key3304 to restore the encrypted original data (or original data if therewas no encryption prior to the parsing and splitting). The encryptionkey may then be used to restore the original data (i.e., in theillustrated example, cipher feedback session key 3304 is used to decryptthe XOR encryption by XORing it with the encrypted data). This therestores original data 3306.

FIG. 35 shows how bit-splitting may be implemented in the example ofFIGS. 33 and 34. A hash may be used (e.g., as a function of the cipherfeedback session key, as a function of any other suitable value) todetermine a bit value at which to split each byte of data. It will beunderstood that this is merely one illustrative way in which toimplement splitting at the bit level. Any other suitable technique maybe used.

It will be understood that any reference to hash functionality madeherein may be made with respect to any suitable hash algorithm. Theseinclude for example, MD5 and SHA-1. Different hash algorithms may beused at different times and by different components of the presentinvention.

After a split point has been determined in accordance with the aboveillustrative procedure or through any other procedure or algorithm, adetermination may be made with regard to which data portions to appendeach of the left and right segments. Any suitable algorithm may be usedfor making this determination. For example, in one suitable approach, atable of all possible distributions (e.g., in the form of pairings ofdestinations for the left segment and for the right segment) may becreated, whereby a destination share value for each of the left andright segment may be determined by using any suitable hash function oncorresponding data in the session key, cipher feedback session key, orany other suitable random or pseudo-random value, which may be generatedand extended to the size of the original data. For example, a hashfunction of a corresponding byte in the random or pseudo-random valuemay be made. The output of the hash function is used to determine whichpairing of destinations (i.e., one for the left segment and one for theright segment) to select from the table of all the destinationcombinations. Based on this result, each segment of the split data unitis appended to the respective two shares indicated by the table valueselected as a result of the hash function.

Redundancy information may be appended to the data portions inaccordance with the present invention to allow for the restoration ofthe original data using fewer than all the data portions. For example,if two out of four portions are desired to be sufficient for restorationof data, then additional data from the shares may be accordinglyappended to each share in, for example, a round-robin manner (e.g.,where the size of the original data is 4 MB, then share 1 gets its ownshares as well as those of shares 2 and 3; share 2 gets its own share aswell as those of shares 3 and 4; share 3 gets its own share as well asthose of shares 4 and 1; and share 4 gets its own shares as well asthose of shares 1 and 2). Any such suitable redundancy may be used inaccordance with the present invention.

It will be understood that any other suitable parsing and splittingapproach may be used to generate portions of data from an original dataset in accordance with the present invention. For example, parsing andsplitting may be randomly or pseudo-randomly processed on a bit by bitbasis. A random or pseudo-random value may be used (e.g., session key,cipher feedback session key, etc.) whereby for each bit in the originaldata, the result of a hash function on corresponding data in the randomor pseudo-random value may indicate to which share to append therespective bit. In one suitable approach the random or pseudo-randomvalue may be generated as, or extended to, 8 times the size of theoriginal data so that the hash function may be performed on acorresponding byte of the random or pseudo-random value with respect toeach bit of the original data. Any other suitable algorithm for parsingand splitting data on a bit by bit level may be used in accordance withthe present invention. It will further be appreciated that redundancydata may be appended to the data shares such as, for example, in themanner described immediately above in accordance with the presentinvention.

In one suitable approach, parsing and splitting need not be random orpseudo-random. Rather, any suitable deterministic algorithm for parsingand splitting data may be used. For example, breaking up the originaldata into sequential shares may be employed as a parsing and splittingalgorithm. Another example is to parse and split the original data bitby bit, appending each respective bit to the data shares sequentially ina round-robin manner. It will further be appreciated that redundancydata may be appended to the data shares such as, for example, in themanner described above in accordance with the present invention.

In one embodiment of the present invention, after the secure data parsergenerates a number of portions of original data, in order to restore theoriginal data, certain one or more of the generated portions may bemandatory. For example, if one of the portions is used as anauthentication share (e.g., saved on a physical token device), and ifthe fault tolerance feature of the secure data parser is being used(i.e., where fewer than all portions are necessary to restore theoriginal data), then even though the secure data parser may have accessto a sufficient number of portions of the original data in order torestore the original data, it may require the authentication sharestored on the physical token device before it restores the originaldata. It will be understood that any number and types of particularshares may be required based on, for example, application, type of data,user, any other suitable factors, or any combination thereof.

In one suitable approach, the secure data parser or some externalcomponent to the secure data parser may encrypt one or more portions ofthe original data. The encrypted portions may be required to be providedand decrypted in order to restore the original data. The differentencrypted portions may be encrypted with different encryption keys. Forexample, this feature may be used to implement a more secure “two manrule” whereby a first user would need to have a particular shareencrypted using a first encryption and a second user would need to havea particular share encrypted using a second encryption key. In order toaccess the original data, both users would need to have their respectiveencryption keys and provide their respective portions of the originaldata. In one suitable approach, a public key may be used to encrypt oneor more data portions that may be a mandatory share required to restorethe original data. A private key may then be used to decrypt the sharein order to be used to restore to the original data.

Any such suitable paradigm may be used that makes use of mandatoryshares where fewer than all shares are needed to restore original data.

In one suitable embodiment of the present invention, distribution ofdata into a finite number of shares of data may be processed randomly orpseudo-randomly such that from a statistical perspective, theprobability that any particular share of data receives a particular unitof data is equal to the probability that any one of the remaining shareswill receive the unit of data. As a result, each share of data will havean approximately equal amount of data bits.

According to another embodiment of the present invention, each of thefinite number of shares of data need not have an equal probability ofreceiving units of data from the parsing and splitting of the originaldata. Rather certain one or more shares may have a higher or lowerprobability than the remaining shares. As a result, certain shares maybe larger or smaller in terms of bit size relative to other shares. Forexample, in a two-share scenario, one share may have a 1% probability ofreceiving a unit of data whereas the second share has a 99% probability.It should follow, therefore that once the data units have beendistributed by the secure data parser among the two share, the firstshare should have approximately 1% of the data and the second share 99%.Any suitable probabilities may be used in accordance with the presentinvention.

It will be understood that the secure data parser may be programmed todistribute data to shares according to an exact (or near exact)percentage as well. For example, the secure data parser may beprogrammed to distribute 80% of data to a first share and the remaining20% of data to a second share.

According to another embodiment of the present invention, the securedata parser may generate data shares, one or more of which havepredefined sizes. For example, the secure data parser may split originaldata into data portions where one of the portions is exactly 256 bits.In one suitable approach, if it is not possible to generate a dataportion having the requisite size, then the secure data parser may padthe portion to make it the correct size. Any suitable size may be used.

In one suitable approach, the size of a data portion may be the size ofan encryption key, a splitting key, any other suitable key, or any othersuitable data element.

As previously discussed, the secure data parser may use keys in theparsing and splitting of data. For purposes of clarity and brevity,these keys shall be referred to herein as “splitting keys.” For example,the Session Master Key, previously introduced, is one type of splittingkey. Also, as previously discussed, splitting keys may be secured withinshares of data generated by the secure data parser. Any suitablealgorithms for securing splitting keys may be used to secure them amongthe shares of data. For example, the Shamir algorithm may be used tosecure the splitting keys whereby information that may be used toreconstruct a splitting key is generated and appended to the shares ofdata. Any other such suitable algorithm may be used in accordance withthe present invention.

Similarly, any suitable encryption keys may be secured within one ormore shares of data according to any suitable algorithm such as theShamir algorithm. For example, encryption keys used to encrypt a dataset prior to parsing and splitting, encryption keys used to encrypt adata portions after parsing and splitting, or both may be secured using,for example, the Shamir algorithm or any other suitable algorithm.

According to one embodiment of the present invention, an All or NothingTransform (AoNT), such as a Full Package Transform, may be used tofurther secure data by transforming splitting keys, encryption keys, anyother suitable data elements, or any combination thereof. For example,an encryption key used to encrypt a data set prior to parsing andsplitting in accordance with the present invention may be transformed byan AoNT algorithm. The transformed encryption key may then bedistributed among the data shares according to, for example, the Shamiralgorithm or any other suitable algorithm. In order to reconstruct theencryption key, the encrypted data set must be restored (e.g., notnecessarily using all the data shares if redundancy was used inaccordance with the present invention) in order to access the necessaryinformation regarding the transformation in accordance with AoNTs as iswell known by one skilled in the art. When the original encryption keyis retrieved, it may be used to decrypt the encrypted data set toretrieve the original data set. It will be understood that the faulttolerance features of the present invention may be used in conjunctionwith the AoNT feature. Namely, redundancy data may be included in thedata portions such that fewer than all data portions are necessary torestore the encrypted data set.

It will be understood that the AoNT may be applied to encryption keysused to encrypt the data portions following parsing and splitting eitherin place of or in addition to the encryption and AoNT of the respectiveencryption key corresponding to the data set prior to parsing andsplitting. Likewise, AoNT may be applied to splitting keys.

In one embodiment of the present invention, encryption keys, splittingkeys, or both as used in accordance with the present invention may befurther encrypted using, for example, a workgroup key in order toprovide an extra level of security to a secured data set.

In one embodiment of the present invention, an audit module may beprovided that tracks whenever the secure data parser is invoked to parseand/or split data.

FIG. 36 depicts an exemplary bit-splitting technique 3600 in accordancewith the present disclosure. A session key 3606 may be used forbit-splitting, and may be created as described herein, or in accordancewith any technique as understood in the art. For example, a sessionmaster key 3604 may be XORed with an initial session key 3602 to createthe session key 3606. The session key 3606 may be key expanded, such asby using ANSI X9.82 as a cryptographically secure pseudo-random numbergenerator and an RC4 type technique for randomizing the order. ANSIx9.82 and RC4 are merely exemplary, and any key expansion techniqueknown in the art may be used. The key expansion may be performed in amanner such that if any M of the N expanded keys are recovered, theentire expanded session key 3606 may be reconstructed.

An exemplary byte of data 3608 to be split by the bit-splitting may bethe ASCII character, “S” (i.e., 01010011). A byte of the expandedsession key 3606, such as the first session key byte 3610 (82 or01010010) may optionally be XORed with the byte of data 3608 to producedata 3612. If session key byte 3610 is not XORed with data 3608, data3608 may be used in subsequent steps as data 3612. Session key byte 3610may be right shifted to produce a split point. In one exemplaryembodiment, session key byte 3610 may be right shifted by five bits toproduce a split point of 2 or 00000010. The split point may be used tocreate two masks that separate byte 3612 into two portions. In thisexample the split point is two, and the two lowest significant bits maybe set to 1 to create mask 3616 (00000011) while the remaining six mostsignificant bits may be set to 1 to create mask 3614 (11111100). Theresult of ANDing byte 3612 with masks 3614 and 3616 and discarding the0-mask bytes is to create left split 3618 (six most significant bits ofdata 3612) and right split 3620 (two least significant bits of data3612).

A feedback value 3622 may be selected, such as by a 4-byte look aheadwithin session key 3606. An exemplary feedback value 3622 may be 99 or01100011. The same split point (and masks 3614 and 3616) may be used toseparate the feedback value 3622 into a left feedback value 3624 (sixmost significant bits of feedback value 3622) and a right feedback value3626 (two least significant bits of feedback value 3622). The leftfeedback value 3624 may be XORed with the left split 3618 to createsplit value left 3628. The right feedback value 3626 may be XORed withthe right split 3620 to create split value right 3630. Split value left3628 and split value right 3630 may be distributed to shares asdescribed herein.

FIG. 37 depicts a data flow 3700 for distributing the output of thebit-splitting process 3600 (split value right 3630 and split value left3628) to one or more of shares 3704, 3706, 3708, and 3710. The bytes ofDK 3702 may indicate the distribution of data to respective shares 3704,3706, 3708, and 3710. For example, the first bit of DK 3702 maycorrespond to share 3704, the second bit of DK 3702 may correspond toshare 3706, the third bit of DK 3702 may correspond to share 3708, andthe fourth bit of DK 3702 may correspond to share 3710. An exemplaryfirst DK byte 3702 (e.g., 0011) may result in the distribution of splitvalue right 3630 to share 3704 and the distribution of split value left3628 to share 3706.

Bit splitting as described herein may be used with various M-of-N sharerecovery configurations. For example, the distribution may be a 4 of 4split such that all shares must be recovered for the underlying keys anddata to be recovered. The session key 3606 may be divided into 4 parts,with each part distributed to one of the four shares 3704, 3706, 3708,and 3710. Alternatively, the session keys described herein may beexpanded such that the resulting bit split distribution will allow thedata to be recovered from M shares where M<N, e.g., a 2 of 4 keyexpansion or 3 of 4 key expansion.

Another exemplary technique for the distribution of data into shares maybe a bit scatter technique as depicted in FIG. 38. The bit scattertechnique may separate a stream of input bytes into separate outputstreams by bit. A master session key 3802 may be M of N expanded tocreate a session key 3804 with N key elements and equal in length to thenumber of data 3806 bytes times 8. Each session key 3804 element may beassociated with a share 3808 and may include an array of integer values.Each integer value may correspond to a bit position within each byte ofinput data 3806 to be scattered.

Bits may be scattered to shares by iterating through the integer valuesof an element of session key 3804. The selection of which bits of data3806 will be assigned to a share 3808 as well as the order in which theyare assigned may be based on the integer value from the element ofsession key 3804 associated with a particular share as described below.An exemplary session key 3804 element may have integer values 2, 4, 3,7, and 1 respectively. The integer value of 2 from the session key 3804element may indicate that the value from the second bit of each byte ofdata 3806 may be distributed to the first bit location of share 3808.The integer value of 4 from the session key 3804 element may indicatethat the value from the fourth bit of data 3806 may be distributed tothe next bit of share 3808, and so on for values 3, 7, and 1 of thesession key 3804 element. This process may be repeated until each bit ofdata 3806 has been distributed to the share 3808 based on the sessionkey 3804 element. The process may then be repeated on data 3806 for eachrespective share and associated session key element.

FIG. 39 depicts restoring the portion of a byte of data 3906 that wasdistributed to a share 3908 using the bit scatter technique. The mastersession key 3902 may be established or recovered as is described herein,e.g., by recovering a key distributed among shares. Master session key3902 may be M of N key expanded to create session key 3904 (which maymatch the session key used to scatter the bits originally) havingelements associated with shares as described herein. The integer valuesof the session key 3904 elements may be used to extract bits from theshares to recreate data 3906. The first integer value of 2 from thesession key 3904 element may indicate that the first bit from share 3908may be distributed to the second bit of data 3906. The second integervalue of 4 from the session key 3904 element may indicate that thesecond bit from share 3908 may be distributed to the fourth bit of data3906, and so on for the values 3, 7, and 1 of the session key 3904element associated with share 3908. This process may be continued forshare 3908 until all of the bits from the share 3908 are distributed todata 3906, and then repeated in its entirety for each additional sharebased on the element of session key 3904 associated with that share.

Any key expansion technique known in the art may be used to create theexpanded session keys associated with the distribution of data to sharesand reconstruction of data from shares. An exemplary M of N keyexpansion utilizing ANSI X9.82 as a cryptographically securepseudo-random number generator and an RC4 type technique for randomizingthe order will be discussed below with respect to performing a 2 of 4key expansion for use with a bit scatter technique. A master session keymay feed the ANSI X9.82 cryptographically secure pseudo-random numbergenerator to create key value k. In an exemplary embodiment the X9.82technique may be operating in AES-OFB (output feedback) mode. Eachresulting k may have a length (K_(len)) equivalent to the length of theplain text data input, padded for AES as necessary, plus 4. The keyblocks k may be created based on the master key (MK) and the key length(K_(len)) as represented by k=aes_ofb(MK, aespad_length (K_(len))).

An array of integers S may be instantiated in a manner such that theorder of the integers S corresponds to the order of the plain text data.The array may be initialized from S₀, S₁, . . . S_(len), where the keylength is assumed to be equal to the length (len) of the array S. Theinteger values S may then be randomized based on the key k. Countersi,j, and x may be initially set to 0, and the elements of array Sswapped according to the following:for (i . . . len)j=(j+k _(x) +S _(i)) mod lenswap(S[i],S[j])x++;

The resulting randomized S values may be utilized to create the expandedsession key elements SK₀ . . . SK_(N), each associated with acorresponding share of the N shares. In order to create an M of N sharedistribution such that there is sufficient overlap of the scattered datafor the data can be recovered from any M of N shares, a ratio may becomputed as follows: ratio=1−(1/N)*(M−1). In the case of a 2 of 4 keysplit, the ratio may equal 1−(1/4)*(2−1) or 75%. The randomized S valuesmay then be allocated to each of session keys SK₀ . . . SK_(N) based onthe ratio, with each successive copying from the randomized S valuesbeginning where the previous session key SK left off, and looping backto the beginning of the randomized S array as necessary. An example ofsuch an allocation for a 2 of 4 key split with a ratio of 75% isdepicted in FIG. 40. SK1 may be the initial 75% of the S array, SK2 thefinal 25% and initial 50% of the S array, SK3 the final 50% and initial25% of the S array, and SK4 the final 75% of the S array. Once thesession keys SK₀ . . . SK_(N) are created, each may then bere-randomized with a random nonce n in accordance with the following:

for (SK₀ . . . SK_(N))

-   -   i=j=x=0;    -   for (i . . . len)        -   j=(j+n_(x)+S_(i)) mod len        -   swap (S[i], S[j])        -   x=(x+1) mod keylen;

The resulting SK values may then be utilized as the expanded session keyelements for use in data splitting as described herein.

Another exemplary technique for the distribution of data into shares maybe a block split technique. Data such as a file that is to be split anddistributed to shares may include blocks, i.e., consecutive groupings ofa fixed number of bits. Examples of block sizes may include 128, 192, or256. A segment may be a group of blocks that is utilized in the blocksplit technique. If L represents the number of mandatory shares, Mrepresents the number of non-mandatory shares necessary to recover afile, and N represents the total number of non-mandatory shares, a filemay be split into L+C(N,M−1) segments, where C(N,M−1) denotes thebinomial coefficient N choose M−1. If a file is split into L+C(N,M−1)segments, the file may not be recovered unless all L mandatory sharesand at least M non-mandatory shares are recovered.

Blocks may be assigned to segments based on any appropriate technique.For example, F may be the number of blocks in a file being split.Segmenting values a and b may be calculated according to the following:

$a = {\left\lbrack \frac{F}{\begin{pmatrix}{N - 1} \\{M - 1}\end{pmatrix} \cdot \left( {\frac{N}{N - M + 1} + L} \right)} \right\rbrack = \left\lbrack {{\left. \quad\frac{F}{\begin{pmatrix}N \\{M - 1}\end{pmatrix} + {\begin{pmatrix}{N - 1} \\{M - 1}\end{pmatrix} \cdot L}} \right\rbrack b} = {a \cdot {\begin{pmatrix}N \\{M - 1}\end{pmatrix}.}}} \right.}$

Blocks are assigned to segments such that each i^(th) segment containsblocks (a*i) through (a(i+1)−1) for all i segments where i<C(N,M−1). Theremaining L segments may be partitioned evenly from the end of the fileand contain blocks b+[(F−b)*(i−C(N,M−1))/L] throughb+[(F−b)*((i+1)−C(N,M−1))/L]−1, inclusive.

The last L segments of the file may be assigned to the L mandatoryshares with one segment per share. The first C(N,M−1) segments may beassigned to the N non-mandatory shares by first enumerating all C(N,M−1)possibilities of the (M−1)−element subsets of {0, 1, . . . , N−1} inlexicographical order. If and only if the i^(th) (M−1)-element subsetdoes not include the element j, then the j^(th) non-mandatory share willcontain segment i. Based on this distribution, every possiblecombination of M−1 non-mandatory shares is missing at least one of theC(N,M−1) segments, while every collection of M non-mandatory sharesincludes all C(N,M−1) segments.

Each share may include a preamble. An exemplary preamble may have afirst line including six space-separated integers: (1) i; (2) L; (3) M;(4) N; (5) C(N−1,M−1); and (6) the size of a block in bits. Lines 1+i(for i<C(N−1,M−1)) may correspond to each segment stored in the share,and may include three space-separated integers relating to the segment:(1) the segment number; (2) the number of the first block in thesegment; and (3) the number of the last block in the segment. If theshare is mandatory, the preamble may be the same except it only containstwo lines.

To recover the data, the shares may be joined if all L mandatory sharesand at least M non-mandatory shares have been received. This may bedetermined by examining the share preambles to insure that allL+C(N,M−1) segments are present in the received shares. Shares may bewritten out based on the offsets indicating the location of segmentswithin the shares.

Another exemplary technique for the distribution of data into shares maybe a bit segment technique. For purposes of the bit segment technique, asegment is a group of bits that is used for purposes of the splittingand joining process. Splittable data such as a file may split intoC(N+L,M−1) segments, such that the file cannot be recovered from anyless than L+M shares. Segmenting values a and b may be calculatedaccording to the following:

$a = {\left\lbrack \frac{F}{\begin{pmatrix}{N - 1} \\{M - 1}\end{pmatrix} \cdot \left( {\frac{N}{N - M + 1} + L} \right)} \right\rbrack = \left\lbrack {{\left. \quad\frac{F}{\begin{pmatrix}N \\{M - 1}\end{pmatrix} + {\begin{pmatrix}{N - 1} \\{M - 1}\end{pmatrix} \cdot L}} \right\rbrack b} = {a \cdot {\begin{pmatrix}N \\{M - 1}\end{pmatrix}.}}} \right.}$

An offset S may be equal to C(N,M−1). For i=0 to C(N,M−1)−1, the i^(th)segment may contain bits i, S+i, 2*S+i, . . . , a*S+i. Segments for theL mandatory shares may be computed by dividing the remaining (b*L) bitssuch that a mandatory share j may contain bits (a+1)*S+j, (a+1)*S+L+j,(a+1)*S+2L+j, . . . , (a+1)*S+bL+j.

The first C(N,M−1) segments may be assigned to the N non-mandatoryshares by enumerating all C(N,M−1) possibilities of the (M−1)-elementsubsets of {0, 1, . . . , N−1} in lexicographical order. The remaining Lsegments are then assigned to the L mandatory shares. Bits may bedistributed from chunks of C(N,M−1) bits, wherein each chunk containsone bit from each segment. The chunks may be parsed sequentially one bitat a time, with each bit written to the share assigned to its segment.

Each share i may include a preamble. An exemplary preamble may include afirst line including six space-separated integers: (1) i; (2) L; (3) M;(4) N; (5) C(N−1,M−1); and (6) the size of a block in bits. Lines 1+i(for i<C(N−1,M−1)) may each include three space-separated integers foreach segment assigned to the share: (1) the segment number; (2) thenumber of the first bit in the segment; and (3) the number of total bitsin the segment. If the share is mandatory, the preamble may be the sameexcept it only contains two lines.

The shares may be joined if all L mandatory shares and at least Mnon-mandatory shares have been received. This may be determined byexamining the share preambles to insure that all L+C(N,M−1) segments arepresent in the received shares. Shares may be written out based on theoffsets indicating the location of segments within the shares.

FIG. 41 shows illustrative overview process 4100 for using the securedata parser of the present invention in some embodiments. The securedata parser may be compliant with Federal Information ProcessingStandards (FIPS) such as FIPS 140-2, including but not limited tostandards relating to data encryption, key storage techniques, andcryptographically secure pseudo-random number generation. As describedabove, two well-suited functions for secure data parser 4106 may includeencryption 4102 of data for storage or transmission and backup 4104(e.g., backup tapes, mirroring, RAID). As such, secure data parser 4106may be integrated with a RAID or backup system, a file storage system, adata transmission system, or a hardware or software encryption engine insome embodiments. The secure data parser may be modular in nature,allowing for any known technique to be used within each of the functionblocks shown in FIG. 41. For example, AES encryption could be replacedby other known encryption techniques such as Triple DES (3DES).

The processes associated with secure data parser 4106 may include one ormore of pre-encryption process 4108, encrypt/transform process 4110, keysecure process 4112, parse/distribute process 4114, fault toleranceprocess 4116, share authentication process 4118, and post-encryptionprocess 4120. These processes may be executed in several suitable ordersor combinations. The combination and order of processes used may dependon the particular application or use, the level of security desired,whether optional pre-encryption, post-encryption, or both, are desired,the redundancy desired, the capabilities or performance of an underlyingor integrated system, or any other suitable factor or combination offactors.

Pre-encryption process 4108 may operate independently and prior to anyencryption of the data splitting process, and may utilize encryptiontechniques described herein or known in the art, including AES (FIPS197), DES, and 3DES. Meta-data such as the file name, file length,creation/modification dates, and any other host-specific fileinformation may be pre-pended to the data prior to pre-encryption. Thekey for pre-encryption may be generated by the system, or may beprovided by an external system. Keys may be symmetric or may includepublic/private key pairs such as RSA public/private key, DSA publicprivate key, and ECDSA public/private key. Pre-encryption process mayalso include the generation of a MAC or digital signal for thepre-encrypted data as described herein.

Encryption/transform 4110 process may receive pre-encrypted ornon-encrypted data. Encryption/transform 4110 process may perform keygeneration, data encryption, and key transform steps as describedherein. For example, AES encryption may be used with a cryptographicallysecure pseudo-random number generator to create a 128, 192, or 256-bitkey. That key may be used to encrypt data using AES cipher modes such asAES counter (AES-CTR) or AES cipher block chaining (AES-CBC). Utilizingnon-sequential encryption modes such as AES-CTR may allow for parallelprocessing of data, which may allow faster multi-processing of data. Thekey may then be transformed for splitting and storage such as with apackage transform or AoNT as described herein.

Key secure process 4112 may control the splitting and distribution ofthe key to shares, such as through a Shamir key distribution or otherkey distribution techniques as described herein. Parse/distributeprocess 4114 may split data according to a technique such as bit split,block segment, bit scatter, or block split. The split data may in turnbe assigned to shares as described herein and based on the type ofsplitting technique used. The operation of the splitting technique andassignment of split data and split keys to shares may also be dependenton the M of N fault tolerance employed by fault tolerance process 4116in a particular embodiment. A N of N embodiment may provide for a higherlevel of data security, since all shares must be received to recover theunderlying keys and data. A M of N embodiment may provide redundancy. Inaddition, fault tolerance process 4116 may also implement mandatoryshares L that must be recovered even in a M of N embodiment.

Share authentication process 4118 may provide integrity, authenticationand digital signature functionality for information to be distributed toshares. Integrity information may include computing share integrityinformation as described herein, such as by utilizing a SHA-256 (FIPS180-2) hash and computing a hash tree. Authentication may include thegenerating of a MAC for each share, e.g., based on the underlying data,the initialization vector, and any attached meta-data for the share. Ashared secret MAC key may be any appropriate key as is known in the art,which may in turn be used as a key for a MAC technique such as HMAC-SHA1(FIPS 198) to produce, e.g., a 160-bit MAC tag. Shares may also besigned by a digital signature technique for authentication of thesender. The sending party may utilize FIPS PUB 186-2 signaturetechniques such as ECDSA using 384/512-bit curves or DSA using a modulussize of 512-1024 bits to sign the share using a private signing key.Other example signature techniques include RSASSA-PSSA.

Post-encryption process 4120 may optionally operate to further encryptthe shares, including data, meta-data, keys, initialization vector, andany integrity, authentication or signature information. Encryptiontechniques used by post-encryption process 4120 may include thosedescribed herein and known in the art, including AES, DES, and 3DES. Thekey for post-encryption may be generated by the system, may be providedby a user, or may be provided by an external system, and may includesymmetric or public/private key pairs such as RSA public/private key,DSA public private key, and ECDSA public/private key. Eachpost-encrypted share may also include additional authenticity orintegrity information.

As noted above, pre-encryption process and post-encryption process maybe optional. In addition, because data parsing provided byparse/distribute process 4114 provides security unless all requiredshares are discovered, any encryption performed by the data parser mayalso be optional. Also, any of the encryption processes may be performedon only some portion of the data, e.g., such that only a subset of thedata or shares is encrypted, and thus reduce any burdens of theencryption processes.

FIG. 42 depicts an exemplary secure parser 4200. The secure parser core4202 isolates the functions of data splitting (e.g., share creation,redundancy, and distribution to share buffers) into a callable module.Data may be placed in assembled data buffer 4204 to be split and thesecure parser core 4202 may be invoked. The resulting shares may beplaced into the split share buffers 4206 to be securely stored (storage4216) or transmitted (communications 4218) by the host application.Cryptographic functions may be external calls for the secure parser core4202. This may allow for the custom integration of various cryptographiclibraries, giving flexibility for “bolting on” other encryption modules,key management systems, random number generators, etc. as needed.

Random number generator 4208 may, for each split operation, generate aunique random value to be used as the basis for the split. Randomnumbers may be generated in a number of ways, via software program orhardware interface. AES encryption module 4210 may utilize encryptionsuch as AES-CTR or AES-CBC for encryption operations for the secureparser core 4202. Encryption module 4212 may be an external encryptionprocess that may provide functionality for pre-encrypting data prior tosplitting or post-encrypting data after splitting. Key management system4214 may provide for external key management for keys utilized in theencryption and/or splitting operations of the secure parser.

FIG. 43 depicts an exemplary integration of the secure parser 4308 intoa system 4300 utilizing an Application Programming Interface (API). Asecure parser 4308 may include a secure parser core 4302, split sharebuffers 4310, and assembled data buffer 4312. API/Wrapper Layer 4304 maybe an integration layer that interfaces with an application 4306.API/Wrapper Layer 4304 may define the location of shares, such as pathsto send the information or storage devices to store the shares.API/Wrapper Layer 4304 may also define the naming convention of theresulting data, or parameters to store with the information such as row,column, and table ID in the case of a database application or theoriginal filename in the case of unstructured data such as documents,images, maps, multimedia, or streaming data. API/Wrapper Layer 4304 mayalso handle the streaming of data to the secure parser 4308 and securestorage or communications of the resulting shares.

Application 4306 may select data to be secured and call the secureparser. API/Wrapper layer 4304 may stream input data into assembled databuffer 4312 and save filename and share information relating to thedata. Assembled data buffer 4312 may provide data to secure parser core4302 which may create shares, implement redundancy, and assign shares tolocations for distribution as described herein. The shares to bedistributed may be output to split share buffer 4310 which may providethe shares to API/Wrapper Layer 4304.

The various operations described herein may be chosen to match thethreat and risk scenario for particular data, creating over a thousanddifferent configuration options for a secure parser. Data may bepre-encrypted before it is parsed into shares, and/or post-encryptedafter shares are created. Keys utilized in parsing may be transformedsuch as by the AoNT transform or package transform. Data parsing can beby various techniques such as bit split, block split, bit scatter, bitsegment, block shuffle, or ordered block. The encryption utilized in theparsing technique may include various AES modes as described herein(e.g., AES-CTR) or DES/3DES encryption, and keys used in encryption andor parsing of data may be various lengths such as 128, 296, or 256 bits.Fault tolerance may be implemented in various manners such as N of N, Mof N, or parity. Keys may be secured such as with a Shamir key splittingtechnique or other techniques, including external splitting techniques.Integrity information may be provided and shares may be authenticatedutilizing a hash, a MAC and/or a digital signature.

FIG. 44 depicts an example configuration of a 2 of 3 share faulttolerance system. Data 4408 may be created locally at Site A 4402. Asecure parser may secure and split each block of data 4408 from Site A4402 and distribute 66% of the split data to each of Site A 4402, Site B4404, and Site C 4406. The original data may be recovered from any 2 or3 of shares 4410, 4412, and 4414.

FIG. 45 depicts an example configuration of a 2 of 3 share faulttolerance system with a mandatory share 4512. Data 4508 may be createdlocally at Site A 4502. The secure parser may secure and split eachblock of data 4508 from Site A 4502, store 1% of the data locally atshare 4510, distribute 99% to share 4512 at Site B 4504, and distribute1% to share 4514 at Site C 4506. In order to recover the original data,share 4512 must be recovered from Site B 4504, and either one of share4510 from Site A 4502 or share 4514 from Site C 4506 must be recovered.Data may be recovered to cleartext, e.g., at Site B 4504.

FIG. 46 depicts a flowchart 4600 of aspects of encrypt/transform process4110, key secure process 4112, parse/distribute process 4114, faulttolerance process 4116, and share authentication process 4118. Inputdata 4602 to be split may be received. The received input data 4602 maybe un-encrypted data or may have optionally been pre-encrypted using AESor other encryption techniques as described herein or known in the art.The received input data 4602 may then be encrypted using an encryptiontechnique such as AES. A session key 4604 may be generated using arandom number generator such as a cryptographically secure pseudo-randomnumber generator. In the example of AES encryption, the session key 4604length may be 128, 192, or 256 bits. AES encryption may use any knownAES technique such as AES-ENC or AES DEC, and may operate in any knowncipher mode such as AES electronic codebook (AES-ECB), AES cipher blockchaining (AES-CBC), AES output feedback (AES-OFB), AES Counter(AES-CTR), AES cipher feedback (AES-CFB), or any other cipher mode thatis known in the art.

Depending on the type of AES cipher mode utilized for encryption, inputdata 4602 may be padded until it is equal in size to an integer numberof AES blocks. The padding may consist of a 1-bit followed by 0-bits.The padded input data 4602 may be split into n blocks 4606. Aninitialization vector (IV) may be generated using a cryptographicallysecure pseudo-random number generator, and the n blocks 4606 may then beencrypted with the IV and Key 4604 utilizing known AES cipher modes,e.g., AES-CBC or AES-CTR.

In an exemplary embodiment, AES-CTR mode may use the AES-ENC primitiveto implement a stream cipher. For every 128-bit plaintext block to beencrypted, CTR mode may first generate a 128-bit keystream block bycalling AES-ENC(K, T), where T is a counter value incremented at eachiteration (when T exceeds the maximum counter value, it wraps back to0). The plaintext block may then be encrypted by XORing it with thekeystream block.

CTR-mode encryption may be defined by the following piece ofpseudo-code. K may be an encryption key, and T₀ may be an initialcounter value (Initialization Vector). The plaintext may be representedas a series of 128-bit blocks (M₁, . . . , M_(n)) where M_(j) representsthe i^(th) block of plaintext. AES-CTR may not require plaintextpadding: when the plaintext does not divide perfectly into an integernumber of blocks, then the final block Mn may be a partial block of sizep bits, where p<128. When a p-bit plaintext block is XORed with a normalkeystream block, only the first p bits of the two blocks may beconsidered. The resulting ciphertext may be represented as a series ofblocks (C₁, . . . , C_(n)) along with the initial counter value T₀. Toencrypt a message using AES-CTR:T=T ₀For I=1 to nC _(i) =M _(i) XOR AES-ENC(K,T)T=T+1

CTR-mode decryption may be identical to encryption, except that thetechnique operates on ciphertext blocks. To correctly decrypt a CTR-modeciphertext (T0, C₁, . . . , C_(n)), compute:T=T ₀For I=1 to nC _(i) =M _(i) XOR AES-ENC(K,T)T=T+1

CTR mode encryption may require that the 128-bit initial counter valueT₀ be initialized to any value between 0 and 2¹²⁸−1 inclusive. Thedefault value for T₀ may be 0. This counter may be subsequentlyincremented for each 128-bit block encrypted or decrypted (if thecounter exceeds 2¹²⁸−1, it wraps back to 0). To ensure the security ofCTR-mode encryptions, it may be necessary that no value of T ever bere-used without re-keying. The technique of choosing the initial countermay be dependent on the implementation.

CTR mode may be parallelized across multiple processes or processors:after selecting an initial counter T₀, the plaintext may be divided intoseparate segments and encrypted separately, provided that eachencryption process is given the correct counter offset for the firstblock it encrypts.

In another exemplary embodiment, AES-CBC mode may use the AES-ENC andAES-DEC primitives to encrypt/decrypt multi-block plaintexts. Inaddition to the encryption key K, CBC mode may require a 128-bitInitialization Vector (IV), denoted by T_(o). Note that for security,this Initialization Vector may be 1) unique for each message encrypted,and 2) generated using a cryptographically-secure random numbergenerator. AES-CBC mode may require that the plaintext consist of aneven number of AES blocks, i.e., is a multiple of 128-bits. When this isnot the case, the plaintext may be padded by appending a 1 followed byas many 0s as necessary to reach a block boundary. If there isinsufficient room to insert the shortest unambiguous padding sequence“10”, an additional plaintext block may be added.

AES-CBC may compute each ciphertext block by XORing a plaintext blockwith the previous ciphertext block, then encrypting the result usingAES-ENC. In the case of the first ciphertext block, the InitializationVector T₀ replaces the previous ciphertext value. CBC-mode encryptionmay be defined by the following piece of pseudo-code. The plaintext maybe represented as a series of 128-bit blocks (M₁, . . . , M_(n)) whereM_(i) represents the i^(th) block of plaintext. The resulting ciphertextmay be represented as a series of blocks (C₁, . . . , C_(n)) along withthe Initialization Vector T₀. To encrypt a message using AES-CBC:C ₁=AES-ENC(K,M ₁ XOR T ₀)For i=2 to nC _(i)=AES-ENC(K,M ₁ XOR C _(i−1))

To correctly decrypt a CBC-mode ciphertext (T₀, C₁, . . . , C_(n)),compute:M ₁=AES-DEC(K,C ₁) XOR T ₀For i=2 to nM _(i)=AES-DEC(K,C ₁) XOR C _(i−1)

Once the AES encryption is completed, the n encrypted blocks 4608 maythen be recombined, with the IV prepended, to be passed to the splittingtechnique 4610. Before splitting occurs, a meta-data block may also bepre-pended to indicate information such as file length, encryption mode,key size, share ID, L/M/N share values, encryption key ID, encryptionIV, hash mode, original buffer size, share buffer size, pre-encryptionkey ID, pre-encryption IV, pre-signature ID, pre-signature IV, and aflag indicating whether the a key transform such as package or AoNTtransform was used to process the key 4604. The data (including IV andmetadata) may then be split for distribution to the shares 4614 inaccordance with a splitting technique such as bit split, block split,bit segment, or bit scatter as described herein.

The session key 4604 may optionally be transformed into transform key4612 such as through a AoNT or a package transform. In the example of apackage transform, the session key 4604 may be XORed with the nencrypted blocks 4608, resulting in a transform key 4612 that cannot berecovered without also recovering all of the n encrypted blocks. Thesession key 4604 (if no transform takes place) or transform key 4612 maythen be split using the Shamir technique or other key-splittingtechniques that are well known in the art. For example, the Shamirtechnique may create L+1 shares, where L is the number of mandatoryshares of shares 4614. Each of the L shares may then be distributed to acorresponding mandatory share of shares 4614. The remaining share maythen be split into N shares of shares 4614 and distributed in a mannersuch that the remaining share can be recovered from any M of N shares ofshares 4614 as may be required for the particular application. Thesession key 4604 (if no transform takes place) or transform key 4612 maythen be optionally held as a session key, encrypted such as with apublic key, or discarded.

Once the data and/or key has been split for distribution to the shares4614, each resulting share may further implement integrity protection.As one example, a collision resistant cryptographic hash function(implemented by SHA-256) using hash-tree construction may be used tocompute an integrity protection value. A hash value may be calculatedfor each share using a hashing technique such as SHA-256. If the totalnumber of shares is less than 8, the hash values for all shares may beconcatenated and the concatenated result may be stored with each of theshares. If there are 8 or more shares, the integrity protection valuemay be computed by the following steps:

-   -   1. Pre-pend 0x00 to each share, and compute a hash value        H(0x00|SHARE) for each share;    -   2. Compute a hash value H(0xFF|A|B) for each consecutive pair of        shares, where A and B are the respective outputs of step (1) for        each share (e.g., A=H(0x00|SHARE_(x)); B=H(0x00|SHARE_(x+1)). If        the total number of shares is odd, compute a hash value for the        final share for (0xFF|A), where A=H(0x00|SHARE_(FINAL)).    -   3. Repeat step (2) on the resulting hash values, until only a        single hash result (the hash tree root) remains;    -   4. Distribute to each share SHARE, the hash of        SHARE_(i)(H(SHARE_(i))), the tree root, and up to one value from        each level of the tree (i.e., iteration of steps (2) & (3)), as        necessary to calculate the tree root from H(SHARE_(i)).

The resulting integrity protection values may be appended to thecorresponding share data. Because all hash values are provided to allshares (n<8) or a hash tree is provided (n≥8), The integrity protectionas described herein embeds with each share integrity check informationabout other shares. Thus, if the integrity of any one share in a set isknown to be authentic, the integrity of the remaining shares may beevaluated based on the integrity check information of the authenticshare.

The resulting share (including the integrity protection value) mayoptionally be authenticated (e.g., creating a MAC as described herein)and signed (e.g., a digital signature as described herein). Theresulting information may optionally be post-encrypted, for example,using AES or other encryption techniques as described herein and knownin the art. The resulting encrypted share may then be distributed, suchas to shares for storage or to protect data in motion.

Data may be recovered from shares (e.g., accessed from storage in sharesor received as data in motion) according to the steps of FIG. 47. Someor all of shares 4702 may be recovered. If the data was post-encryptedprior to distribution to the shares 4702, the data may be decryptedprior to data recovery as described herein. If a share was signed with adigital signature, or includes a MAC, the signature and/or MAC may beconfirmed as described herein.

Each share may have stored a hash value for integrity protection asdescribed above. To confirm the integrity of a received share, a hashvalue may be computed based on the received data (SHARE_(i)) pre-pendedwith 0x00, in the same manner as was performed to create the integrityprotection value. If the computed hash value from the received SHARE,data does not match the hash value stored with the share SHARE_(i), thenthe integrity of SHARE, has been compromised and data recovery should beaborted.

If the total number of shares is less than 8, the computed hash valuefor SHARE, may also be compared against the stored hash value forSHARE_(i) stored in other shares. If the computed hash of SHARE, failsto match any stored hash of SHARE_(i), the data recovery should beaborted. This step of checking a computed hash of SHARE; against allother stored hashes of SHARE, may be repeated for all shares. If thetotal number of shares is 8 or more, then the root of the hash tree maybe determined from the computed hash of SHARE; along with theinformation stored with the share. This determination may be repeatedfor each share, and if the hash tree root determined for any individualshare does not match, the data recovery may be aborted.

A key 4706 may be recovered from shares 4702 if all mandatory shares areavailable as well at least M of N non-mandatory shares. The split datafrom the shares 4702 may be recovered by recovery technique 4704utilizing the appropriate recovery technique associated with thedata-splitting technique used to create the shares, e.g., bit split,block split, bit segment, or bit scatter as described herein. Datarecovered by recovery technique 4704 may include the AES-encrypted dataand the initialization vector.

If a transform such as a package transform or AoNT was used to protectthe original session key, the session key 4708 may be recovered from thekey 4706 by reversing the transform process. In the example of a packagetransform, the encrypted data portion of the recovered data fromrecovery technique 4704 may be split into blocks 4710 of equal length tothe key 4706 and XORed with the key 4706 to create the session key 4708.The session key 4708 and initialization vector may then be used asinputs to decrypt the data as data blocks 4712 which may be combined asdata 4714. Any padding that was originally necessary to match the datato the AES block size may be discarded. If data 4714 was pre-encrypted,decryption may be performed as described herein.

A Parsed File System (PFS) is a distributed file system whichincorporates a directory, shared among file servers, which is itselfparsed. The PFS directory is the clients' view of all file assets. Theset of files visible to an individual client is controlled by thatclient's group keys. The PFS may maintain a directory that containsinformation about the locations of the shares (for example, the fileserver location) and the names of the files at the share locations thatinclude the share data. The PFS directory may store information aboutfiles including M of N properties, URLs or other globally uniqueidentifiers (GUID) of the shares, a key-id of the key that was used toparse the file, client access times of the key referenced by the key-id,validity check data, and any other data relating to the clients, users,files, or shares. This PFS directory of files may itself be parsed toprevent unauthorized access. The directory data may be parsed withseparate, replaceable group keys to allow keys to be rescinded andreplenished as necessary (for example, when there are personnel changesor suspected security breaches).

The underlying distribution of shares may be hidden from users/clientsby the PFS such that files appear as a file storage system based on thePFS directory. The PFS provides an interface that allows users to accessparsed files without knowledge of the location of shares. Clientsworking on a device may enter login credentials. Each client may havegroup keys associated with that user's login credentials, the group keysdetermining which files within the directory a client may access. Anexample set of group keys that might be suitable for a governmentapplication may include unclassified, secret, top secret, special 1,special 2, and special 3. Similar group key categories could be set upfor various entities based on the shared interests, credentials,position, or other characteristics of the groups. A data set such as afile or a group of files may be associated with a group key. Based onthe group keys available to a user, a user may be able to access filesassociated with that group key. For example, the PFS may display onlyunclassified files in the directory when the PFS is accessed by a userwith only unclassified clearance. Each client may access any files thatare authorized by workgroup keys held by that client. Workgroups may betiered such that a higher classification or clearance level allowsaccess to all lower classification or clearance levels. For example, auser with a top secret workgroup key may receive access to all topsecret, secret, and unclassified files.

The PFS may also monitor events relating to file access and usage. Forexample, the PFS may audit any file open and close operations as well asany attempts to modify data or move data between files. The auditingprocess may monitor any attempts to move data from a higher securitylevel to a lower security level. One example of a data monitoringtechnique is to create a signature of any data that is read from a file(e.g., a cut or copy operation). Signature generators may be availablefor different file types such as .txt, .wrd, .doc, .xls, .jpg, etc.through a plug-in interface. The signature may be stored by the PFS witha file's group key until all of the following are met: 1) the file isclosed; 2) all processes running when the file was opened areterminated; and 3) all processes which were started after the file wasopened but while there was data in the clipboard are terminated. If anattempt to move information from a higher security level to a lowersecurity level is detected, the client may be told that the data will besequestered for declassification review and may be asked whether theywish to continue the operation. If the user does complete the operation,the data may be sequestered for review by an appropriate party such asan administrator. An exemplary use case for the PFS is outlined below:

1) USER1 logs in to the network and is granted {USER1,SAP1, SECRET,UNCLASS} keys.

2) USER1 opens Notepad and types “The quick fox jumped over the lazybrown dog.”

3) USER1 saves the file as TEST1.TXT.

4) A dialog box appears asking what secure parser group key should beused: USER1, SAP1, SECRET, or UNCLASS.

5) USER1 chooses SECRET and TEST1.TXT is saved.

6) USER2 logs in and is granted {USER2, UNCLASS} keys.

7) TEST1.TXT is not visible when USER2 opens Explorer.

8) USER3 logs in and is granted {USER3, TS_SCI, SAP1, SECRET, UNCLASS}keys.

9) USER3 sees TEST1.TXT and opens it.

10) USER3 copies “quick fox” to clipboard.

11) USER3 pastes clipboard (“quick fox”) to a new file.

12) USER3 saves the new file as TEST2.TXT and picks the UNCLASS groupkey.

13) A warning dialog box appears with the message “TEST2.TXT will besequestered for declassification review.”

14) USER3 cancels the warning—the new file is not saved.

15) USER3 saves TEST2.TXT using SAP1 key. Since SAP1 includes SECRET,which was TEST1.TXT's key, no warning is issued.

16) USER1 sees and reads TEST2.TXT (since he has the SAP1 key), butUSER2 cannot.

17) USER3 copies/pastes “brown dog” to a new file and saves the new fileas TEST1.TXT using key UNCLASS.

18) The declassification warning appears and USER3 OKs it.

19) ADMIN logs in and is granted all keys.

20) ADMIN receives a message to review TEST3.TXT for possibledeclassification.

21) ADMIN shows Details>>>File TEST3.TXT, written by USER3 using keyUNCLASS. It contains “brown dog”, which may have been copied fromTEST1.TXT (key SECRET).

22) ADMIN OKs the save.

23) USER1, USER2, and USER3 all see and can access TEST3.TXT.

A secure parser may also be implemented at the device driver level. Anexemplary device driver level implementation may be a parsed fabric,wherein specific logical unit numbers (LUNs) or drives are parsed. Inthe parsed fabric environment, any applications and servers may accessand store files to the LUN or drive and issue commands as if the datawere stored at the LUN or drive. The secure parser may access a keymanager and LUN map which includes a mapping from application visibleLUNs to the split physical location of the corresponding shares. Theparsed fabric option may allow application and operating system softwareto operate normally because the parsing is transparent to the programswhich can read and write to the LUNs.

A secure parser may also be implemented at the host bus adapter (HBA)level or the switch level. HBA and switch level implementations may betransparent to the existing software and file systems. HBA and switchlevel implementations may offload parsing, distribution, and LUNprocessing from the servers or file system.

A secure parser may also be implemented within applications, such asthrough custom integration into the application. A secure parser may beimplemented through APIs, function calls, libraries, etc., e.g., asdescribed with respect to FIGS. 30-32 and 42-43, to allow applicationsto directly or indirectly utilize the functionality of a secure parserto store, access, or communicate data.

Although a number of specific implementation points have been described,the secure parser may be implemented at any level or device, such asapplication servers, storage fabric switches and directors, storagearrays, tape devices, virtualization abstraction layers, remotemirroring/replication storage applications, routing and communications,backup and recovery software, storage management software andinterfaces, remote storage management access points, notebook computers,storage network management software or storage MAN/WAN connectivity. Forexample, the secure parser may be implemented at the application levelsuch as in database software to create hardware-independentimplementations, at the SAN controller lever to create disk andapplication independent implementations, at the switch or router levelsuch as in the router IOS to create hardware and software independentimplementation, or at the embedded hardware or controller level forapplication independent implementations.

An exemplary API may provide an interface for developing applicationsfor use with a secure parser. The API may include setup files, installerprograms, dynamic link libraries, header files, standard libraries suchas C++ libraries, visual C++ project files, executables, source code, aReadMe file, a test harness program, and/or additional or similar filesas necessary for a particular platform. The secure parser may utilizeseveral data types and structures, such as those depicted in the tablebelow:

Type Description Parser Structure for holding the state and associatedI/O data. Key Structure for holding a generic key. Share Structure forholding a generic buffer. ParserParams Structure for holding parserparameters. HeaderInfo Structure for holding header information.FooterInfo Structure for holding footer information. EncContextStructure for storing various encryption contexts. SigContext Structurefor storing various signature contexts. HashingContext Structure forstoring various hash contexts. SplitContext Structure for storing thesplit context. ERROR_TYPE Enumerator indicating a specific error type.SPLIT_TYPE Enumerator identifying the type of split algorithm toutilize. ENC_TYPE Enumerator identifying the encryption mode to use.AUTH_TYPE Enumerator identifying the authentication mode to use.HASH_TYPE Enumerator identifying the hashing mode to use. TRANFORM_TYPEEnumerator identifying the transform type to use. KEY_TYPE Enumeratorindicating a specific key type. uint8 An unsigned 8 bit integer. uint16An unsigned 16 bit integer. uint32 An unsigned 32 bit integer.

As is depicted in FIG. 48, Panel A, and FIG. 48, Panel B, variousenumerators may indicate parameters used in parsing operations such asoperating modes, encryption techniques, etc. For example, encryptiontype 4802 options may include no encryption, AES 128 bit in CTR mode,AES 192 bit in CTR mode, AES 256 bit in CTR mode, AES 128 bit in CBCmode, AES 192 bit in CBC mode, AES 256 bit in CBC mode, or 3DES in CBCmode. Authentication type 4804 options may include a RSA-PSS technique,a DSA digital signature technique, a ECDSA elliptical curve digitalsignature technique, or a HMAC-SHA1 symmetric Message AuthenticationCode. Hash type 4806 options may include no hashing technique orSHA-256. Split type 4808 options may include no split, block level splitas determined by the splitting technique, byte level split, bit levelsplit, or bit scattering. Key type 4810 options may include symmetrickeys, RSA public key, RSA private key, DSA public key, DSA private key,ECDSA public key, or ECDSA private key. Error type 4812 options mayinclude no error, no master key, invalid callback, invalid parse splittechnique, no target set to parse, target buffer has no length, unableto restore because not enough shares are present, invalid share was set,invalid key was set, an integrity check failure occurred, or out ofmemory.

FIG. 49, Panel A and FIG. 49, Panel B depict data structures for theparser, keys and shares. Parser data structure 4902 may includeinformation related to the data to be split and the splitting process,such as originalShare, shares, shareCount, splitEncContext, andfinalFlag. ParserParams data structure 4904 may include informationrelating to the parameters used in the parsing process, such as L (# ofmandatory shares), N (total # of non-mandatory shares), M (# ofnon-mandatory shares necessary to recover data), splitType,splitEncMode, preEncMode, postEncMode, splitHashMode, preAuthMode,preEncKey, postEncKey, preAuthKey, postAuthKey, maxOrigBufSize, andmaxShareBufSize.

KeyId data structure 4906 may include information for identifying a key,such as id and idLen. KeyShare data structure 4908 may includeinformation relating to the key share data for a share, such as a datafield and dataLen. Key data structure 4910 may include additional keyinformation, including keyID (of type keyID 4906), type, data, anddataLen. Share data structure 4912 may include information relating tothe status of a share, including data, dataLen, encContext, authContext,and hashContext.

FIG. 50, Panel A and FIG. 50, Panel B depict data structures relating toencryption, authentication, and hashing functionality. EncContext datastructure 5002 may be utilized in various other data structures, and mayinclude information relating to the type of encryption being used andencryption contexts as described below. EncContext_AESCBC data structure5004 may include information relating to AES-CBC encryption, includingencKeyld, currentIV (initialization vector) and currentIVLen.EncContext_AESCTR data structure 5006 may include information relatingto AES-CTR encryption, including encKeyld, currentIV (initializationvector) and currentIVLen.

AuthContext data structure 5008 may include information relating to thetype of authentication being used and information relating to thevarious authentication contexts as described below. AuthContextRSAPSSdata structure 5010 may include information relating to a RSA_PSSdigital signature, including a pubKeyId, privKeyId, and hashContext.AuthContext DSA data structure 5012 may include information relating toa DSA digital signature, including a pubKeyId, privKeyId, andhashContext. AuthContext_ECSA data structure 5014 may includeinformation relating to a ECDSA digital signature, including a pubKeyId,privKeyId, and hashContext. AuthContext_HMACSHA1 data structure 5016 mayinclude information relating to a HMAC-SHA1 type MAC, including amacContext pointer to the OpenSSL mac context data type.

hashContext data structure 5018 may include information relating to thetype of hashing being utilized, such as a hashMode and any appropriatehash contexts. An example of hash context may be HashContext_SHA datastructure 5020 which may include a pointer to the OpenSSL hash contextdata type.

FIG. 51, Panel A and FIG. 51, Panel B depict data formats includingshare data 5102, post-encrypted footer 5104, post-encrypted header 5106,and encrypted footer 5108. Share data 5102 may include a post-encryptionkey id, post-signature key id, post-encrypted header 5106,post-encrypted footer 5104, and post-signature data. Post-encryptedfooter 5104 may include encrypted footer 5108. Encrypted footer 5108 mayinclude split-hash data, and pre-signature data. Post-encrypted header5106 may include a key share, share id, L, M, N, split mode,split-encryption key, split-encryption IV, split-hash mode, originalbuffer, share buffer, pre-encryption key, and pre-signature key.

The secure parser API may include a function library with variousfunctions as depicted in FIG. 52A, Panel A, FIG. 52A, Panel B, FIG. 52B,Panel A, and FIG. 52B, Panel B. A number of functions may relate toinitializing and ending parser operations. A parser_createParserfunction 5202 may be called to allocate a secure parser context and setdefault values for the parser, while a parser_destroyParser function5204 may be passed a Parser data structure and may destroy the secureparser context, including parser parameter objects and share buffers. Aparser_createKey function 5206 may construct the key structure, while aparser_destroyKey function 5208 may destroy the key. Aparser_createShare function 5210 may create a share data structure foruse with the secure parser, while a parser_destroyShare function 5212may destroy a share, including all encryption and authentication keys. Aparser_initParameters function 5214 may initialize the ParserParams datastructure to the default parameter set, while a parser_setParameters5216 may set any ParserParames settings for the current Parser datastructure. A parser_setFinalize function 5218 may set the internal stateof the Parser to finalize the output stream during the next splitsession.

Other functions may relate to the creation and splitting of shares, andthe creation of the headers and footers associated with shares.parser_getOriginalShare function 5220 may return a share structurerepresenting the original buffer used by the Parser. parser_getSharefunction 5222 may return a share containing the share structure for ashare matching a share ID. parser_doSplit function 5224 may perform thesecure parser split. parser_doRestore function 5226 may restore sharesinto reconstructed original data, while parser getRestoreStatus function5236 may return the status of the prior restore process.parser_generateHeaders function 5228 and parser_generateFooters function5230 may generate header and footer information, whileparser_restoreHeaders function 5232 and parser_restoreFooters function5234 may restore header and footer information from shares.

parser_generateHeaders function 5228 may generate share headerinformation for each share based on any meta-data that must necessarilybe communicated to the secure parser when later performing a restoretechnique. The header information may only contain data that isavailable to the secure parser prior to the start of the data splittingprocess. The parser generateHeaders routine creates the header blocksfor each share and places them within each Share buffer. A call toparser_generateHeaders may be made prior to any calls to parser_doSplit.The parser_generateHeaders function involves the following steps:

1. Split key using Shamir splitting algorithm.

2. Create a temporary buffer.

3. For each share . . . .

-   -   3.1 Include key share information in temporary buffer.    -   3.2 Include share ID in temporary buffer.    -   3.3 Include L, M and N in temporary buffer.    -   3.4 Include split mode in temporary buffer.    -   3.5 Include split-encryption key ID in temporary buffer.    -   3.6 Include split-encryption IV in temporary buffer.    -   3.7 Include split-hash mode in temporary buffer.    -   3.8 Include original buffer size in temporary buffer.    -   3.9 Include share buffer size in temporary buffer.    -   3.10 Include pre-encryption key ID in temporary buffer.    -   3.11 Include pre-encryption IV in temporary buffer.    -   3.12 Include pre-signature key ID in temporary buffer.    -   3.13 Include pre-signature IV in temporary buffer.    -   3.14 Replace key share information in temporary buffer with        Share i's key share.    -   3.15 Replace share ID in temporary buffer with Share i's ID.    -   3.16 Begin split-hash on the data in temporary buffer and store        context for later.    -   3.17 Encrypt temporary buffer with post-encryption key and        post-encryption IV and include resulting ciphertext in Share is        output buffer. Maintain i's post-encryption context for later        use.    -   3.18 Begin post-signature on Share i's output buffer and store        context for later.

The parser_doSplit function 5224 may split all data from the targetbuffer into share buffers to be later handled by the calling function. Aseries of steps may be taken to provide confidentiality, integrity,authenticity and data partitioning for the data that is split, beforeand after the data is split. These steps may include:

1. Test if pre-encrypt is on.

If Yes,

1.1 Encrypt target buffer under pre-encrypt key and pre-encrypt IV.

2. Test if pre-sign is on.

If Yes,

2.1 Sign target buffer under pre-sign key.

2.2 Test if finalize has been set.

-   -   If Yes,    -   2.2.1 Finalize pre-signature context.

3. Do split-encryption using split-encryption context. (Should beinitialized during the first call to this function.)

4. Call appropriate split algorithm . . . .

5. Test if hashing is on.

If Yes,

5.1 For each output share . . . .

-   -   5.1.1 Continue hash for share i's buffer.

6. Test if post-encrypt is on.

If Yes,

6.1 For each output share . . . .

-   -   6.1.1 Encrypt share is buffer using share i's post-encryption        key and post-encryption context.

7. Test if post-sign is on.

If Yes,

7.1 For each output share . . . .

-   -   7.1.1 Continue signature for share i's output buffer under share        i's post-signature context.

parser_generateFooters function 5230 may generate share footerinformation for each share based on any meta-data that must necessarilybe communicated to the secure parser when later performing a restoretechnique. The footer information may typically only available to thesecure parser after the body of the data has been parsed. Theparser_generateFooters routine creates the footer blocks for each shareand places them within each Share buffer. parser_generateFooters may becalled following all calls to parser_doSplit and parser_setFinalize.parser_generateFooters function 5230 may perform the following steps:

1. Create temporary buffer 1 for unencrypted footer information.

2. Create temporary buffer 2 for partially encrypted footer information.

3. For each share . . . .

-   -   3.1 Include pre-signature data in unencrypted buffer.    -   3.2 Encrypt temporary buffer 1 using split-key and        split-encryption context and include resulting ciphertext in        temporary buffer 2.    -   3.3 Continue split-hash data in temporary buffer 2.    -   3.4 Include split-hash data in temporary buffer 2.    -   3.5 Encrypt temporary buffer 2 using share i's post-encryption        key and post-encryption context and place resulting ciphertext        in share i's output buffer.    -   3.6 Continue post-authentication signature over share i's output        buffer using share i's post-signature context.    -   3.7 Finalize share i's post-signature context.    -   3.8 Include share i's post-signature in share is output buffer.

parser_restoreHeaders function 5232 may restore header information foreach share based on any meta-data that was stored by the secure parserfor later restoration. The header information may contain data that isrequired for future calls to the parser_doRestore process to functionproperly. The parser_restoreHeaders routine may require that the headerblocks for each share be placed within each Share buffer. A call toparser_restoreHeaders may be made prior to any calls toparser_doRestore. Steps of parser_restore headers function 5232 mayinclude the following:

-   -   1. For each share . . . .        -   1.1 Create a temporary buffer for share i.        -   1.2 Begin signature over share i's buffer using share i's            post-signature key and post signature IV. Maintain            post-signature context for share i.        -   1.3 Decrypt share i's buffer using share i's post-encryption            key and post-encryption IV and place contents into share i's            temporary buffer.        -   1.4 Recover key share information for share i from share i's            temporary buffer.        -   1.5 Test if this is share 0.            -   If no,            -   1.5.1 Compare share i's header information in temporary                buffer with share 0's header information in temporary                buffer. If there is a mismatch, return an error.    -   2. Recover split-encryption key, based on all key share        information in each share's temporary buffer.    -   3. Recover parser state based on header information found in        share 0's temporary buffer.

parser_doRestore function 5226 may restore all shares to their originalsingle source. A series of steps verify that the data has not beentampered with before and after data restoration has completed. Steps forparser_doRestore function 5226 may include the following:

-   -   1. Test if post-sign is on.        -   If Yes,        -   1.1 For each output share . . . .            -   1.1.1 Sign share i's output buffer under share i's                post-signature key.    -   2. Test if post-encrypt is on.        -   If Yes,        -   2.1 For each output share . . . .            -   2.1.1 Decrypt share i's buffer using key post-decrypt i                and IV i.    -   3. Test if hashing is on.        -   If Yes,        -   3.1 For each output share . . . .            -   3.1.1 Continue hash for share i's buffer.    -   4. Call appropriate restore algorithm.    -   5. Do split-decryption using split-decryption key and        split-decryption context. (Should be initialized during first        call to this function.)    -   6. Test if pre-sign is on.        -   If Yes,        -   6.1 Sign original buffer under pre-sign key using            pre-signature context or pre-signature IV.        -   6.2 Test if finalize has been set.            -   If Yes,            -   6.2.1 Finalize pre-signature context.    -   7. Test if pre-encrypt is on.        -   If Yes,        -   7.1 Decrypt original buffer under pre-decryption key.

parser_restoreFooters function 5234 may restore footer information foreach share based on any meta-data that was stored by the secure parserfor later restoration. The footer information may contain data that isneeded for valid completion of the restore process. Theparser_restoreFooters routine may require that the footer blocks foreach share be placed within each Share buffer. A call toparser_restoreFooters may be after all calls to parser_doRestore andparser_setFinalize. Steps for parser_restoreFooters function 5234 mayinclude the following:

1. Create a temporary pre-signature buffer.

2. For each share . . . .

-   -   2.1 Create a temporary buffer for share i.    -   2.2 Continue post-signature over share i's buffer using share        i's post-signature key and post-signature context.    -   2.3 Finalize share i's post-signature context.    -   2.4 Compare share i's post-signature result with expected        post-signature result and return an error on mismatch.    -   2.5 Decrypt share i's buffer using share i's post-decryption key        and post-decryption context and place contents into share i's        temporary buffer.    -   2.6 Continue split-hash over share i's encrypted footer portion        of share i's temporary buffer using share i's split-hash        context.    -   2.7 Finalize share i's split hash context.    -   2.8 Compare share i's split-hash result with expected split-hash        result found in remaining portion of share i's temporary buffer        and return an error on mismatch.    -   2.9 Decrypt the footer portion of share i's temporary buffer        using the split-decryption key and split-decryption context and        place resulting plaintext in to the temporary pre-signature        buffer.    -   2.10 Compare temporary pre-signature buffer with finalized        pre-signature result and return an error on mismatch.

FIG. 53 depicts an exemplary implementation of a secure parser within ahardware system such as a data storage control node. The secure parsermay operate on a processor 5302. The secure parser may be incommunication with various forms of internal memory such as SDRAM (e.g.,5304), hard drives (e.g., 5310), and flash memory (e.g., 5306). Thesecure parser may also be in communication with other internal circuitryand functionality and may also communicate over networks, e.g.,utilizing Ethernet connectivity 5308.

FIG. 54 depicts an exemplary implementation of a secure parser for datamasking. It may be desirable to store certain information of a set ofinformation securely. For example, a healthcare record for an individualmay include less sensitive information such as name, address, height,and weight. The healthcare record may also include sensitive informationsuch as a social security number 5404, medical ID number 5406, andemployer phone number 5408. The less sensitive information may be storedlocally, e.g., at local server 5402. The sensitive information 5404,5406, and 5408 may be parsed and distributed to multiple locations,e.g., to local server 5402 and remote servers 5410 and 5412.

FIG. 55 depicts an exemplary data record in a data maskingimplementation. As described above, the local server may not have localaccess to records that have been parsed and distributed to multiplelocations, and thus the sensitive records 5502, 5504, and 5506 may notbe visible. To the extent that local information 5508 relating to thesensitive records exists, it may not be in a human readable form.

An exemplary set of workgroup keys is depicted in FIG. 56. For example,four groups may include top secret/sensitive compartmented information(TS/SCI) 5602, secret 5604, secret SAP 5606, and coalition 5608. Eachgroup may include a plurality of users who are associated with thatgroup. When a user logs into the system from a device, the login mayinclude credentials, username, password, or other authenticatinginformation that provides access to one or more workgroup keysassociated with one or more of workgroups 5602, 5604, 5606, and 5608.

Accordingly, if the login credentials match a member of an appropriategroup, the user may access parsed files, drives, and data associatedwith that workgroup, or in some embodiments any information associatedwith groups having a lower classification.

FIG. 57 depicts the use of workgroup keys in an example application ofmilitary use. Command operations headquarters 5702, deployedheadquarters 5706, tactical team 5708, and tactical base 5710 may allhave access to information stored as described herein via a satellitelink 5704. Data may be stored at one or more of locations 5702, 5706,5708, and/or 5710, as well as additional offsite storage locations. Datamay be stored in distributed shares as described herein and/or may betransmitted on satellite link 5704 as shares as described herein.Individuals located at locations 5702,5706, 5708, and/or 5710 may submitlogin credentials to gain access to information associated with one ormore of workgroup keys TS/SCI, secret, secret SAP, or coalition.

Workgroup keys may be implemented as in a MLS solution as depicted inFIG. 58. Example workgroup keys may include TS/SCI 5802, secret 5804,coalition 5806, and unclassified 5808. The types, names, and number ofworkgroups are exemplary only, and may be modified based on theparticular application. Workgroup keys may be managed and stored asdescribed herein (e.g., locally, remotely, in shares). Clients mayaccess information associated with a workgroup through a parser server5812.

Parser server 5812 may include one or more servers, and may includeclient partition 5814, TS/SCI partition 5816, secret partition 5818,coalition partition 5820, and unclassified partition 5822. Partitionsmay be based on workgroup keys and may be logical, or as in the exampleof FIG. 58, may be physical. Client-facing aspects of the parser servermay be implemented at client partition 5814. Client partition 5814 mayalso interface with local storage area network 5824, which may providestorage of information for parser server 5812.

A secure parser may support backup applications. For example, aconventional file system may be maintained while a backup of the filesis parsed to multiple backup locations in accordance with the presentinvention. For backup applications parsing may provide additionalsecurity as well as redundancy through M on N parsing. A backupapplication may also utilize one or more mandatory shares whilemaintaining M of N parsing for the non-mandatory shares. It may also bepossible to use public key cryptography to further secure backup data.Any storage operations for backup data may utilize a public key toencrypt the data. Only the holder of the private key may recover thebackup data.

A secure parser may also be used for secure deletion of data. When oneor more mandatory shares are utilized in the splitting and distributionprocess, the underlying data may not be recoverable without all of themandatory shares. The permanent deletion of any mandatory shares maytherefore result in the effective deletion of the underlying data.

A secure parser may also be used to create flexible security policies.For example, utilizing an M-of-N data split, a backup operator mayproduce N shares (e.g., as backup tapes), with each accessible todistinct individuals or departments. A quorum of M individuals maytherefore be required to combine their shares to reconstruct data.

An embodiment of the present invention for a backup application isdepicted at FIG. 59. Server 5902 and server 5904 may be MSCS clusteredservers running an application. Servers 5902 and 5904 may each include aLUN map associating a LUN with shares used for storage of parsed drives,files, or other data. Each of server 5902 and 5904 may be incommunication with key manager 5906 to access keys for encryption andparsing of data. Parser enabled HBA 5908 may implement parsing,distribution, recovery, and access of parsed data to shares 5912 and5914 as provided in the LUN map of server 5902. Communication betweenHBA 5908 and shares 5912 and 5914 may be implemented through storagearea network (SAN) 5920. Parser enabled HBA 5910 may implement parsing,distribution, recovery, and access of parsed data to shares 5916 and5918 as provided in the LUN map of server 5904. Communication betweenHBA 5910 and shares 5916 and 5918 may be implemented through SAN 5922.

Backup protection may be provided by SafeGuard appliance 5924 andSafeGuard appliance 5926. As depicted in FIG. 59, SafeGuard appliance5924 may capture parsed data that is written to shares 5912 and 5914 androute complete copies of the parsed data for storage at shares 5916 and5918 through SafeGuard appliance 5926 and SAN 5922. Similarly, SafeGuardappliance 5926 may capture parsed data that is written to shares 5916and 5918 and route complete copies of the parsed data for storage atshares 5912 and 5914 through SafeGuard appliance 5924 and SAN 5920. Inthe event of a disaster or other event, the data split between shares5912 and 5914 may be fully recovered from shares 5916 and 5918.Similarly, the data split between shares 5916 and 5918 may be fullyrecovered from shares 5912 and 5914.

An embodiment of the present invention for backup applications isdepicted at FIG. 60. Server 6002 and server 6004 may be MSCS clusteredservers running an application. Server 6002 may be in communication withparser enabled switch 6006 and server 6004 may be in communication withparser enabled switch 6008. Each of parser enabled switch 6006 and 6008may be in communication with key manager/LUN map 6010. Key manager/LUNmap 6010 may provide access to keys for encryption and parsing of data,and a LUN map associating a LUN with shares used for storage of parseddrives, files, or other data. Parser enabled switch 6006 may implementparsing, distribution, recovery, and access of parsed data to shares6012 and 6014 as provided in the key manager/LUN map 6010. Communicationbetween parser enabled switch 6006 and shares 6012 and 6014 may beimplemented through storage area network (SAN) 6020. Parser enabledswitch 6008 may implement parsing, distribution, recovery, and access ofparsed data to shares 6016 and 6018 as provided in the key manager/LUNmap 6010. Communication between parser enabled switch 6008 and shares6016 and 6018 may be implemented through SAN 6022.

Disaster recovery protection may be provided by SafeGuard appliance 6024and SafeGuard appliance 6026. As depicted in FIG. 60, SafeGuardappliance 6024 may capture parsed data that is written to shares 6012and 6014 and route complete copies of the parsed data for storage atshares 6016 and 6018 through SafeGuard appliance 6026 and SAN 6022.Similarly, SafeGuard appliance 6026 may capture parsed data that iswritten to shares 6016 and 6018 and route complete copies of the parseddata for storage at shares 6012 and 6014 through SafeGuard appliance6024 and SAN 6020. In the event of a disaster or other event, the datasplit between shares 6012 and 6014 may be fully recovered from shares6016 and 6018. Similarly, the data split between shares 6016 and 6018may be fully recovered from shares 6012 and 6014.

A secure parser may include a variety of techniques such as FIPSstandard techniques for managing keys. These include systems forencrypting key data, use of protected memory for key material, and“split-knowledge” techniques which allow keys to be safely divided amongmultiple participants. Authenticated key agreement techniques may alsobe provided to rapidly establish connections between secure parsermodules in a manner that is compliant with industry standards such asIPSEC, TLS and SSL.

A secure data parser may communicate with the electronic storage locallyor remotely. The secure data parser may be implemented through anynetwork or communication protocol such as IPV4 and IPV6. Shares used toreconstruct files, file systems, or any other data distributed overshares may be accessed over one or more transmission medium, includingphysical delivery of a drive, disk, or other storage medium, deliveryvia physical networks such as twisted pair, coaxial cable, opticalfiber, or wireless delivery such as via AM radio, shortwave, FM/TVbroadcast, cellular technology, satellites, microwave, terrestrial, orany other known wireless medium.

A secure parser may be implemented in any number of environments, fromservers to desktops, cell phones to PDAs, and dedicated appliances tosmartcards.

Pricing for usage of the secure parser may be accomplished in a numberof ways. For example, a user could be charged based on storage or dataprocessing (e.g., throughput), e.g., on a per-Gigabyte basis. Pricingcould be on an enterprise bases, server, basis, client basis, or sitelicense basis. Charges may also be on a percentage of effort on valuebasis, e.g., based on a measure of the security improvement in thesystem.

Additionally, other combinations, additions, substitutions andmodifications will be apparent to the skilled artisan in view of thedisclosure herein. Accordingly, the present invention is not intended tobe limited by the reaction of the preferred embodiments but is to bedefined by a reference to the appended claims.

What is claimed is:
 1. A secure storage network comprising: a pluralityof physical storage devices storing thereon a plurality of shares; and asecure storage system configured to: present to a client device avirtual disk, the virtual disk comprising a directory mapped to theplurality of physical storage devices such that physical locations ofthe shares are hidden from the client device; receive a request from theclient device via the network to store data to the virtual disk, receivethe data via the network; encrypt the data and split the data into theplurality of shares, wherein each of the plurality of shares comprises asubset of less than all of the data, and wherein splitting the datacomprises rearranging the subset in each respective share from anoriginal order, and wherein the plurality of shares includes dataindicative of a key used to secure the data; store the plurality ofshares on the plurality of physical storage devices; and receive arequest from the client device to read second data from the virtual diskvia the network, wherein the secure storage system responds by: readingthe second data from the virtual disk by reconstituting the second datafrom at least a portion of a second plurality of shares on the pluralityof physical storage devices; and sending the second data via the networkto the client device.
 2. The secure storage network of claim 1, whereinthe secure storage system stores the data by distributing the data inthe plurality of shares.
 3. The secure storage network of claim 1,wherein the secure storage system includes a network attached storagemodule within an application layer.
 4. The secure storage network ofclaim 3, wherein the network attached storage module communicates withthe client device via the network.
 5. The secure storage network ofclaim 3, wherein the virtual disk is presented to the application layeras a local disk.
 6. A secure storage system, the system comprising: amemory; a programmed hardware processor configured to: present to aclient device a virtual disk, the virtual disk comprising a directorymapped to a plurality of physical storage devices such that physicallocations of a plurality of shares are hidden from the client device;receive a request from the client device via a network to store data tothe virtual disk; receive, in response to receiving the request, thedata via the network; encrypt the data and split the data into theplurality of shares, wherein each of the plurality of shares comprises asubset of less than all of the data, and wherein splitting the datacomprises rearranging the subset in each respective share from anoriginal order, and wherein the plurality of shares includes dataindicative of a key used to secure the data; store the plurality ofshares on the plurality of physical storage devices; receive a requestfrom the client device to read second data from the virtual disk via thenetwork, wherein the secure storage responds by: reading the second datafrom the virtual disk by reconstituting the second data from at least aportion of a second plurality of shares on the plurality of physicalstorage devices; and sending the second data to the client device viathe network.
 7. The secure storage system of claim 6, wherein: thesecure storage system includes an application layer capable ofconnecting to the client device using the network; and the client devicecommunicates with the application layer through the network.
 8. Thesecure storage system of claim 6, wherein: the programmed hardwareprocessor is configured to store the data by distributing the data inthe plurality of shares; and the programmed hardware processor isfurther configured to perform a reconstitution operation to reconstitutethe data from the plurality of shares.
 9. The secure storage system ofclaim 7, wherein the virtual disk is presented to the application layeras a local disk.
 10. A method of securely storing data on a networkhaving a client device connected to a secure storage system via anetwork, the method comprising: presenting a virtual disk via thenetwork, wherein the virtual disk comprises a directory mapped to aplurality of physical storage devices such that physical locations of aplurality of shares are hidden from the client device; receiving arequest to write data to the virtual disk via the network; and writingthe data to the virtual disk by encrypting the data and splitting thedata into the plurality of shares, wherein each of the plurality ofshares comprises a subset of less than all of the data, and whereinsplitting the data comprises rearranging the subset in each respectiveshare from an original order, and wherein the plurality of sharesinclude data indicative of a key used to secure the data; storing theplurality of shares on the plurality of physical storage devices;receiving a request to read second data from the virtual disk via thenetwork; reading the second data from the virtual disk by reconstitutingthe second data from at least a portion of a second plurality of shares;and sending the second data to the client device via the network. 11.The method of claim 10, wherein splitting the data comprisesdistributing the data into the plurality of shares.
 12. The method ofclaim 10, wherein data sent across the network is secured by splittingand encrypting operations.
 13. A method of securely accessing data themethod comprising: presenting, by processing circuitry, to a clientdevice a virtual disk via a network, wherein the virtual disk comprisesa directory mapped to a plurality of physical storage devices storingthereon a plurality of shares such that physical locations of theplurality of shares are hidden from the client device; receiving arequest from the client device to read data from the virtual disk viathe network; reading the data from the virtual disk by reconstitutingthe data from at least a portion of the plurality of shares, each of theplurality of shares comprising a subset of less than all of the data,and wherein splitting the data comprises rearranging the subset in eachrespective share from an original order, and wherein the plurality ofshares include data indicative of a key used to secure the data;receiving a request to write second data to the virtual disk via thenetwork; encrypting the data and splitting the second data into a secondplurality of shares; and storing the second plurality of shares on theplurality of physical storage devices.
 14. The method of claim 13,wherein splitting the data comprises distributing the data into theplurality of shares.
 15. The secure storage network of claim 1, whereinthe subset is rearranged using at least one of a deterministictechnique, a random technique, and pseudo-random technique.
 16. Thesecure storage system of claim 6, wherein the subset is rearranged usingat least one of a deterministic technique, a random technique, andpseudo-random technique.
 17. The method of claim 10, wherein the subsetis rearranged using at least one of a deterministic technique, a randomtechnique, and pseudo-random technique.
 18. The method of claim 13,wherein the subset is rearranged using at least one of a deterministictechnique, a random technique, and pseudo-random technique.