Cryptography – Key management
Reexamination Certificate
2006-02-21
2006-02-21
Song, Hosuk (Department: 2135)
Cryptography
Key management
C380S278000, C380S282000, C726S001000
Reexamination Certificate
active
07003117
ABSTRACT:
A system is provided that allows encrypted content to be distributed to users over a communications network. A policy enforcement service may use an identity-based encryption algorithm to generate public parameter information and private keys. Data content may be encrypted prior to distribution using an identity-based encryption engine. The encryption engine may use the public parameter information from the policy service and public key information to encrypt the data. The public key information may be based on policy information that specifies which types of users are allowed to access the data that is encrypted using that public key. A user may obtain a private key for unlocking particular encrypted data by providing a key request to the policy enforcement service that contains the public key. The policy enforcement service may enforce the policies given by the policy information and may provide private keys only to authorized users.
REFERENCES:
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5159632 (1992-10-01), Crandall
patent: 5271061 (1993-12-01), Crandall
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5715403 (1998-02-01), Stefik et al.
patent: 6061448 (2000-05-01), Smith et al.
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6385596 (2002-05-01), Wiser et al.
patent: 6658415 (2003-12-01), Brown et al.
patent: 6886096 (2005-04-01), Appenzeller et al.
patent: 2001/0016836 (2001-08-01), Boccon-Gibod et al.
patent: 2002/0076042 (2002-06-01), Sandhu et al.
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2003/0179885 (2003-09-01), Gentry et al.
patent: 2003/0182573 (2003-09-01), Toneguzzo et al.
patent: 2004/0098589 (2004-05-01), Appenzeller et al.
patent: 2004/0151308 (2004-08-01), Kacker et al.
patent: 2004/0179684 (2004-09-01), Appenzeller et al.
patent: 2005/0010801 (2005-01-01), Spies et al.
patent: 2005/0084100 (2005-04-01), Spies et al.
patent: 2005/0138353 (2005-06-01), Spies et al.
Chandramouli, “Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks”, 5th ACM Workshop on Role-based Access Control, Jul. 26-27, 2000.
Constantin Popescu, An efficient id-based group signature scheme, Studia univ, babes bolyai, informatica, vol. XLVII, Nov. 2, 2002.
Christoph G. Gunther, An identyty-based key-exchange protocol, Springer-verlag, 1998.□□.
Horwitz et al. Toward hiererchical identity-based encryption. 2002.□□.
Ben Lynn, Authenticatd Identity-based encryption, Jun. 3, 2002.
Atkins et al., “PGP Message Exchange Formats,” Informational Request for Comments (Aug. 1996).
Boneh et al., “Identity-Based Encryption from the Well Pairing,” fromCrytpo '2001(Oct. 2002).
Cocks, Clifford, “An Identity Based Encryption Scheme based on Quadratic Residues.” (2001).
Horwitz et al., “Toward Hiererchical Identity-Based Ebcryption,”Proceedings of EUROCRYPT 2002, (Apr. 28, 2002-May 2, 2002) Lecture-Notes in Computer Science, Standford University.
Housley et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile,” Standards Track Request for Comments (Jan. 1999).
Lai et al., “A Proposal for a New Block Encryption Standard,”Advances in Cryptology: EUROCRYPT 1990 Proceedings, Springer Verlag: pp. 389-404 (1991).
Mont et al., “The HP Time Vault Service: Innovating the way confidential informnation is disclosed, at the right time” http://www.hpl.hp.com/techreports/2002/HPL-2002-243.html (2002).
Rivest et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” from The Communications of the ACM (Feb. 1978).
Appenzeller Guido
Kacker Rishi R.
Pauker Matthew J.
Spies Terence
Dada Beemnet W.
Song Hosuk
Treyz G. Victor
Voltage Security, Inc.
LandOfFree
Identity-based encryption system for secure data distribution does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identity-based encryption system for secure data distribution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity-based encryption system for secure data distribution will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3640399