Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-07-08
2008-07-08
Vu, Kimyen (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S170000, C726S001000
Reexamination Certificate
active
10767868
ABSTRACT:
When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
REFERENCES:
patent: 6349338 (2002-02-01), Seamons et al.
patent: 2002/0031230 (2002-03-01), Sweet et al.
patent: 2002/0035556 (2002-03-01), Shah et al.
patent: WO 00/52557 (2000-09-01), None
patent: WO 02/15530 (2002-02-01), None
B. Balacheff, L. Chen, S. Pearson et al. “Trustec Computing Platforms: TCPA Technology in Context” © 2002 Prentice Hall excerpts from Chapter 2 (6 pages).
Levy, I., “Identifier Based PKC-Potential Applications,” 1st Annual PKI Research Workshop—Archival Material, Internet: <http://www.cs.darthmouth.edu/˜pki02/Levy/index.shtml> 22 pages total (Jul. 29, 2002).
Karjoth, G., et al. “A Privacy Model for Enterprises,” IBM Research, Zurich—15th IEEE Computer Foundations Workshop—Jun. 2002.
Karjoth, G., et al. “Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data,” —2nd Workshop on Privacy Enhancing Technologies, Lecture Notes in Computer Science, Springer Verlang—2002.
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,” Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp. 360-363, Springer-Verlag 2001.
Boneh, Dan, et al. “Identity-Based Encryption from the Weil Pairing”Advances in Cryptology—CRYPTO2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
Boneh, Dan, et al. “Identity-Based Mediated RSA,” 3rd Workshop on Information Security Application, Jeju Island, Korea, Aug. 2002.
Chen, L. et al. “Certification of Public Keys Within an Identity Based System,” LNCS 2433, ed. Goos, G., Hartmanis, J., van Leeuwen, J., Proceedings of Information Security, pp. 332-333, 2002.
TCPA—Trusted Computing Platform Alliance Main Specification v1.1, www.trustedcomputing.org, 2001.
Harrison Keith Alexander
Mont Marco Casassa
Pearson Siani Lynne
Sadler Martin
Gyorfi Thomas
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Vu Kimyen
LandOfFree
Privacy management of personal data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Privacy management of personal data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Privacy management of personal data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3906249