Privacy management of personal data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S170000, C726S001000

Reexamination Certificate

active

10767868

ABSTRACT:
When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.

REFERENCES:
patent: 6349338 (2002-02-01), Seamons et al.
patent: 2002/0031230 (2002-03-01), Sweet et al.
patent: 2002/0035556 (2002-03-01), Shah et al.
patent: WO 00/52557 (2000-09-01), None
patent: WO 02/15530 (2002-02-01), None
B. Balacheff, L. Chen, S. Pearson et al. “Trustec Computing Platforms: TCPA Technology in Context” © 2002 Prentice Hall excerpts from Chapter 2 (6 pages).
Levy, I., “Identifier Based PKC-Potential Applications,” 1st Annual PKI Research Workshop—Archival Material, Internet: <http://www.cs.darthmouth.edu/˜pki02/Levy/index.shtml> 22 pages total (Jul. 29, 2002).
Karjoth, G., et al. “A Privacy Model for Enterprises,” IBM Research, Zurich—15th IEEE Computer Foundations Workshop—Jun. 2002.
Karjoth, G., et al. “Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data,” —2nd Workshop on Privacy Enhancing Technologies, Lecture Notes in Computer Science, Springer Verlang—2002.
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,” Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp. 360-363, Springer-Verlag 2001.
Boneh, Dan, et al. “Identity-Based Encryption from the Weil Pairing”Advances in Cryptology—CRYPTO2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
Boneh, Dan, et al. “Identity-Based Mediated RSA,” 3rd Workshop on Information Security Application, Jeju Island, Korea, Aug. 2002.
Chen, L. et al. “Certification of Public Keys Within an Identity Based System,” LNCS 2433, ed. Goos, G., Hartmanis, J., van Leeuwen, J., Proceedings of Information Security, pp. 332-333, 2002.
TCPA—Trusted Computing Platform Alliance Main Specification v1.1, www.trustedcomputing.org, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Privacy management of personal data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Privacy management of personal data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Privacy management of personal data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3906249

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.