IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0431011
(2003-05-07)
|
등록번호 |
US-7543336
(2009-07-01)
|
발명자
/ 주소 |
- Lampson, Butler W.
- DeTreville, John D.
- England, Paul
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
20 인용 특허 :
130 |
초록
▼
In one aspect, a data structure to be encrypted is received, the data structure including content along with a statement of conditions under which the content may be decrypted. The content is encrypted using a public key of a pair of public and private keys of a device that is to decrypt the data st
In one aspect, a data structure to be encrypted is received, the data structure including content along with a statement of conditions under which the content may be decrypted. The content is encrypted using a public key of a pair of public and private keys of a device that is to decrypt the data structure. In another aspect, a data structure is decrypted using a private key of a pair of public and private keys. A statement of conditions under which content in the data structure can be decrypted is obtained, and testing is performed as to whether the conditions are satisfied. The decrypted content is returned only if the conditions are satisfied.
대표청구항
▼
We claim: 1. A method comprising: receiving a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the content comprises an arbitrary block of data, wherein the statement of conditions comp
We claim: 1. A method comprising: receiving a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the content comprises an arbitrary block of data, wherein the statement of conditions comprises an operating system identity that an operating system executing on a device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; and encrypting the content using a public key of a pair of public and private keys of the device that is to decrypt the content. 2. A method as recited in claim 1, wherein the pair of public and private keys are keys of a processor of the device. 3. A method as recited in claim 1, wherein the operating system identity is for an operating system that is different than an operating system executing when the data structure to be encrypted is received. 4. A method as recited in claim 1, wherein a processor that is to decrypt the content is different than a processor that encrypts the data structure. 5. One or more computer readable memories having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to: receive a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; and encrypt the content using a public key of a pair of public and private keys of a device that is to decrypt the content. 6. One or more computer readable memories as recited in claim 5, wherein the pair of public and private keys are keys of a processor of the device. 7. One or more computer readable memories as recited in claim 5, wherein the operating system identity is maintained in a software identity register (SIR). 8. One or more computer readable memories as recited in claim 5, wherein the operating system identity is for an operating system that is different than an operating system executing when the content to be encrypted is received. 9. One or more computer readable memories as recited in claim 5, wherein the one or more processors to encrypt the content are part of a different device than the device that is to decrypt the content. 10. A method comprising: decrypting a data structure using a private key of a pair of public and private keys; obtaining a statement of conditions under which content in the data structure can be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on a device including a processor must have in order for the content to be decrypted, wherein the operating system identity is identified in a signed certificate from an operating system vendor, and wherein the operating system identity is maintained in a software identity register (SIR); testing whether the conditions are satisfied; and returning the decrypted content only if the conditions are satisfied. 11. A method as recited in claim 10, wherein the pair of public and private keys are keys of the processor. 12. A method as recited in claim 10, wherein obtaining the statement of conditions comprises obtaining the statement of conditions from the data structure. 13. A method as recited in claim 10, further comprising returning an error if the conditions are not satisfied. 14. A method as recited in claim 10, further comprising receiving the data structure from a device other than the device that includes the processor. 15. A method as recited in claim 10, wherein the processor is different than a processor that encrypted the data structure. 16. One or more computer readable memories having stored thereon a plurality of instructions that, when executed by a processor, causes the processor to: decrypt a data structure using a private key of a pair of public and private keys; obtain a statement of conditions under which content in the data structure can be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on a device including the processor must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; test whether the conditions are satisfied; and return the decrypted content only if the conditions are satisfied. 17. One or more computer readable memories as recited in claim 16, wherein the pair of public and private keys are keys of the processor. 18. One or more computer readable memories as recited in claim 16, wherein the operating system identity is maintained in a software identity register (SIR). 19. One or more computer readable memories as recited in claim 16, wherein the processor is different than a processor that encrypted the data structure. 20. One or more computer readable memories having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to: obtain content to be encrypted; and invoke a seal operation, inputting both the content and a statement of conditions under which the content may be decrypted, to have the content encrypted using a public key of a pair of public and private keys of a device that may decrypt the data structure, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor. 21. One or more computer readable memories as recited in claim 20, wherein the public and private keys are keys of a processor of the device. 22. One or more computer readable memories as recited in claim 20, wherein the operating system identity is for an operating system that is different than an operating system invoking the seal operation. 23. One or more computer readable memories as recited in claim 20, wherein the device is a different device than a device that includes the one or more processors. 24. One or more computer readable memories having stored thereon a plurality of instructions that, when executed by a processor of a device, causes the processor to: make a seal operation and a reveal operation available for invoking; wherein the seal operation causes content to be encrypted with a public key of a pair of public and private keys of the processor along with a statement of the conditions under which it may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; and wherein the reveal operation causes the content to be returned to a requester if the conditions are satisfied. 25. One or more computer readable memories as recited in claim 24, wherein the seal operation and reveal operation collectively provide the ability to seal secrets only for subsequent use on the device. 26. A method comprising: receiving a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on a device must have in order for the content to be decrypted, wherein the operating system identity is for an operating system that is different than an operating system executing when the data structure to be encrypted is received, and wherein the operating system identity is maintained in a software identity register (SIR); and encrypting the content using a public key of a pair of public and private keys of the device that is to decrypt the content. 27. A method as recited in claim 26, wherein the pair of public and private keys are keys of a processor of the device. 28. A method as recited in claim 26, wherein a processor that is to decrypt the content is different than a processor that encrypts the data structure. 29. A method comprising: receiving a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; and encrypting the content using a public key of a pair of public and private keys of a device that is to decrypt the content. 30. A method as recited in claim 29, wherein the pair of public and private keys are keys of a processor of the device. 31. A method as recited in claim 29, wherein the operating system identity is maintained in a software identity register (SIR). 32. A method as recited in claim 29, wherein the operating system identity is for an operating system that is different than an operating system executing when the data structure to be encrypted is received. 33. A method as recited in claim 29, wherein a processor that is to decrypt the content is different than a processor that encrypts the data structure. 34. One or more computer readable memories having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to: receive a data structure to be encrypted, wherein the data structure includes content along with a statement of conditions under which the content may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, wherein the operating system identity is for an operating system that is different than an operating system executing when the content to be encrypted is received, and wherein the operating system identity is maintained in a software identity register (SIR); and encrypt the content using a public key of a pair of public and private keys of a device that is to decrypt the content. 35. One or more computer readable memories as recited in claim 34, wherein the pair of public and private keys are keys of a processor of the device. 36. One or more computer readable memories as recited in claim 34, wherein the one or more processors to encrypt the content are part of a different device than the device that is to decrypt the content. 37. A method comprising: decrypting a data structure using a private key of a pair of public and private keys; obtaining a statement of conditions under which content in the data structure can be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on a device including a processor must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; testing whether the conditions are satisfied; and returning the decrypted content only if the conditions are satisfied. 38. A method as recited in claim 37, wherein the pair of public and private keys are keys of the processor. 39. A method as recited in claim 37, wherein obtaining the statement of conditions comprises obtaining the statement of conditions from the data structure. 40. A method as recited in claim 37, wherein the operating system identity is identified in a signed certificate from an operating system vendor. 41. A method as recited in claim 37, further comprising returning an error if the conditions are not satisfied. 42. A method as recited in claim 37, further comprising receiving the data structure from a device other than the device that includes the processor. 43. A method as recited in claim 37, wherein the processor is different than a processor that encrypted the data structure. 44. A method comprising: obtaining content to be encrypted; and invoking a seal operation, inputting both the content and a statement of conditions under which the content may be decrypted, to have the content encrypted using a public key of a pair of public and private keys of a device that may decrypt the data structure, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor. 45. A method as recited in claim 44, wherein the public and private keys are keys of a processor of the device. 46. A method as recited in claim 44, wherein the operating system identity is for an operating system that is different than an operating system invoking the seal operation. 47. A method as recited in claim 44, wherein the device is a different device than a device that includes the one or more processors. 48. A method comprising: making a seal operation and a reveal operation available for invoking; wherein the seal operation causes content to be encrypted with a public key of a pair of public and private keys of the processor along with a statement of the conditions under which it may be decrypted, wherein the statement of conditions comprises an operating system identity that an operating system executing on the device must have in order for the content to be decrypted, and wherein the operating system identity is identified in a signed certificate from an operating system vendor; and wherein the reveal operation causes the content to be returned to a requester if the conditions are satisfied. 49. A method as recited in claim 48, wherein the seal operation and reveal operation collectively provide the ability to seal secrets only for subsequent use on the device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.