IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0015440
(2011-01-27)
|
등록번호 |
US-8601286
(2013-12-03)
|
발명자
/ 주소 |
- England, Paul
- Peinado, Marcus
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
2 인용 특허 :
167 |
초록
▼
In accordance with certain aspects, data is received and a digital signature is generated and output. The digital signature can be a digital signature of the data and one or more conditions that are to be satisfied in order for the data to be revealed, or a digital signature over data generated usin
In accordance with certain aspects, data is received and a digital signature is generated and output. The digital signature can be a digital signature of the data and one or more conditions that are to be satisfied in order for the data to be revealed, or a digital signature over data generated using a private key associated with a bound key that is bound to one or more processors.
대표청구항
▼
1. A computing device having one or more components implemented at least in part in hardware and that perform acts comprising: receiving data from a calling program;generating a digital signature, in the computing device and using public key encryption, over a combination of both the data and one or
1. A computing device having one or more components implemented at least in part in hardware and that perform acts comprising: receiving data from a calling program;generating a digital signature, in the computing device and using public key encryption, over a combination of both the data and one or more conditions identifying when the data may be revealed, the one or more conditions including one or both of a logical formula to be evaluated and a program to be executed, wherein the data can be revealed only if one or both of the logical formula evaluates true and execution of the program returns an indication of true; andreturning the digital signature to the calling program. 2. A computing device as recited in claim 1, wherein receiving the data comprises receiving the data as part of a Quote operation. 3. A computing device as recited in claim 1, the combination comprising a combination of the data, the one or more conditions identifying when the data may be revealed, and an identifier of the calling program. 4. A computing device as recited in claim 3, wherein the identifier of the calling program comprises a digest value generated by applying a cryptographic hash function to the calling program. 5. A computing device as recited in claim 1, wherein the one or more conditions identifying when the data may be revealed further include a time constraint identifying one or more days of the week during which the data can be revealed. 6. A computing device as recited in claim 1, wherein the one or more conditions identifying when the data may be revealed include the logical formula to be evaluated. 7. A computing device as recited in claim 1, wherein the one or more conditions identifying when the data may be revealed include the program to be executed. 8. A computing device as recited in claim 1, wherein the one or more conditions identifying when the data may be revealed further include a time constraint identifying one or more particular times of day during which the data can be revealed. 9. A method comprising: receiving data;generating, in a device and using public key encryption, a digital signature in response to a request from a calling program, the digital signature being a digital signature of a combination of the data and one or more conditions identifying a program to which the data may be revealed; andreturning the digital signature to the calling program. 10. A method as recited in claim 9, wherein the request from the calling program comprises the calling program invoking a Quote operation. 11. A method as recited in claim 9, wherein the one or more conditions identifying the program to which the data may be revealed comprise one or more conditions identifying the calling program. 12. A method as recited in claim 11, wherein the one or more conditions comprise a digest value generated by applying a cryptographic hash function to the calling program. 13. A method as recited in claim 9, the one or more conditions further including a time constraint to be satisfied in order for the data to be revealed, the time constraint including one or more days of the week and/or particular times of the day during which the data can be revealed. 14. A method as recited in claim 9, the one or more conditions further including a logical formula to be evaluated, and wherein the data can be revealed only if the logical formula evaluates true. 15. A method as recited in claim 9, the one or more conditions further including a program to be executed, and wherein the data can be revealed only if execution of the program returns an indication of true. 16. A method of implementing a BoundQuote operation, the method comprising: receiving, as an input, both data to be signed and a bound key, wherein the bound key is bound to one or more processors;reconstructing, based at least in part on the bound key, a private key associated with the bound key;generating a digital signature over the data using the private key; andoutputting the digital signature. 17. A method as recited in claim 16, wherein the bound key is bound to the one or more processors by encrypting the bound key using a public key of the one or more processors. 18. A method as recited in claim 16, wherein the bound key is restricted to being used by the BoundQuote operation. 19. A method as recited in claim 16, the outputting comprising outputting the digital signature only if one or more bound key usage conditions of the bound key are satisfied. 20. A method as recited in claim 16, wherein generating the digital signature comprises generating, using the private key, the digital signature over both the data and an identifier of a program invoking the BoundQuote operation.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.