Method and apparatus for providing identity based encryption in distributed computations
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
H04L-029/06
H04L-009/08
H04L-009/30
G06F-021/60
G06F-021/62
H04L-029/08
출원번호
US-0285254
(2011-10-31)
등록번호
US-9166953
(2015-10-20)
발명자
/ 주소
Luukkala, Vesa-Veikko
Sovio, Sampo Juhani
Kaaja, Jari-Jukka Harald
Boldyrev, Sergey
출원인 / 주소
Nokia Technologies Oy
대리인 / 주소
Alston & Bird LLP
인용정보
피인용 횟수 :
4인용 특허 :
3
초록▼
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also ca
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
대표청구항▼
1. A method, comprising: segmenting a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications;encrypting the one or more second parts using the first pa
1. A method, comprising: segmenting a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications;encrypting the one or more second parts using the first part as a public key based on an identity-based encryption; anddetermining one or more anonymization policies associated with the identity-based encryption, the computation closure, the first part, the one or more second parts, or a combination thereof,wherein the encryption is based, at least in part, on the one or more anonymization policies. 2. The method of claim 1 further comprising: determining one or more criteria for executing the computation closure, the one or more second parts, or a combination thereof; (b) one or more processes for determining the one or more criteria; (c) or a combination thereof; andincluding the one or more criteria, the one or more processes, or a combination in the first part,wherein the executed state is a reflection of results of executing computations in the computation closure on data in the computation closure. 3. The method of claim 2 further comprising: publishing the first part, the encrypted one or more second parts, or a combination for access by one or more subscribing devices. 4. The method of claim 3 further comprising: processing capability information associated with the one or more subscribing devices to determine whether the one or more subscribing devices decrypt the one or more encrypted second parts for execution. 5. The method of claim 4, wherein the capability information is based, at least in part, on energy consumption information, security enforcement information, one or more privacy policies, computational resource information, bandwidth availability information, or a combination thereof. 6. The method of claim 2, wherein the one or more subscribing devices include, at least in part, one or more components of one or more levels of a computational architecture. 7. The method of claim 6 further comprising: determining the one or more anonymization policies based, at least in part, on a concatenation of the one or more level-specific anonymization policies associated with the one or more levels of the computational architecture. 8. The method of claim 1, wherein the segmentation, the encryption, or a combination thereof of the computation closure is based, at least in part, on one or more cost functions, one or more functional flow maps, or a combination thereof associated with the computation closure. 9. The method of claim 1, wherein the encryption is further based, at least in part, on one or more private keys. 10. An apparatus comprising: at least one processing device; andat least one memory including computer program code for one or more programs,the at least one memory and the computer program code configured to, with the at least one, processing device, cause the apparatus to perform at least the following,cause a segmentation of a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications;cause an encryption of the one or more second parts using the first part as a public key based on an identity-based encryption; and determine one or more anonymization policies associated with the identity-based encryption, the computation closure, the first part, the one or more second parts, or a combination thereof,wherein the encryption is based, at least in part, on the one or more anonymization policies. 11. The apparatus of claim 10, wherein the apparatus is further caused to: determine (a) one or more criteria for executing the computation closure, the one or more second parts, or a combination thereof; (b) one or more processes for determining the one or more criteria; (c) or a combination thereof; andcause an inclusion of the one or more criteria, the one or more processes, or a combination in the first part,wherein the executed state is a reflection of results of executing computations in the computation closure on data in the computation closure. 12. The apparatus of claim 11, wherein the apparatus is further caused to: cause a publication of the first part, the encrypted one or more second parts, or a combination for access by one or more subscribing devices. 13. The apparatus of claim 12, wherein the apparatus is further caused to: process or facilitate a processing of capability information associated with the one or more subscribing devices to determine whether the one or more subscribing devices can decrypt the one or more encrypted second parts for execution. 14. The apparatus of claim 13, wherein the capability information is based, at least in part, on energy consumption information, security enforcement information, one or more privacy policies, computational resource information, bandwidth availability information, or a combination thereof. 15. The apparatus of claim 12, wherein the one or more subscribing devices include one or more components of one or more levels of a computational architecture. 16. The apparatus of claim 15, wherein the apparatus is further caused to: determine the one or more anonymization policies based, at least in part, on a concatenation of the one or more level-specific anonymization policies associated with the one or more levels of the computational architecture. 17. The apparatus of claim 10, wherein the segmentation, the encryption, or a combination thereof of the computation closure is based, at least in part, on one or more cost functions, one or more functional flow maps, or a combination thereof associated with the computation closure. 18. The apparatus of claim 10, wherein the encryption is further based, at least in part, on one or more private keys.
Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.