Saving and retrieving data based on public key encryption
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-021/62
출원번호
US-0012573
(2011-01-24)
등록번호
US-9183406
(2015-11-10)
발명자
/ 주소
England, Paul
Peinado, Marcus
출원인 / 주소
Microsoft Technology Licensing, LLC
대리인 / 주소
Churna, Timothy
인용정보
피인용 횟수 :
0인용 특허 :
189
초록▼
In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be obtained from the ciphertext only if one or more conditions are satisfied. In accordance with another aspec
In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be obtained from the ciphertext only if one or more conditions are satisfied. In accordance with another aspect, a bit string is received from a calling program. Data in the bit string is decrypted using public key decryption and returned to the calling program only if one or more conditions included in the bit string are satisfied.
대표청구항▼
1. A method comprising: obtaining a pair of inputs to be encrypted, the pair of inputs including data to be sealed and one or more conditions that are to be satisfied in order for the data to be unsealed; andencrypting by a first device the pair of inputs using public key encryption and a same publi
1. A method comprising: obtaining a pair of inputs to be encrypted, the pair of inputs including data to be sealed and one or more conditions that are to be satisfied in order for the data to be unsealed; andencrypting by a first device the pair of inputs using public key encryption and a same public key of a public/private key pair, the encrypting generating a ciphertext that includes both the encrypted data and the encrypted one or more conditions, wherein one of the one or more conditions comprises a time constraint for when the data can be unsealed, the time constraint comprising particular days of the week during which the data can be unsealed, and wherein the data is not unsealed if the one or more conditions are not satisfied. 2. A method as recited in claim 1, wherein the data comprises a cryptographic key. 3. A method as recited in claim 1, wherein obtaining the data comprises receiving the data as part of a PKSeal operation. 4. A method as recited in claim 1, wherein the time constraint further comprises a particular time of day during which the data can be unsealed. 5. A method as recited in claim 1, the public key comprising a public key of a guard that is intended to be able to decrypt the ciphertext. 6. A method as recited in claim 5, the guard comprising a component implemented on a second device that is different than the first device. 7. A method as recited in claim 5, the obtaining comprising obtaining the pair of inputs from a component of the first device implemented in an operating system layer on the first device, and the encrypting comprising encrypting the pair of inputs by a component implemented in a basic input/output system layer on the first device. 8. A method as recited in claim 5, the guard comprising a component implemented in a hardware layer of the first device, the obtaining comprising obtaining, by the guard, the pair of inputs from a component of the first device implemented in a basic input/output system layer on the first device, and the encrypting comprising encrypting the pair of inputs by the guard. 9. A computing device having one or more components implemented at least in part in hardware and that performs acts comprising: invoking, in the computing device, an operation to seal data; andreceiving, in response to invoking the operation, a ciphertext including both encrypted data and encrypted one or more conditions that are to be satisfied in order for the data to be unsealed, the encrypted data as well as the encrypted one or more conditions having been generated by encrypting a pair of inputs including both data and one or more conditions using a same public key of a public/private key pair, wherein one of the one or more conditions comprises a time constraint identifying particular days of the week during which the data can be unsealed, wherein the data is not unsealed if the one or more conditions are not satisfied, and wherein the data and the one or more conditions are encrypted using public key encryption. 10. A computing device as recited in claim 9, wherein the operation comprises a PKSeal operation. 11. A computing device as recited in claim 9, wherein invoking the operation comprises passing the data as an input to the operation. 12. A computing device as recited in claim 9, wherein invoking the operation comprises passing at least one of the one or more conditions as an input to the operation. 13. A computing device as recited in claim 9, wherein the data comprises a cryptographic key. 14. A computing device as recited in claim 9, wherein the time constraint further comprises a particular time of day during which the data can be unsealed. 15. A method comprising: invoking, in a device, an operation to have ciphertext decrypted; andreceiving, in response to invoking the operation, decrypted data from the ciphertext only if an encrypted one or more conditions included in the ciphertext are satisfied, the encrypted data as well as the encrypted one or more conditions in the ciphertext having been decrypted using a same private key of a public/private key pair, wherein the one or more conditions comprises a time constraint for when the data can be unsealed, wherein the one or more conditions are satisfied only if a current day of the week is one of one or more particular days of the week identified by the time constraint, and wherein the ciphertext is decrypted using public key decryption. 16. A method as recited in claim 15, wherein the operation comprises a PKUnseal operation. 17. A method as recited in claim 15, wherein invoking the operation comprises passing the ciphertext as an input to the operation. 18. A method as recited in claim 15, wherein invoking the operation comprises passing a pointer to the ciphertext as an input to the operation. 19. A method as recited in claim 15, wherein the data comprises a cryptographic key. 20. A method as recited in claim 15, wherein the time constraint further comprises a particular time of day during which the data can be unsealed.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (189)
Koji Otani JP; Hiroyasu Sugano JP; Madoka Mitsuoka JP, Access administration method and device therefor to provide access administration services on a computer network.
Hardell ; Jr. William R. (Austin TX) Henson ; Jr. James D. (Austin TX) Mitchell Oscar R. (Pflugerville TX), Apparatus and method for booting a multiple processor system having a global/local memory architecture.
Sachiko Uranaka JP; Masaki Kiyono JP, Application package and system for permitting a user to use distributed application package on the term of the use thereof.
Fisher Jerald C. ; Nguyen Lien Dai ; Young James ; Seaburg Gunnar P. ; Hedlund Galen W. ; Katz Richard S., Channel configuration program server architecture.
Brachtl Bruno O. (Baden-Wuerttenberg NY DEX) Coppersmith Don (Ossining NY) Hyden Myrna M. (Manassas VA) Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY), Data authentication using modification detection codes based on a public one way encryption function.
Kohno,Fumio, Data delivery system, server apparatus, reproducing apparatus, data delivery method, data playback method, storage medium, control, signal, and transmission data signal.
Takahashi Kikuo (Hachioji JPX) Kagimasa Toyohiko (Hachioji JPX) Mori Toshiaki (Hachioji JPX), Data processing apparatus having a real memory region with a corresponding fixed memory protection key value and method.
Michael E. See ; John W. Bailey ; Charles L. Panza ; Yuri Pikover ; Geoffrey C. Stone, Deterministic user authentication service for communication network.
Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
Matsuyama,Kazuo; Fujimura,Ko; Oshima,Yoshihito, Electronic rights information processing system, method and apparatus for carrying out same and recorded medium for program carrying out the method.
Robert G. Atkinson ; James W. Kelly, Jr. ; Bryan W. Tuttle ; Robert M. Price ; Robert P. Reichel, Embedding certifications in executable files for network transmission.
Jones Michael F. (Nashua NH) Zachai Arthur (Swampscott MA), Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys.
Heer Daniel N. ; Rance Robert J., Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network.
Bright Michael W. (Arlington Heights IL) Weiss David L. (Roselle IL) Cutts Kevin M. (Schaumburg IL) Locascio Robert J. (Crystal Lake IL), Key management in encryption systems.
Hsu Gordon K. (Naperville IL) Su ; deceased Liheng M. (late of Naperville IL by Yung-Kuei Tan Su ; executrix), Locating information in an unsorted database utilizing a B-tree.
Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
Imai Toru,JPX ; Yoshida Hideki,JPX ; Segawa Hideo,JPX, Method and apparatus for data input/output management suitable for protection of electronic writing data.
Gutowitz Howard A. (6395 Claremore La. San Diego CA 92120), Method and apparatus for encryption, decryption and authentication using dynamical systems.
Novoa Manuel ; McCann Paul H. ; Sharum Wayne P. ; Crisan Adrian ; Hokanson Paul B., Method and apparatus for remote ROM flashing and security management for a computer system.
Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
Nason,D. David; Kaan,Carson; Easton,John E.; Smith,Jason M.; Painter,John A.; Heaton,William J., Method and system for maintaining secure data input and output.
Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
Easter Randall J. (Duchess County NY) Spano Vincent A. (Duchess County NY) Zajac Myron W. (Duchess County NY) Campbell John E. (Duchess County NY), Methods and apparatus for secure hardware configuration.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Grimonprez Georges (Villeneuve d\Asq FRX) Paradinas Pierre (Villeneuve d\Asq FRX), Secured method for loading a plurality of applications into a microprocessor memory card.
Okamoto, Ryuichi; Inoue, Mitsuhiro; Matsushima, Hideki, Semiconductor memory card that records contents for trial and purchase, recording apparatus, reproducing apparatus, and sales method.
Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Barlow Doug ; Dillaway Blair ; Fox Barbara ; Lipscomb Terry ; Spies Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Denning,Dorothy E.; Glick,Barry J.; Karpf,Ronald S.; Seiler,Mark E., System and method for delivering encrypted information in a communication network using location identity and key tables.
Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Wilkinson Timothy J.,GBX ; Guthery Scott B. ; Krishna Ksheerabdhi ; Montgomery Michael A., Using a high level programming language with a microcontroller.
Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.