WO2004073230A3 - Identity-based encryption system for secure data distribution - Google Patents

Identity-based encryption system for secure data distribution Download PDF

Info

Publication number
WO2004073230A3
WO2004073230A3 PCT/US2004/003144 US2004003144W WO2004073230A3 WO 2004073230 A3 WO2004073230 A3 WO 2004073230A3 US 2004003144 W US2004003144 W US 2004003144W WO 2004073230 A3 WO2004073230 A3 WO 2004073230A3
Authority
WO
WIPO (PCT)
Prior art keywords
information
policy
identity
data
public key
Prior art date
Application number
PCT/US2004/003144
Other languages
French (fr)
Other versions
WO2004073230A2 (en
Inventor
Rishi R Kacker
Guido Appenzeller
Matthew J Pauker
Terence R Spies
Original Assignee
Voltage Security Inc
Rishi R Kacker
Guido Appenzeller
Matthew J Pauker
Terence R Spies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Voltage Security Inc, Rishi R Kacker, Guido Appenzeller, Matthew J Pauker, Terence R Spies filed Critical Voltage Security Inc
Priority to CA2515078A priority Critical patent/CA2515078C/en
Priority to EP04707830A priority patent/EP1593221A4/en
Priority to JP2006503306A priority patent/JP4619354B2/en
Publication of WO2004073230A2 publication Critical patent/WO2004073230A2/en
Publication of WO2004073230A3 publication Critical patent/WO2004073230A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/68Special signature format, e.g. XML format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Abstract

A system is provided that allows encrypted content to be distributed to users over a communications network. A policy enforcement service may use an identity-based encryption algorithm to generate public parameter information and private keys. Data content may be encrypted prior to distribution using an identity-based encryption engine. The encryption engine may use the public parameter information from the policy service and public key information to encrypt the data. The public key information may be based on policy information that specifies which types of users are allowed to access the data that is encrypted using that public key. A user may obtain a private key for unlocking particular encrypted data by providing a key request to the policy enforcement service that contains the public key. The policy enforcement service may enforce the policies given by the policy information and may provide private keys only to authorized users.
PCT/US2004/003144 2003-02-05 2004-02-03 Identity-based encryption system for secure data distribution WO2004073230A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA2515078A CA2515078C (en) 2003-02-05 2004-02-03 Identity-based encryption system for secure data distribution
EP04707830A EP1593221A4 (en) 2003-02-05 2004-02-03 Identity-based encryption system for secure data distribution
JP2006503306A JP4619354B2 (en) 2003-02-05 2004-02-03 An encryption system based on identification information for secure data delivery

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/361,192 2003-02-05
US10/361,192 US7003117B2 (en) 2003-02-05 2003-02-05 Identity-based encryption system for secure data distribution

Publications (2)

Publication Number Publication Date
WO2004073230A2 WO2004073230A2 (en) 2004-08-26
WO2004073230A3 true WO2004073230A3 (en) 2005-02-24

Family

ID=32771383

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/003144 WO2004073230A2 (en) 2003-02-05 2004-02-03 Identity-based encryption system for secure data distribution

Country Status (5)

Country Link
US (2) US7003117B2 (en)
EP (1) EP1593221A4 (en)
JP (1) JP4619354B2 (en)
CA (1) CA2515078C (en)
WO (1) WO2004073230A2 (en)

Families Citing this family (168)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL150221A0 (en) * 1999-12-15 2002-12-01 Reuben Bahar Method and system for confirming receipt of electronic mail transmitted via a communications network
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US7783765B2 (en) 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7565683B1 (en) * 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7260555B2 (en) * 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US8006280B1 (en) * 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US8613102B2 (en) * 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7512810B1 (en) * 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
GB2398713B (en) * 2003-02-22 2005-11-30 Hewlett Packard Development Co Limiting service provision to group members
GB2400699B (en) * 2003-04-17 2006-07-05 Hewlett Packard Development Co Security data provision method and apparatus and data recovery method and system
US7373416B2 (en) * 2003-04-24 2008-05-13 Akamai Technologies, Inc. Method and system for constraining server usage in a distributed network
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
GB2406246B (en) * 2003-09-17 2006-05-31 Hewlett Packard Development Co Secure provision of image data
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
JP4059321B2 (en) * 2003-10-30 2008-03-12 インターナショナル・ビジネス・マシーンズ・コーポレーション Personal information management system, information processing system, personal information management method, program, and recording medium
US8074267B1 (en) * 2003-12-18 2011-12-06 Symantec Corporation Computer communications monitor
US20050138371A1 (en) * 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
JP2005223504A (en) * 2004-02-04 2005-08-18 Sony Corp Service providing server, information processor and data processing method, and computer program
US7707427B1 (en) * 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US8902971B2 (en) 2004-07-30 2014-12-02 Euclid Discoveries, Llc Video compression repository and model reuse
US9743078B2 (en) 2004-07-30 2017-08-22 Euclid Discoveries, Llc Standards-compliant model-based video encoding and decoding
US9578345B2 (en) 2005-03-31 2017-02-21 Euclid Discoveries, Llc Model-based video encoding and decoding
US9532069B2 (en) 2004-07-30 2016-12-27 Euclid Discoveries, Llc Video compression repository and model reuse
US7657037B2 (en) * 2004-09-20 2010-02-02 Pgp Corporation Apparatus and method for identity-based encryption within a conventional public-key infrastructure
GB2421097B (en) * 2004-12-10 2009-07-01 Hewlett Packard Development Co Methods, devices and computer programs for creating ciphertext, plaintext and a cryptographic key
CN1262087C (en) * 2005-01-14 2006-06-28 南相浩 Method and apparatus for cipher key generation based on identification
US7657456B2 (en) * 2005-03-18 2010-02-02 Pitney Bowes Inc. Method and system for electronic voting using identity based encryption
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
US7734779B1 (en) * 2005-08-25 2010-06-08 Gregory Alexander Piccionelli Password protection system and method
US7433888B2 (en) * 2005-08-25 2008-10-07 Microsoft Corporation Schema packaging, distribution and availability
US7565506B2 (en) * 2005-09-08 2009-07-21 Qualcomm Incorporated Method and apparatus for delivering content based on receivers characteristics
US20070055629A1 (en) * 2005-09-08 2007-03-08 Qualcomm Incorporated Methods and apparatus for distributing content to support multiple customer service entities and content packagers
US20070078944A1 (en) * 2005-09-12 2007-04-05 Mark Charlebois Apparatus and methods for delivering and presenting auxiliary services for customizing a channel
US8528029B2 (en) * 2005-09-12 2013-09-03 Qualcomm Incorporated Apparatus and methods of open and closed package subscription
US8893179B2 (en) * 2005-09-12 2014-11-18 Qualcomm Incorporated Apparatus and methods for providing and presenting customized channel information
US20070101145A1 (en) * 2005-10-31 2007-05-03 Axalto Inc. Framework for obtaining cryptographically signed consent
US20070104323A1 (en) * 2005-11-04 2007-05-10 Pitney Bowes Incorporated Method and system for providing privacy to sender of a mail piece
US8571570B2 (en) * 2005-11-08 2013-10-29 Qualcomm Incorporated Methods and apparatus for delivering regional parameters
US8533358B2 (en) * 2005-11-08 2013-09-10 Qualcomm Incorporated Methods and apparatus for fragmenting system information messages in wireless networks
US8600836B2 (en) 2005-11-08 2013-12-03 Qualcomm Incorporated System for distributing packages and channels to a device
US8259623B2 (en) * 2006-05-04 2012-09-04 Bridgewater Systems Corp. Content capability clearing house systems and methods
US7434726B2 (en) * 2006-05-15 2008-10-14 Pitney Bowes Inc. Method and system for postdating of financial transactions
US8176319B2 (en) 2006-06-27 2012-05-08 Emc Corporation Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system
US20080065729A1 (en) * 2006-09-08 2008-03-13 Pitney Bowes Incorporated Method and system for service provider to be compensated for delivering e-mail messages while reducing amount of unsolicited e-mail messages
US8538028B2 (en) * 2006-11-20 2013-09-17 Toposis Corporation System and method for secure electronic communication services
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
CA2705903A1 (en) 2006-11-20 2008-05-29 Toposis Corporation System and method for secure electronic communication services
US8477606B2 (en) * 2007-01-22 2013-07-02 Qualcomm Incorporated Assured packet data services associated with communication networks
CN102685441A (en) 2007-01-23 2012-09-19 欧几里得发现有限责任公司 Systems and methods for providing personal video services
CN101622874A (en) 2007-01-23 2010-01-06 欧几里得发现有限责任公司 Object archival systems and methods
CN101939991A (en) * 2007-01-23 2011-01-05 欧几里得发现有限责任公司 Computer method and apparatus for processing image data
US7958371B2 (en) * 2007-05-09 2011-06-07 Sony Computer Entertainment Inc. Methods and apparatus for secure operating system distribution in a multiprocessor system
US8676715B2 (en) * 2007-06-06 2014-03-18 Pitney Bowes Inc. System and method for authenticating indicia using identity-based signature scheme
US20090080658A1 (en) * 2007-07-13 2009-03-26 Brent Waters Method and apparatus for encrypting data for fine-grained access control
US20090046644A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated Service set manager for ad hoc mobile service provider
US20090073943A1 (en) * 2007-08-17 2009-03-19 Qualcomm Incorporated Heterogeneous wireless ad hoc network
US20090049158A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated Ad hoc service provider topology
US8644206B2 (en) * 2007-08-17 2014-02-04 Qualcomm Incorporated Ad hoc service provider configuration for broadcasting service information
US20090046598A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated System and method for acquiring or distributing information related to one or more alternate ad hoc service providers
US9392445B2 (en) * 2007-08-17 2016-07-12 Qualcomm Incorporated Handoff at an ad-hoc mobile service provider
US20090047930A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated Method for a heterogeneous wireless ad hoc mobile service provider
KR101490687B1 (en) * 2007-08-20 2015-02-06 삼성전자주식회사 Method and apparatus for sharing secret information between devices in home network
KR101394149B1 (en) * 2007-09-06 2014-05-26 삼성전자주식회사 Method and apparatus for protecting content consumer's privacy
US8700894B2 (en) * 2007-10-17 2014-04-15 Pitney Bowes Inc. Method and system for securing routing information of a communication using identity-based encryption scheme
JP5286748B2 (en) * 2007-11-09 2013-09-11 ソニー株式会社 Information processing apparatus, key setting method, and program
US20090178131A1 (en) * 2008-01-08 2009-07-09 Microsoft Corporation Globally distributed infrastructure for secure content management
US8117447B2 (en) * 2008-01-10 2012-02-14 Industrial Technology Research Institute Authentication method employing elliptic curve cryptography
US20090208015A1 (en) * 2008-02-15 2009-08-20 Microsoft Corporation Offline consumption of protected information
US8171560B2 (en) * 2008-04-07 2012-05-01 Microsoft Corporation Secure content pre-distribution to designated systems
MX2010012645A (en) * 2008-05-23 2010-12-07 Koninkl Philips Electronics Nv Identity-based encryption of data items for secure access thereto.
US8910255B2 (en) * 2008-05-27 2014-12-09 Microsoft Corporation Authentication for distributed secure content management system
US8862893B2 (en) 2008-06-11 2014-10-14 Microsoft Corporation Techniques for performing symmetric cryptography
US8656177B2 (en) * 2008-06-23 2014-02-18 Voltage Security, Inc. Identity-based-encryption system
US8737614B1 (en) 2008-07-07 2014-05-27 Voltage Security, Inc. Document imaging system with identity-based encryption
CN102172026B (en) 2008-10-07 2015-09-09 欧几里得发现有限责任公司 The video compression of feature based
US9414031B2 (en) 2008-11-26 2016-08-09 Echostar Technologies L.L.C. Account-specific encryption key
US20100174916A1 (en) * 2009-01-05 2010-07-08 Fox Digital Enterprises Universal File
GB2467580B (en) * 2009-02-06 2013-06-12 Thales Holdings Uk Plc System and method for multilevel secure object management
US8837718B2 (en) * 2009-03-27 2014-09-16 Microsoft Corporation User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
JP5253567B2 (en) * 2009-04-24 2013-07-31 日本電信電話株式会社 Encryption system, encryption communication method, encryption device, key generation device, decryption device, content server device, program, storage medium
US9704159B2 (en) 2009-05-15 2017-07-11 Entit Software Llc Purchase transaction system with encrypted transaction information
US9179367B2 (en) * 2009-05-26 2015-11-03 Qualcomm Incorporated Maximizing service provider utility in a heterogeneous wireless ad-hoc network
EP2438580A2 (en) * 2009-06-02 2012-04-11 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
US8489685B2 (en) 2009-07-17 2013-07-16 Aryaka Networks, Inc. Application acceleration as a service system and method
US9246889B2 (en) * 2009-08-12 2016-01-26 Google Technology Holdings LLC Layered protection and validation of identity data delivered online via multiple intermediate clients
JP5531521B2 (en) * 2009-09-11 2014-06-25 富士ゼロックス株式会社 Document management system, document operation device, and program
US8510835B1 (en) 2009-09-18 2013-08-13 Trend Micro Incorporated Techniques for protecting data in cloud computing environments
US8826013B1 (en) 2009-09-23 2014-09-02 Trend Micro Incorporated Protection of customer data in cloud virtual machines using a central management server
CN101800757B (en) * 2010-02-03 2012-06-27 国家保密科学技术研究所 No-feedback one-way data transmission method based on single fiber structure
US8635464B2 (en) * 2010-12-03 2014-01-21 Yacov Yacobi Attribute-based access-controlled data-storage system
CN102546161A (en) * 2010-12-08 2012-07-04 索尼公司 Ciphertext policy based revocable attribute-based encryption method and equipment and system utilizing same
US10511630B1 (en) 2010-12-10 2019-12-17 CellSec, Inc. Dividing a data processing device into separate security domains
US8634563B2 (en) 2010-12-17 2014-01-21 Microsoft Corporation Attribute based encryption using lattices
JP5693206B2 (en) * 2010-12-22 2015-04-01 三菱電機株式会社 Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program
US9647989B2 (en) 2011-04-27 2017-05-09 Symantec Corporation System and method of data interception and conversion in a proxy
US9049023B2 (en) 2011-05-24 2015-06-02 Zeutro Llc Outsourcing the decryption of functional encryption ciphertexts
US10318932B2 (en) 2011-06-07 2019-06-11 Entit Software Llc Payment card processing system with structure preserving encryption
US8892875B1 (en) 2011-07-29 2014-11-18 Trend Micro Incorporated Methods and apparatus for controlling access to encrypted computer files
US8898767B1 (en) 2011-09-22 2014-11-25 Mountain Top Digital, L.L.C. Methods and apparatuses for digital content protection
US8874915B1 (en) * 2011-09-28 2014-10-28 Amazon Technologies, Inc. Optimized encryption key exchange
US9166953B2 (en) * 2011-10-31 2015-10-20 Nokia Technologies Oy Method and apparatus for providing identity based encryption in distributed computations
CN104185998B (en) * 2012-03-31 2018-06-05 英特尔公司 The method and system controlled for the cryptographic acess of video
US9294508B2 (en) 2012-08-02 2016-03-22 Cellsec Inc. Automated multi-level federation and enforcement of information management policies in a device network
US10305937B2 (en) 2012-08-02 2019-05-28 CellSec, Inc. Dividing a data processing device into separate security domains
US9256763B2 (en) * 2012-09-03 2016-02-09 Nec Europe Ltd. Method and system for providing a public key/secret key pair for encrypting and decrypting data
US8566601B1 (en) 2012-09-12 2013-10-22 Zeutro Llc Systems and methods for functional encryption using a string of arbitrary length
US9119062B2 (en) * 2012-10-19 2015-08-25 Qualcomm Incorporated Methods and apparatus for providing additional security for communication of sensitive information
US8763085B1 (en) 2012-12-19 2014-06-24 Trend Micro Incorporated Protection of remotely managed virtual machines
US8559631B1 (en) 2013-02-09 2013-10-15 Zeutro Llc Systems and methods for efficient decryption of attribute-based encryption
US20140237003A1 (en) * 2013-02-21 2014-08-21 Bank Of America Corporation Data Communication and Analytics Platform
US9020151B1 (en) 2013-03-04 2015-04-28 Trend Micro Incorporated Secure real-time data replication with disk encryption and key management system
CA2926651C (en) * 2013-10-07 2022-09-13 Fornetix Llc System and method for encryption key management, federation and distribution
US9197419B1 (en) 2013-10-14 2015-11-24 Trend Micro Incorporated Security system for data stored in the cloud
US9275242B1 (en) 2013-10-14 2016-03-01 Trend Micro Incorporated Security system for cloud-based emails
WO2015084305A1 (en) * 2013-12-02 2015-06-11 Intel Corporation Methods, systems, and apparatus to protect content based on persona
US10091507B2 (en) 2014-03-10 2018-10-02 Euclid Discoveries, Llc Perceptual optimization for model-based video encoding
US10097851B2 (en) 2014-03-10 2018-10-09 Euclid Discoveries, Llc Perceptual optimization for model-based video encoding
WO2015138008A1 (en) 2014-03-10 2015-09-17 Euclid Discoveries, Llc Continuous block tracking for temporal prediction in video encoding
CA2981789A1 (en) 2014-04-04 2015-10-08 David Goldschlag Method for authentication and assuring compliance of devices accessing external services
CN104008320A (en) * 2014-05-19 2014-08-27 惠州Tcl移动通信有限公司 Using permission and user mode control method and system based on face recognition
US10043015B2 (en) 2014-11-20 2018-08-07 At&T Intellectual Property I, L.P. Method and apparatus for applying a customer owned encryption
CN104967601A (en) * 2015-02-12 2015-10-07 腾讯科技(深圳)有限公司 Data processing method and apparatus
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10560440B2 (en) 2015-03-12 2020-02-11 Fornetix Llc Server-client PKI for applied key management system and process
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
TWI581599B (en) * 2015-04-30 2017-05-01 鴻海精密工業股份有限公司 Key generation system, data signature and encryption system and method
US10140600B2 (en) 2015-07-01 2018-11-27 Liveensure, Inc. System and method for mobile peer authentication and asset control
US10395253B2 (en) 2015-07-01 2019-08-27 Liveensure, Inc. System and method for securing and monetizing peer-to-peer digital content
US10931653B2 (en) * 2016-02-26 2021-02-23 Fornetix Llc System and method for hierarchy manipulation in an encryption key management system
US10917239B2 (en) 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
US11063980B2 (en) 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10860086B2 (en) 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US10848808B2 (en) * 2016-03-08 2020-11-24 Eagle Eye Networks, Inc. Apparatus for sharing private video streams with public service agencies
US11381605B2 (en) * 2016-03-08 2022-07-05 Eagle Eye Networks, Inc. System, methods, and apparatus for sharing private video stream assets with first responders
US10674116B2 (en) * 2016-03-08 2020-06-02 Eagle Eye Networks, Inc System and apparatus for sharing private video streams with first responders
US10939141B2 (en) * 2016-03-08 2021-03-02 Eagle Eye Networks, Inc. Apparatus for sharing private video streams with first responders and mobile method of operation
US10769285B2 (en) * 2016-05-18 2020-09-08 International Business Machines Corporation Privacy enabled runtime
US10255459B2 (en) 2016-05-18 2019-04-09 International Business Machines Corporation Privacy enabled runtime
CN114826673A (en) 2016-07-06 2022-07-29 华为技术有限公司 Protection system, method and device for transmission data
US10284885B1 (en) * 2017-01-30 2019-05-07 Noa, Inc. Method and apparatus for redacting video for compression and identification of releasing party
CN109818910B (en) * 2017-11-21 2022-07-01 中移(杭州)信息技术有限公司 Data transmission method, device and medium
EP3502806A1 (en) * 2017-12-22 2019-06-26 Siemens Aktiengesellschaft Method for protecting the production data for producing a product
US10911227B2 (en) * 2018-04-12 2021-02-02 Mastercard International Incorporated Method and system for managing centralized encryption and data format validation for secure real time multi-party data distribution
US11212264B1 (en) * 2019-05-30 2021-12-28 Wells Fargo Bank, N.A. Systems and methods for third party data protection
US11528256B1 (en) 2021-07-21 2022-12-13 Motorola Solutions, Inc. Anonymization service for sharing images or videos capturing identity of persons
CN114567500A (en) * 2022-03-04 2022-05-31 南京联成科技发展股份有限公司 Encryption method for data transmission of centralized control center

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030081785A1 (en) * 2001-08-13 2003-05-01 Dan Boneh Systems and methods for identity-based encryption and related cryptographic techniques
US20030182573A1 (en) * 2000-07-07 2003-09-25 Toneguzzo Steve John Content filtering and management
US6658415B1 (en) * 2000-04-28 2003-12-02 International Business Machines Corporation Monitoring and managing user access to content via a universally accessible database

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0277247B1 (en) 1986-07-31 1994-05-04 Kabushiki Kaisya Advance System for generating a shared cryptographic key and a communication system using the shared cryptographic key
US5272755A (en) 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5271061A (en) 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US5159632A (en) 1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US6061448A (en) 1997-04-01 2000-05-09 Tumbleweed Communications Corp. Method and system for dynamic server document encryption
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US20010016836A1 (en) * 1998-11-02 2001-08-23 Gilles Boccon-Gibod Method and apparatus for distributing multimedia information over a network
US6625734B1 (en) * 1999-04-26 2003-09-23 Disappearing, Inc. Controlling and tracking access to disseminated information
KR20030036788A (en) * 2000-09-14 2003-05-09 프로빅스, 인크. System for protecting objects distributed over a network
US6970562B2 (en) 2000-12-19 2005-11-29 Tricipher, Inc. System and method for crypto-key generation and use in cryptosystem
US7349538B2 (en) * 2002-03-21 2008-03-25 Ntt Docomo Inc. Hierarchical identity-based encryption and signature schemes
US6886096B2 (en) * 2002-11-14 2005-04-26 Voltage Security, Inc. Identity-based encryption system
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
US7571321B2 (en) * 2003-03-14 2009-08-04 Voltage Security, Inc. Identity-based-encryption messaging system
US7017181B2 (en) * 2003-06-25 2006-03-21 Voltage Security, Inc. Identity-based-encryption messaging system with public parameter host servers
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US7103911B2 (en) * 2003-10-17 2006-09-05 Voltage Security, Inc. Identity-based-encryption system with district policy information
US7346923B2 (en) * 2003-11-21 2008-03-18 International Business Machines Corporation Federated identity management within a distributed portal server
US7523314B2 (en) * 2003-12-22 2009-04-21 Voltage Security, Inc. Identity-based-encryption message management system
US7467399B2 (en) * 2004-03-31 2008-12-16 International Business Machines Corporation Context-sensitive confidentiality within federated environments
US7657037B2 (en) * 2004-09-20 2010-02-02 Pgp Corporation Apparatus and method for identity-based encryption within a conventional public-key infrastructure
US7657456B2 (en) * 2005-03-18 2010-02-02 Pitney Bowes Inc. Method and system for electronic voting using identity based encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6658415B1 (en) * 2000-04-28 2003-12-02 International Business Machines Corporation Monitoring and managing user access to content via a universally accessible database
US20030182573A1 (en) * 2000-07-07 2003-09-25 Toneguzzo Steve John Content filtering and management
US20030081785A1 (en) * 2001-08-13 2003-05-01 Dan Boneh Systems and methods for identity-based encryption and related cryptographic techniques

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHANDRAMOULI R.: "Application of XML tools for enterprise-wide rbrac implementation tasks", 7 May 2002 (2002-05-07), pages 11 - 18, XP000958089 *
MONT ET AL.: "Innovating the way confidential information is disclosed, at the right time", THE HP TIME VAULT SERVICE, 4 September 2002 (2002-09-04), XP002983449 *

Also Published As

Publication number Publication date
US8024769B2 (en) 2011-09-20
EP1593221A4 (en) 2011-08-24
US7003117B2 (en) 2006-02-21
CA2515078A1 (en) 2004-08-26
WO2004073230A2 (en) 2004-08-26
CA2515078C (en) 2013-12-31
US20040151308A1 (en) 2004-08-05
JP4619354B2 (en) 2011-01-26
JP2006516873A (en) 2006-07-06
EP1593221A2 (en) 2005-11-09
US20060123238A1 (en) 2006-06-08

Similar Documents

Publication Publication Date Title
WO2004073230A3 (en) Identity-based encryption system for secure data distribution
CN109559124A (en) A kind of cloud data safety sharing method based on block chain
GB2398712B (en) Privacy management of personal data
US20070127719A1 (en) Efficient management of cryptographic key generations
WO2006033997A3 (en) System and method for providing authorized access to digital content
DE60336181D1 (en) Secure digital data format and code-reinforced policy
CN107426162B (en) A kind of method based on attribute base encryption Implement Core mutual role help
Badsha et al. Blocynfo-share: Blockchain based cybersecurity information sharing with fine grained access control
ATE406726T1 (en) METHOD AND APPARATUS FOR STORING CRYPTOGRAPHIC KEYS, WHICH KEY SERVERS ARE AUTHENTICATED THROUGH POSSESSION AND SECURE DISTRIBUTION OF STORED KEYS
CN1939028A (en) Accessing protected data on network storage from multiple devices
WO2001043393A3 (en) Decoupling access control from key management in a network
CA2526791A1 (en) Method and system for providing personalized service mobility
WO2017061950A1 (en) Data security system and method for operation thereof
WO2022148182A1 (en) Key management method and related device
MX2007005856A (en) System and method for providing authorized access to digital content.
WO2009029699A1 (en) Private lock infrastructure
Murala et al. Secure dynamic groups data sharing with modified revocable attribute-based encryption in cloud
EP1611725B8 (en) Method and apparatuses for provisioning data access
KR101172793B1 (en) Master terminal device for registering and managing the terminal device included in personal using scope, method and system for using the same
Dixit et al. Encryption techniques & access control models for data security: A survey
AU2005223288B2 (en) Digital rights management
Galibus et al. Cloud storage security
CN112153072B (en) Computer network information safety control device
Shah Data security for cloud storage system using role based access control
BenMbarak et al. New secure access control model for cloud computing based on Chaotic systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2004707830

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2515078

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2006503306

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 2004707830

Country of ref document: EP