Method, system and device for enabling delegation of authority and access control methods based on delegated authority

A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chen, Liqun, Crane, Stephen James, Goh, Cheh
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Chen, Liqun
Crane, Stephen James
Goh, Cheh
description A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_07516321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>07516321</sourcerecordid><originalsourceid>FETCH-uspatents_grants_075163213</originalsourceid><addsrcrecordid>eNqNjEEKwjAQRbNxIeod5gAK1qI9gChu3LmXaTKJgXQimbTQ2xtLce3q8z_v_aUa7pRf0WxBRsnUAbIBQ4PXBDYmIMY2eHZlC-Qw-8gQLWBfpOTzOPGoNYmAjpxTDNBNjwItChkowuyW8vPWamExCG3mXCm4Xh7n266XdyE5y9Ml_Ma-OVan-lDVfyAfpS1GcQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method, system and device for enabling delegation of authority and access control methods based on delegated authority</title><source>USPTO Issued Patents</source><creator>Chen, Liqun ; Crane, Stephen James ; Goh, Cheh</creator><creatorcontrib>Chen, Liqun ; Crane, Stephen James ; Goh, Cheh ; Hewlett-Packard Development Company, L.P</creatorcontrib><description>A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.</description><language>eng</language><creationdate>2009</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7516321$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,780,802,885,64037</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7516321$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Chen, Liqun</creatorcontrib><creatorcontrib>Crane, Stephen James</creatorcontrib><creatorcontrib>Goh, Cheh</creatorcontrib><creatorcontrib>Hewlett-Packard Development Company, L.P</creatorcontrib><title>Method, system and device for enabling delegation of authority and access control methods based on delegated authority</title><description>A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2009</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNqNjEEKwjAQRbNxIeod5gAK1qI9gChu3LmXaTKJgXQimbTQ2xtLce3q8z_v_aUa7pRf0WxBRsnUAbIBQ4PXBDYmIMY2eHZlC-Qw-8gQLWBfpOTzOPGoNYmAjpxTDNBNjwItChkowuyW8vPWamExCG3mXCm4Xh7n266XdyE5y9Ml_Ma-OVan-lDVfyAfpS1GcQ</recordid><startdate>20090407</startdate><enddate>20090407</enddate><creator>Chen, Liqun</creator><creator>Crane, Stephen James</creator><creator>Goh, Cheh</creator><scope>EFH</scope></search><sort><creationdate>20090407</creationdate><title>Method, system and device for enabling delegation of authority and access control methods based on delegated authority</title><author>Chen, Liqun ; Crane, Stephen James ; Goh, Cheh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_075163213</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2009</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Chen, Liqun</creatorcontrib><creatorcontrib>Crane, Stephen James</creatorcontrib><creatorcontrib>Goh, Cheh</creatorcontrib><creatorcontrib>Hewlett-Packard Development Company, L.P</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Liqun</au><au>Crane, Stephen James</au><au>Goh, Cheh</au><aucorp>Hewlett-Packard Development Company, L.P</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method, system and device for enabling delegation of authority and access control methods based on delegated authority</title><date>2009-04-07</date><risdate>2009</risdate><abstract>A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_07516321
source USPTO Issued Patents
title Method, system and device for enabling delegation of authority and access control methods based on delegated authority
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T14%3A11%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Chen,%20Liqun&rft.aucorp=Hewlett-Packard%20Development%20Company,%20L.P&rft.date=2009-04-07&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E07516321%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true