Believably trustworthy enforcement of privacy enhancing technologies in data processing
First Claim
Patent Images
1. A system, comprising:
- a first computer that is in communication with a second computer, wherein the first computer comprises a privacy enhancing technology; and
a certifier for ensuring that the privacy enhancing technology is being implemented on the first computer, wherein a certification is communicated to the second computer regarding the implementation of the privacy enhancing technology on the first computer.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for trustworthy enforcement of privacy enhancing technologies within a data processing system enable data processing systems to communicate a believable statement that privacy is being protected in a trustworthy fashion. The invention includes providing for trustworthy enforcement of privacy enhancing technologies by establishing a standardized scheme for a privacy certification and routine inspection of data processing systems implementing privacy enhancing technologies. The regime of certification and inspection may be coupled with other technologies such as cryptography, tamper-evident computing, and runtime security enforcement.
36 Citations
36 Claims
-
1. A system, comprising:
-
a first computer that is in communication with a second computer, wherein the first computer comprises a privacy enhancing technology; and
a certifier for ensuring that the privacy enhancing technology is being implemented on the first computer, wherein a certification is communicated to the second computer regarding the implementation of the privacy enhancing technology on the first computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
first privacy enhancing technology by providing cryptographically-protected data;
second privacy enhancing technology by providing secure software;
third privacy enhancing technology by providing secure hardware; and
a certifier for ensuring that the first, second, and third privacy enhancing technologies are being implemented on the system. - View Dependent Claims (14, 15)
-
-
16. A method comprising:
-
verifying that software on a computer comprises privacy enhancing technology;
verifying that hardware on the computer comprises privacy enhancing technology; and
sending a certification indicating that the hardware and software on the computer comprises privacy enhancing technology. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer-readable medium having computer-executable instructions for performing steps, comprising:
-
verifying that software on a computer comprises privacy enhancing technology;
verifying that hardware on the computer comprises privacy enhancing technology; and
preparing a certification indicating that the hardware and software on the computer comprises privacy enhancing technology. - View Dependent Claims (29)
-
-
30. A method, comprising:
-
sending a request from a first computer for a certification regarding implementation of a privacy enhancing technology on a second computer; and
receiving the certification at the first computer. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
Specification