TECHNIQUES FOR SECURE NETWORK SEARCHING
First Claim
1. A machine-implemented method, comprising:
- acquiring a search and return process instructions for subsequent delivery of search results of the search, wherein the search and return process instructions are initially defined by a principal;
encrypting the search using a first public key of a search service that is to perform the search;
encrypting the return process instructions using a second public key of a return process that is to return the search results;
submitting the encrypted search to the search service and the encrypted return process instructions to the return process; and
receiving, from the return process, the search results in accordance with the return process instructions.
7 Assignments
0 Petitions
Accused Products
Abstract
Techniques for network searching are provided. A search is defined and the search is encrypted in a format known to a search service. Return instructions are defined for delivering search results of the search to a principal that defined the search and the return instructions. The return instructions are encrypted in a different format know to a return search process. The encrypted search is delivered to the search service for processing the search and the encrypted return instructions are delivered to the return search process for handling search results provided by the search service and for conforming delivery of the search results to the return instructions.
64 Citations
25 Claims
-
1. A machine-implemented method, comprising:
-
acquiring a search and return process instructions for subsequent delivery of search results of the search, wherein the search and return process instructions are initially defined by a principal; encrypting the search using a first public key of a search service that is to perform the search; encrypting the return process instructions using a second public key of a return process that is to return the search results; submitting the encrypted search to the search service and the encrypted return process instructions to the return process; and receiving, from the return process, the search results in accordance with the return process instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A machine-implemented method, comprising:
-
receiving from a principal service an identity for a principal that is associated with a search being performed by a search service and receiving return search instructions in a first encrypted format; acquiring, from the search service, search results in a second encrypted format for the search that was executed by the search service; and sending to the principal the search results in accordance with a decrypted version of the return search instructions. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A machine-implemented method, comprising:
-
acquiring a temporary identity for a principal from an identity service along with a first public key, a first private key, a second public key, and a second private key for the temporary identity; acquiring, from the identity service, a search service public key for a search service and a return results public key for a search return process, the search service to process a search on behalf of the principal and then communicate the search results to the search return process in an encrypted format that uses the first public key, the first public key known to the search service but not the search return process and the second public key known to the search return process but not the search service; encrypting the search in a first format using the search service public key; encrypting return search instructions for the search results in a second format using the return results public key; sending the encrypted search in the first format to the search service over a wide-area network (WAN) connection; sending the encrypted return search instructions in the second format to the search return process over the WAN connection; receiving the search results from the search return process in response to the search service performing the search and receiving the search results in a third encrypted format and in accordance with the return search instructions; and decrypting the third encrypted format that the search results are in using one or more of the first private key and the second private key and providing the search results to the principal for use. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A machine-implemented system, comprising:
-
a request search service implemented in a machine accessible medium and to process on a machine; and a process search service implemented in a machine accessible medium and to process the machine or a different machine; wherein the request search service encrypts a search of a principal using a search service public key and encrypts search return instructions for delivering search results associated with the search service processing the search with a search return process public key, and wherein the encrypted search and search return instructions are delivered to the process search service, and wherein the process search service delivers the encrypted search to the search service along with a first public key for the principal and delivers the encrypted search return instructions to the search return process along with a second public key of the principal, and wherein the search is processed and the search results are encrypted by the search service using the first public key and delivered to the search return process, and the search return process encrypts the search results again with the second public key and then delivers the encrypted search results to the principal. - View Dependent Claims (23, 24, 25)
-
Specification