DISTRIBUTED SCALABLE CRYPTOGRAPHIC ACCESS CONTROL
1 Assignment
0 Petitions
Accused Products
Abstract
Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.
-
Citations
129 Claims
-
1-54. -54. (canceled)
-
55. :
- A computer implemented method comprising generating an encryption private key for a group in a deterministic manner from a random seed;
generating a corresponding encryption public key for the group;
publishing the corresponding encryption public key in a client key file for use by resource publishers to effectively grant access to resources published by the resource publishers to members of the group; and
publishing the deterministically generated encryption private key of the group for members of the group to access authorized published resources. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63)
- A computer implemented method comprising generating an encryption private key for a group in a deterministic manner from a random seed;
-
64-119. -119. (canceled)
-
120. :
- A peer system comprising;
storage medium having stored therein a plurality of programming instructions designed to enable the peer system to generate an encryption private key for a group in a deterministic manner from a random seed, generate a corresponding encryption public key for the group, publish the corresponding encryption public key in a client key file for use by resource publishers to effectively grant access to resources published by the resource publishers to members of the group, and publish the deterministically generated encryption private key of the group for members of the group to access authorized published resources;
at least one processor coupled to the storage medium to execute the programming instructions. - View Dependent Claims (121, 122, 123, 124, 125, 126, 127, 128)
- A peer system comprising;
-
129-130. -130. (canceled)
Specification