METHOD AND APPARATUS FOR FACILITATING PROVISION OF CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION
First Claim
1. A method comprising:
- causing, at least in part, reception at a first recipient one or more first data that are encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions; and
matching one or more second recipient criteria corresponding to the first recipient against the one or more first recipient criteria that encrypted the one or more first data;
decrypting with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria; and
executing automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for reducing communication traffic/cost and protecting content. A criterion application causes, at least in part, reception at a first recipient one or more first data encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions. The criterion application matches one or more second recipient criteria corresponding to the first recipient against the first recipient criteria that encrypted the first data. The criterion application decrypts with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria. The criterion application executes automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data.
63 Citations
21 Claims
-
1. A method comprising:
-
causing, at least in part, reception at a first recipient one or more first data that are encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions; and matching one or more second recipient criteria corresponding to the first recipient against the one or more first recipient criteria that encrypted the one or more first data; decrypting with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria; and executing automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, cause, at least in part, reception at a first recipient one or more first data that are encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions; and match one or more second recipient criteria corresponding to the first recipient against the one or more first recipient criteria that encrypted the one or more first data; decrypt with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria; and execute automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the following steps:
-
causing, at least in part, reception at a first recipient one or more first data that are encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions; and matching one or more second recipient criteria corresponding to the first recipient against the one or more first recipient criteria that encrypted the one or more first data; decrypting with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria; and executing automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data. - View Dependent Claims (18, 19, 20)
-
-
21-49. -49. (canceled)
Specification