Encrypted Data Processing
First Claim
Patent Images
1. A computer-implemented method of processing data by a first processor, the data being generated by a second processor, the method comprising:
- receiving a data object encrypted with a first encryption key, the data object comprising;
said data to be processed; and
policy data indicating allowed processing for said data;
decrypting said received data object based upon said first encryption key; and
processing said data only in accordance with said policy data.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method of processing data by a first processor, the data being generated by a second processor. The method comprises receiving a data object encrypted with a first encryption key, the data object comprising the data to be processed and policy data indicating allowed processing for said data. said received data object is decrypted based upon said first encryption key and the data is processed only in accordance with the policy data.
-
Citations
24 Claims
-
1. A computer-implemented method of processing data by a first processor, the data being generated by a second processor, the method comprising:
-
receiving a data object encrypted with a first encryption key, the data object comprising; said data to be processed; and policy data indicating allowed processing for said data; decrypting said received data object based upon said first encryption key; and processing said data only in accordance with said policy data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer readable medium storing a secure data object encrypted with a first encryption key, the data object comprising:
-
data to be processed; and a policy indicating allowed processing for said data.
-
Specification