CRYPTOGRAPHIC METHOD AND SYSTEM
First Claim
1. A method of enabling the provisioning of keys between a first user and a second user, the first user having a first computer, a first key and a first bootstrap key, and the second user having a second computer and a second key, the method comprising the steps of:
- the first computer encrypting the first key with the first bootstrap key;
the first user providing the encrypted first key to the second user via a first data store;
the first user providing to the second user the first bootstrap key and in a manner independent of the first data store;
the second computer decrypting the encrypted first key with the first bootstrap key for use by the second user;
the second computer encrypting the second key with the first key;
the second user providing the encrypted second key to the first user via a second data store; and
the first computer decrypting the encrypted second key with the first key for use by the first user.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to the field of security of electronic data and/or communications. In one form, the invention relates to data security and/or privacy in a distributed and/or decentralised network environment. In another form, the invention relates to enabling private collaboration and/or information sharing between users, agents and/or applications. Embodiment(s) of the present invention enable the sharing of key(s) and/or content between a first user and/or agent and a second user and/or agent. Furthermore, embodiment(s) of the present invention have application in sharing encrypted information via information sharing services.
A number of inventions, aspects and embodiments are disclosed herein.
-
Citations
67 Claims
-
1. A method of enabling the provisioning of keys between a first user and a second user, the first user having a first computer, a first key and a first bootstrap key, and the second user having a second computer and a second key, the method comprising the steps of:
-
the first computer encrypting the first key with the first bootstrap key; the first user providing the encrypted first key to the second user via a first data store; the first user providing to the second user the first bootstrap key and in a manner independent of the first data store; the second computer decrypting the encrypted first key with the first bootstrap key for use by the second user; the second computer encrypting the second key with the first key; the second user providing the encrypted second key to the first user via a second data store; and the first computer decrypting the encrypted second key with the first key for use by the first user. - View Dependent Claims (2, 3, 7, 8, 13, 15, 16, 23, 26, 31, 32, 33, 34, 35, 37, 59, 60)
-
-
4-6. -6. (canceled)
-
9-12. -12. (canceled)
-
14. (canceled)
-
17-22. -22. (canceled)
-
24-25. -25. (canceled)
-
27-30. -30. (canceled)
-
36. (canceled)
-
38-58. -58. (canceled)
-
61. A computer readable storage medium for storing in non-transient form an application for executing a method of enabling the provisioning of keys between a first user and a second user, the first user having a first computer, a first key and a first bootstrap key, and the second user having a second computer and a second key, the method comprising the steps of:
-
the first computer encrypting the first key with the first bootstrap key; the first user providing the encrypted first key to the second user via a first data store; the first user providing to the second user the first bootstrap key and in a manner independent of the first data store; the second computer decrypting the encrypted first key with the first bootstrap key for use by the second user; the second computer encrypting the second key with the first key; the second user providing the encrypted second key to the first user via a second data store; and the first computer decrypting the encrypted second key with the first key for use by the first user.
-
-
62. A system operative on the basis of a provisioning of keys between a first user and a second user, comprising:
-
a first computer operable by the first user, the first computer having access to a first key and a first bootstrap key, a second computer operable by the second user, the second computer having access to a second key, and at least one data store, wherein the first computer is operative to encrypt the first key with the first bootstrap key; wherein the encrypted first key is provided to the second user via a first data store; wherein the first user provides to the second user the first bootstrap key and in a manner independent of the first data store; wherein the second computer is operative to decrypt the encrypted first key with the first bootstrap key for use by the second user; wherein the second computer is operative to encrypt the second key with the first key; wherein the second user provides the encrypted second key to the first user via a second data store; and wherein the first computer is operative to decrypt the encrypted second key with the first key for use by the first user. - View Dependent Claims (63, 64, 65, 66, 67)
-
Specification