CRYPTOGRAPHIC METHOD AND SYSTEM
First Claim
Patent Images
1. A method of accessing encrypted content via one or more data stores accessible by a first user having a first computer, the method comprising the steps of:
- providing a first blob to a first data store, the first blob comprising encrypted content, encrypted with a first content key;
providing a second blob to a second data store, the second blob comprising an encrypted first content key;
providing the first and second blobs and rights management criteria for use by the first computer;
decrypting the second blob by the first computer to obtain the first content key and enabling the decryption of the first blob to obtain unencrypted content; and
providing the unencrypted content by the first computer to the first user via a client-side application,wherein the client-side application controls operations available that the first user can perform on the content in accordance with the rights management criteria.
2 Assignments
0 Petitions
Accused Products
Abstract
In the field of security for electronic data and/or communications, a method of providing data security and/or privacy in a distributed and/or decentralised network environment. Private collaboration and/or information sharing between users, agents and/or applications is enabled, as well as the sharing of key(s) and/or content between a first user and/or agent and a second user and/or agent. The sharing may be of encrypted information via information sharing services.
-
Citations
17 Claims
-
1. A method of accessing encrypted content via one or more data stores accessible by a first user having a first computer, the method comprising the steps of:
-
providing a first blob to a first data store, the first blob comprising encrypted content, encrypted with a first content key; providing a second blob to a second data store, the second blob comprising an encrypted first content key; providing the first and second blobs and rights management criteria for use by the first computer; decrypting the second blob by the first computer to obtain the first content key and enabling the decryption of the first blob to obtain unencrypted content; and providing the unencrypted content by the first computer to the first user via a client-side application, wherein the client-side application controls operations available that the first user can perform on the content in accordance with the rights management criteria. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification