Identity-based encryption system for secure data distribution
First Claim
1. A method for distributing data structures to users over a communications network, the method comprising:
- at a data packaging service, receiving a plurality of data structures having different associated data types and associated attributes;
at the data packaging service, using information on which data type is associated with each data structure to select some of the attributes associated with that data structure;
at the data packaging service, using the selected attributes for each data structure in forming a policy-based public key for that data structure;
at the data packaging service, using an identity-based encryption engine to encrypt each data structure based on identity-based-encryption public parameter information and the public key for that data structure; and
at the data packaging service, distributing each encrypted data structure to a plurality of users over the communications network, wherein each data structure has associated data type encryption policy information and wherein using information on which data type is associated with each data structure to select the attributes comprises using the data type encryption policy information to select the attributes.
11 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that allows encrypted content to be distributed to users over a communications network. A policy enforcement service may use an identity-based encryption algorithm to generate public parameter information and private keys. Data content may be encrypted prior to distribution using an identity-based encryption engine. The encryption engine may use the public parameter information from the policy service and public key information to encrypt the data. The public key information may be based on policy information that specifies which types of users are allowed to access the data that is encrypted using that public key. A user may obtain a private key for unlocking particular encrypted data by providing a key request to the policy enforcement service that contains the public key. The policy enforcement service may enforce the policies given by the policy information and may provide private keys only to authorized users.
-
Citations
14 Claims
-
1. A method for distributing data structures to users over a communications network, the method comprising:
-
at a data packaging service, receiving a plurality of data structures having different associated data types and associated attributes; at the data packaging service, using information on which data type is associated with each data structure to select some of the attributes associated with that data structure; at the data packaging service, using the selected attributes for each data structure in forming a policy-based public key for that data structure; at the data packaging service, using an identity-based encryption engine to encrypt each data structure based on identity-based-encryption public parameter information and the public key for that data structure; and at the data packaging service, distributing each encrypted data structure to a plurality of users over the communications network, wherein each data structure has associated data type encryption policy information and wherein using information on which data type is associated with each data structure to select the attributes comprises using the data type encryption policy information to select the attributes. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for distributing data structures to users over a communications network, the method comprising:
-
at a data packaging service, receiving a plurality of data structures having different associated data types and associated attributes; at the data packaging service, using information on which data type is associated with each data structure to select some of the attributes associated with that data structure; at the data packaging service, using the selected attributes for each data structure in forming a policy-based public key for that data structure; at the data packaging service, using an identity-based encryption engine to encrypt each data structure based on identity-based-encryption public parameter information and the public key for that data structure; and at the data packaging service, distributing each encrypted data structure to a plurality of users over the communications network, wherein each data structure contains associated data type encryption policy information and wherein using information on which data type is associated with each data structure to select the attributes comprises using the data type encryption policy information to select the attributes. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification