×

Systems and methods for securely managing access to data

  • US 8,261,320 B1
  • Filed: 06/30/2008
  • Issued: 09/04/2012
  • Est. Priority Date: 06/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for securely managing access to data, the method comprising:

  • identifying a request to access encrypted data, the request being made by an application running on an insecure platform;

    determining that a requestor has a right to access the encrypted data;

    decrypting the encrypted data to provide decrypted data;

    in response to identifying the request to access encrypted data and determining that the requestor has the right to access the encrypted data, permitting a secure platform to access the decrypted data, wherein;

    an authorization platform performs at least one of the steps of identifying, including, submitting, receiving, decrypting, and permitting;

    the insecure platform comprises an insecure virtual machine;

    the secure platform comprises a first secure virtual machine;

    the authorization platform comprises a second secure virtual machine;

    a hypervisor manages the insecure virtual machine, the first secure virtual machine, and the second secure virtual machine;

    the authorization platform comprises a proof-carrying authorization platform that facilitates authentication information being included with the request to access the encrypted data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×