×

Cloud key directory for federating data exchanges

  • US 9,992,191 B2
  • Filed: 12/02/2016
  • Issued: 06/05/2018
  • Est. Priority Date: 06/17/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method, implemented at a computer system that includes one or more processors, for decrypting and providing data based on attribute-based encryption, the method comprising:

  • receiving, from a first entity, a first data request associated with a first identity and comprising a search attribute describing data to be found in a data store that provides access to a plurality of portions of secured data of a plurality of clients, each portion of secured data being associated with a corresponding client-defined access control and being encrypted with an attribute-based encryption that associates each portion of secured data with at least one corresponding encryption attribute, the attribute-based encryption enabling each portion of secured data to be decrypted in response to a data request in accordance with the corresponding client-defined access control when the data request'"'"'s search attribute is relevant to the corresponding at least one encryption attribute;

    based at least on receiving the first data request;

    determining that the search attribute matches a particular encryption attribute, which is associated with a first portion of secured data of a first client;

    determining that a first access control defined by the first client grants the first identity access to the first portion of secured data; and

    based on the search attribute matching the particular encryption attribute, and based on first access control granting the first identity access to the first portion of secured data, decrypting the first portion of secured data and providing the decrypted first portion of data to the first entity;

    receiving, from a second entity, a second data request associated with a second identity and also comprising the search attribute; and

    based at least on receiving the second data request;

    determining that the search attribute matches to the particular encryption attribute, which is also associated with a second portion of secured data of a second client;

    determining that a second access control defined by the second client grants the second identity access to the second portion of secured data; and

    based on the search attribute matching the particular encryption attribute, and based on second access control granting the second identity access to the second portion of secured data, decrypting the second portion of secured data and providing the decrypted the second portion of data to the second entity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×