AU1531402A - Method and system for escrowing of decryption keys - Google Patents

Method and system for escrowing of decryption keys

Info

Publication number
AU1531402A
AU1531402A AU15314/02A AU1531402A AU1531402A AU 1531402 A AU1531402 A AU 1531402A AU 15314/02 A AU15314/02 A AU 15314/02A AU 1531402 A AU1531402 A AU 1531402A AU 1531402 A AU1531402 A AU 1531402A
Authority
AU
Australia
Prior art keywords
escrowing
decryption keys
decryption
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
AU15314/02A
Inventor
Tony Mcnamara
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ABSOLUTEFUTURE Inc
Original Assignee
ABSOLUTEFUTURE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ABSOLUTEFUTURE Inc filed Critical ABSOLUTEFUTURE Inc
Publication of AU1531402A publication Critical patent/AU1531402A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
AU15314/02A 2000-10-02 2001-10-02 Method and system for escrowing of decryption keys Withdrawn AU1531402A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US23755000P 2000-10-02 2000-10-02
US60/237550 2000-10-02
PCT/US2001/030939 WO2002029516A2 (en) 2000-10-02 2001-10-02 Method and system for escrowing of decryption keys

Publications (1)

Publication Number Publication Date
AU1531402A true AU1531402A (en) 2002-04-15

Family

ID=22894211

Family Applications (1)

Application Number Title Priority Date Filing Date
AU15314/02A Withdrawn AU1531402A (en) 2000-10-02 2001-10-02 Method and system for escrowing of decryption keys

Country Status (2)

Country Link
AU (1) AU1531402A (en)
WO (1) WO2002029516A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2383238B (en) * 2001-12-14 2004-11-10 Hewlett Packard Co Digital document storage
US7587366B2 (en) 2004-10-14 2009-09-08 International Business Machines Corporation Secure information vault, exchange and processing system and method
US8224725B2 (en) 2004-10-14 2012-07-17 Google Inc. Escrowing digital property in a secure information vault
US8688590B2 (en) 2004-10-14 2014-04-01 Google Inc. System and method to strengthen advertiser and consumer affinity
US8620816B2 (en) 2004-10-14 2013-12-31 Google Inc. Information vault, data format conversion services system and method
US8874544B2 (en) 2005-01-13 2014-10-28 International Business Machines Corporation System and method for exposing internal search indices to internet search engines
US7660423B2 (en) * 2006-01-03 2010-02-09 Sun Microsystems, Inc. Method and apparatus for maintaining ephemeral keys in limited space
US11481511B2 (en) * 2017-11-03 2022-10-25 Visa International Service Association Secure identity and profiling system

Also Published As

Publication number Publication date
WO2002029516A2 (en) 2002-04-11

Similar Documents

Publication Publication Date Title
AU2585301A (en) System and method for trusted self-billing for utilities
AU2001275025A1 (en) Methods and systems for supplying encryption keys
AU2002229972A1 (en) Cryptographic key generation apparatus and method
AU6919500A (en) System and method for encrypting and decrypting files
AU2002214667A1 (en) System and method for rapid telepositioning
AU2001295043A1 (en) Method and system for query reformation
AU2001288372A1 (en) System and method for tele-ophthalmology
AU2001255366A1 (en) Systems and methods for encrypting/decrypting data
AU2002344740A1 (en) Improved data encryption and decryption system and method
AU2001234565A1 (en) System and method for user authentication
AU2002239500A1 (en) Cryptographic data security system and method
AU2001261225A1 (en) Method and system for hardware simulation
AU2001261977A1 (en) Method and system for teaching music
AU2001290646A1 (en) Data source integration system and method
AU2001257296A1 (en) System and method for encryption using transparent keys
AU2002222217A1 (en) Directoryless public key cryptographic system and method
AU6901200A (en) Form keys and method using form keys
AU2002249843A1 (en) Method and apparatus for masking secret multiplicands
AU2003294572A1 (en) System and method for the exchange of cryptographic keys
AU3028100A (en) Method and apparatus for masking cryptographic operations
AU2002215390A1 (en) Audit system and method
AU1531402A (en) Method and system for escrowing of decryption keys
AU2001284237A1 (en) Method and system for generating performance data
AU2001292451A1 (en) Method and system for inputting characters
AU2001250824A1 (en) Method and system for coordinating secure transmission of information