AU1531402A - Method and system for escrowing of decryption keys - Google Patents
Method and system for escrowing of decryption keysInfo
- Publication number
- AU1531402A AU1531402A AU15314/02A AU1531402A AU1531402A AU 1531402 A AU1531402 A AU 1531402A AU 15314/02 A AU15314/02 A AU 15314/02A AU 1531402 A AU1531402 A AU 1531402A AU 1531402 A AU1531402 A AU 1531402A
- Authority
- AU
- Australia
- Prior art keywords
- escrowing
- decryption keys
- decryption
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US23755000P | 2000-10-02 | 2000-10-02 | |
US60/237550 | 2000-10-02 | ||
PCT/US2001/030939 WO2002029516A2 (en) | 2000-10-02 | 2001-10-02 | Method and system for escrowing of decryption keys |
Publications (1)
Publication Number | Publication Date |
---|---|
AU1531402A true AU1531402A (en) | 2002-04-15 |
Family
ID=22894211
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU15314/02A Withdrawn AU1531402A (en) | 2000-10-02 | 2001-10-02 | Method and system for escrowing of decryption keys |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU1531402A (en) |
WO (1) | WO2002029516A2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2383238B (en) * | 2001-12-14 | 2004-11-10 | Hewlett Packard Co | Digital document storage |
US7587366B2 (en) | 2004-10-14 | 2009-09-08 | International Business Machines Corporation | Secure information vault, exchange and processing system and method |
US8224725B2 (en) | 2004-10-14 | 2012-07-17 | Google Inc. | Escrowing digital property in a secure information vault |
US8688590B2 (en) | 2004-10-14 | 2014-04-01 | Google Inc. | System and method to strengthen advertiser and consumer affinity |
US8620816B2 (en) | 2004-10-14 | 2013-12-31 | Google Inc. | Information vault, data format conversion services system and method |
US8874544B2 (en) | 2005-01-13 | 2014-10-28 | International Business Machines Corporation | System and method for exposing internal search indices to internet search engines |
US7660423B2 (en) * | 2006-01-03 | 2010-02-09 | Sun Microsystems, Inc. | Method and apparatus for maintaining ephemeral keys in limited space |
US11481511B2 (en) * | 2017-11-03 | 2022-10-25 | Visa International Service Association | Secure identity and profiling system |
-
2001
- 2001-10-02 WO PCT/US2001/030939 patent/WO2002029516A2/en not_active Application Discontinuation
- 2001-10-02 AU AU15314/02A patent/AU1531402A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2002029516A2 (en) | 2002-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2585301A (en) | System and method for trusted self-billing for utilities | |
AU2001275025A1 (en) | Methods and systems for supplying encryption keys | |
AU2002229972A1 (en) | Cryptographic key generation apparatus and method | |
AU6919500A (en) | System and method for encrypting and decrypting files | |
AU2002214667A1 (en) | System and method for rapid telepositioning | |
AU2001295043A1 (en) | Method and system for query reformation | |
AU2001288372A1 (en) | System and method for tele-ophthalmology | |
AU2001255366A1 (en) | Systems and methods for encrypting/decrypting data | |
AU2002344740A1 (en) | Improved data encryption and decryption system and method | |
AU2001234565A1 (en) | System and method for user authentication | |
AU2002239500A1 (en) | Cryptographic data security system and method | |
AU2001261225A1 (en) | Method and system for hardware simulation | |
AU2001261977A1 (en) | Method and system for teaching music | |
AU2001290646A1 (en) | Data source integration system and method | |
AU2001257296A1 (en) | System and method for encryption using transparent keys | |
AU2002222217A1 (en) | Directoryless public key cryptographic system and method | |
AU6901200A (en) | Form keys and method using form keys | |
AU2002249843A1 (en) | Method and apparatus for masking secret multiplicands | |
AU2003294572A1 (en) | System and method for the exchange of cryptographic keys | |
AU3028100A (en) | Method and apparatus for masking cryptographic operations | |
AU2002215390A1 (en) | Audit system and method | |
AU1531402A (en) | Method and system for escrowing of decryption keys | |
AU2001284237A1 (en) | Method and system for generating performance data | |
AU2001292451A1 (en) | Method and system for inputting characters | |
AU2001250824A1 (en) | Method and system for coordinating secure transmission of information |