Secure Key Management for Roaming Protected Content
A protected, content technology for public keys, key distribution for secure communications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] This article discusses security key management for roaming protected content. A user of a device has a specific identity (for example, a user account) when using the device. Content on the device is encrypted and protected based on a data protection key corresponding to and protected by the specific identity. The content may be encrypted using the data protection key, or one or more other keys used to encrypt the content may be encrypted using the data protection key. The protected content can then be copied to the cloud storage, and the protected content can be transferred from the cloud storage to various other ones of the user's devices, which is also referred to as roaming the content.
[0011] As part of the protection, the content is encrypted and a key for decrypting the content is maintained by the user's device. The cloud storage device does not have access to the keys used to decrypt the content, and therefore cannot access the cleartext (unencrypted) conten...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


