Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure Key Management for Roaming Protected Content

A protected, content technology for public keys, key distribution for secure communications

Active Publication Date: 2021-05-25
MICROSOFT TECH LICENSING LLC
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, providing data to such services can be annoying to the user, as it can result in his or her data that the user would otherwise keep private, becoming available to the service provider or other entity (e.g., hacking). or malicious users who otherwise compromise the service) are available

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Key Management for Roaming Protected Content
  • Secure Key Management for Roaming Protected Content
  • Secure Key Management for Roaming Protected Content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] This article discusses security key management for roaming protected content. A user of a device has a specific identity (for example, a user account) when using the device. Content on the device is encrypted and protected based on a data protection key corresponding to and protected by the specific identity. The content may be encrypted using the data protection key, or one or more other keys used to encrypt the content may be encrypted using the data protection key. The protected content can then be copied to the cloud storage, and the protected content can be transferred from the cloud storage to various other ones of the user's devices, which is also referred to as roaming the content.

[0011] As part of the protection, the content is encrypted and a key for decrypting the content is maintained by the user's device. The cloud storage device does not have access to the keys used to decrypt the content, and therefore cannot access the cleartext (unencrypted) conten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Content on the device is encrypted and protected based on a data protection key corresponding to the specific identity of the user of the device. The protected content can then be stored to the cloud storage, and the protected content can be transferred from the cloud storage to various other ones of the user's devices. The data protection keys used to retrieve plaintext content from protected content are maintained by the user's device. The data protection key may be securely communicated to other ones of the user's devices to allow any of the user's devices to access the protected content.

Description

Background technique [0001] As computing technology has advanced, many different types of computing devices have become common. Users often have a variety of different computing devices, such as laptop or desktop computers, tablet devices, smartphones, and so on. Networking services or cloud services can be used to allow users to share data across these multiple devices, giving users access to data from any of their multiple devices. However, providing data to such services can be annoying to the user, as it can result in his or her data that the user would otherwise keep private, becoming available to the service provider or other entity (e.g., hacking). or malicious users who otherwise compromise the service) are available. Contents of the invention [0002] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential fea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04W12/03H04W12/0433
CPCH04L9/0894H04L9/0897H04L63/0442H04W12/02H04W12/08H04W12/037G06F21/604G06F21/62G06F21/6209G06F21/6218H04L9/08H04L9/30
Inventor Y.A.梅塔I.巴斯莫夫O.T.尤雷彻P.J.诺沃特尼P.D.亚当M.拉卡尼S.辛哈N.S.阿查亚K.辛赫
Owner MICROSOFT TECH LICENSING LLC