Supercharge Your Innovation With Domain-Expert AI Agents!

Controlling access to data

A technology of data and data identification, applied in digital data protection, data exchange network, electronic digital data processing, etc.

Pending Publication Date: 2020-02-07
SCENTRICS INFORMATION SECURITY TECH
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, applicants have realized that such binary access control (i.e.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling access to data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0160] figure 1 A first human user 1 and a second human user 2 are shown. A first user 1 uses a first communication device 3 and a second user 2 uses a second communication device 4 . These devices 3 , 4 are communicatively linked via the Internet 5 . They can be mobile phones, laptops, personal computers or any other electronic communication devices.

[0161] The key server 6 and feature server 7 are also connected to the Internet 5 . Access to these servers 6, 7 may be restricted to authorized users.

[0162] In a specific example of use, a first user 1 is sending a confidential email to a second user 2 . The first user 1 enters an email into the first communication device 3 and identifies one or more intended recipients, thereby defining an access control list (ACL) of the names of those users who will be allowed to decrypt the email. In this example, the ACL only contains the second user2.

[0163] Subsequently, the first communication device 3 initiates a secure com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption and decryption system is provided. An electronic encryption apparatus (3) is configured to extract a feature set from plaintext data using a lossy algorithm, encrypt the feature set,send it to a feature server (7), receive an access control list (ACL), send the same to a key server (6), and receive back an encryption key (9), which is used to encrypt the plaintext data. A data identifier is also exchanged. An electronic decryption apparatus (4) is configured to send the data identifier to the key server (6), identify an entity (2) to the key server (6), receive a decryptionkey from the key server (6), and decrypt the encrypted data. The key server (6) stores the ACL and data identifier in mutual association. When it receives a data identifier and entity identifier fromthe electronic decryption apparatus (4), it checks the entity (2) is on the ACL associated with the data identifier, and returns the decryption key.

Description

technical field [0001] The present invention relates to devices, systems and methods for encrypting and decrypting data. Background technique [0002] Mathematical encryption algorithms are widely used to protect data during data storage or transmission. Possession of a valid cryptographic decryption key allows encrypted data to be decrypted and used. For example, an author of an email may encrypt sensitive attachments before sending the email to one or more recipients over the Internet. [0003] If a party possesses a valid decryption key, that party can access the original data (also known as plaintext data). A party that does not possess a valid decryption key cannot access the original data. [0004] However, applicants have realized that such binary access control (ie access or no access depending on possession of a key) has certain limitations. In particular, Applicants have recognized that there are situations where it is desirable to have more fine-grained contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L29/06G06F21/62G06Q30/02H04L29/08H04L12/58
CPCG06F21/6254G06Q30/0271G06Q30/0277H04L63/0435H04L63/045H04L63/062H04L63/101H04W12/033H04L51/214H04L51/52H04L67/53G06F21/602H04L9/14
Inventor 约翰·斯图尔特·肖伊-泰勒古鲁·巴拉恩·钱德拉塞卡兰
Owner SCENTRICS INFORMATION SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More