会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • SECURE ACCESS FOR ENCRYPTED DATA
    • 加密数据的安全访问
    • US20150149772A1
    • 2015-05-28
    • US14087045
    • 2013-11-22
    • Cisco Technology, Inc.
    • Nicholas Read LeavyVenkata Krishna Sashank Dara
    • H04L9/08
    • H04L9/0822H04L63/0428H04L63/0442H04L63/06H04L2209/24H04L2463/062
    • Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    • 实施例通常提供用于管理数据安全性的技术。 一个实施例包括在客户端系统处提供可以使用更衣室密钥进行解密的加密专用密钥。 从远程系统接收加密的数据,并且实施例确定可以使用通过解密加密的私钥恢复的专用密钥来解密所接收的加密数据。 向远程系统发送对应于加密私钥的锁匙的请求,并从远程系统接收所请求的锁匙。 实施例使用接收到的锁定密钥解密加密的私钥以恢复私钥,并且使用私钥对加密的数据进行解密。
    • 8. 发明授权
    • Secure access for encrypted data
    • 加密数据的安全访问
    • US09246676B2
    • 2016-01-26
    • US14087045
    • 2013-11-22
    • Cisco Technology, Inc.
    • Nicholas Read LeavyVenkata Krishna Sashank Dara
    • H04L29/06H04L9/08
    • H04L9/0822H04L63/0428H04L63/0442H04L63/06H04L2209/24H04L2463/062
    • Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    • 实施例通常提供用于管理数据安全性的技术。 一个实施例包括在客户端系统处提供可以使用更衣室密钥进行解密的加密专用密钥。 从远程系统接收加密的数据,并且实施例确定可以使用通过解密加密的私钥恢复的专用密钥来解密所接收的加密数据。 向远程系统发送对应于加密私钥的锁匙的请求,并从远程系统接收所请求的锁匙。 实施例使用接收到的锁定密钥解密加密的私钥以恢复私钥,并且使用私钥对加密的数据进行解密。