首页>
外国专利>
System and method for data escrow and encryption key escrow
System and method for data escrow and encryption key escrow
展开▼
机译:数据托管和加密密钥托管的系统和方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
(57) Method and system for data escrow and encryption [summary] key escrow is disclosed. In key escrow encryption, only the public escrow key is stored in the (receiver) Transmitter Receiver (transmission side). Secret session key sender - to encrypt the message using the (secret session key KS), encryption leaf verification string first law enforcement access field and (encrypted leaf verification string -ELVS) (law enforcement access field -LEAF I want to generate a). Generates a second 2LEAF, receiver is compared with the first 1LEAF. In a data escrow encryption, encrypted user data restoration field - to generate a (data recovery field DRF), this field is access rule index - which includes a (access rule index ARI) user confidential (US) . In order to restore the US, decryption user data recovery center DRF - sent to the (data recovery center DRC), DRF The access rules that have been referenced in the ARI - presents a challenge based on the (access rule AR). Decryption if the user responds correctly to this challenge, DRC is sent to the decryption user US.
展开▼