Protecting confidential digital information at application service providers

作者: Jonathan Huanes , Ravi Razdan

DOI:

关键词:

摘要: A method is described that allows data owned by a user to be stored in secure manner at third party site or service provider such the unable read use data. Further, user's made available from any machine and location holding keys necessary for encryption decryption of designated keyholder has access to.

参考文章(7)
Kenichiro Kigo, Masaki Kyojima, Kil-Ho Shin, Shunichi Kojima, Device for authenticating user's access rights to resources and method ,(1998)
Keith Holden Sheridan, Image distribution method and system ,(1996)
Christian Bielefeldt Hicks, Peter Janssen Creath, System and method for remote authorization for unlocking electronic data ,(1997)
Michalene M. Morgan Hill Casey, Mark J. Portola Valley Stefik, System for controlling the distribution and use of digital works ,(1995)
Sudheer Koneru, Lucy Chao, Aaron M. Contorer, Jeffrey A. Teper, Gordon Mangione, Rudolph Balaz, System and method for providing trusted brokering services over a distributed network ,(1996)