Utilization Of A Proxy Technique In Escrow Encryption Key Usage

  • Published: Sep 8, 2017
  • Earliest Priority: Mar 04 2016
  • Family: 2
  • Cited Works: 0
  • Cited by: 0
  • Cites: 5
  • Additional Info: Full text
Abstract

In one or more embodiments, an encryption key of a device may be split into multiple segments. One of the segments may be retained by an owner of the device, and some of the segments may be distributed to multiple entities. For example, one of the segments may be provided to a service provider, and one of the segments may be provided to an escrow agent. The escrow agent may process its segment, provide information based on its segment to a public ledger, and destroy its segment. A proxy agent may retrieve, from the public ledger, the information based on the segment provided to the escrow agent and obtain compensation. When the proxy agent obtains the compensation, the public ledger exhibits information utilizable to obtain the segment provided to the escrow agent. With the segments provided to the escrow agent and the service provider, the encryption key may be obtained.


Claims
Download PDF
Document Preview
Document History
  • Publication: Sep 8, 2017
  • Application: Mar 2, 2017
    WO US 2017/0020359 W
  • Priority: Mar 1, 2017
    US US 201715446788 A
  • Priority: Mar 4, 2016
    US US 201662303875 P

Download Citation


Sign in to the Lens

Feedback