Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020112392 - TRUSTED EXECUTION BASED ON ENVIRONMENTAL FACTORS

Publication Number WO/2020/112392
Publication Date 04.06.2020
International Application No. PCT/US2019/061903
International Filing Date 18.11.2019
IPC
G06F 21/62 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
CPC
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 21/62
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/6209
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6209to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
H04L 9/0866
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
0866involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
H04L 9/0872
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
0872using geo-location information, e.g. location data, time, relative position or proximity to other entities
H04L 9/30
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Applicants
  • MICROSOFT TECHNOLOGY LICENSING, LLC [US]/[US]
Inventors
  • THALER, David Garfield, III
  • PFENNING, Joerg-Thomas
  • DIAZ-CUELLAR, Gerardo
Agents
  • MINHAS, Sandip S.
  • ADJEMIAN, Monica
  • BARKER, Doug
  • CHATTERJEE, Aaron C.
  • CHEN, Wei-Chen Nicholas
  • CHOI, Daniel
  • CHURNA, Timothy
  • DINH, Phong
  • EVANS, Patrick
  • GABRYJELSKI, Henry
  • GOLDSMITH, Micah P.
  • GUPTA, Anand
  • HINOJOSA-SMITH, Brianna L.
  • HWANG, William C.
  • JARDINE, John S.
  • LEE, Sunah
  • LEMMON, Marcus
  • MARQUIS, Thomas
  • MEYERS, Jessica
  • ROPER, Brandon
  • SPELLMAN, Steven
  • SULLIVAN, Kevin
  • SWAIN, Cassandra T.
  • TABOR, Ben
  • WALKER, Matt
  • WIGHT, Stephen A.
  • WISDOM, Gregg
  • WONG, Ellen
  • WONG, Thomas S.
  • ZHANG, Hannah
  • TRAN, Kimberly
Priority Data
16/200,77927.11.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) TRUSTED EXECUTION BASED ON ENVIRONMENTAL FACTORS
(FR) EXÉCUTION DE CONFIANCE BASÉE SUR DES FACTEURS ENVIRONNEMENTAUX
Abstract
(EN)
A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.
(FR)
La présente invention concerne un dispositif informatique, tel qu'un dispositif informatique personnel (par exemple, un ordinateur portatif, un téléphone intelligent, etc.) ou un serveur, qui est configuré pour utiliser des facteurs environnementaux lors de la génération de paires de clés publique/privée pour accéder à des données ou à des opérations restreintes. Les facteurs environnementaux peuvent comprendre l'emplacement, l'heure, la pression barométrique, l'accélération, la température, l'humidité et analogue. Une paire de clés initiale peut être utilisée pour chiffrer des données et activer d'autres caractéristiques de sécurité classiques. Une paire de clés peut être générée par la suite sur la base des mêmes facteurs environnementaux qu'avec la génération de paire de clés initiale et utilisée pour accéder aux données ou aux opérations qui ont été restreintes à l'aide de la paire de clés initiale.
Also published as
Latest bibliographic data on file with the International Bureau