17938711. BLIND SUBPOENA PROTECTION simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

BLIND SUBPOENA PROTECTION

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Ramarathnam Venkatesan of Redmond WA (US)

Nishanth Chandran of Bangalore (IN)

Panagiotis Antonopoulos of Redmond WA (US)

Srinath T.V. Setty of Redmond WA (US)

Basil Cherian of Bellevue WA (US)

Daniel John Carroll, Jr. of Columbia MD (US)

Jason Sydney Barnwell of Seattle WA (US)

BLIND SUBPOENA PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17938711 titled 'BLIND SUBPOENA PROTECTION

Simplified Explanation

Embodiments described in the patent application enable entities to access protected data by validating digital access requests without decrypting the encrypted secret shares. This process allows for secure access to data based on a security policy.

  • Entities can access protected data by validating digital access requests without decrypting encrypted secret shares.
  • Access to data is granted if all requests are validated and the security policy criteria are met.

Potential Applications

This technology could be applied in various industries such as cybersecurity, data protection, and secure information sharing platforms.

Problems Solved

1. Securely granting access to protected data without compromising the encryption of secret shares. 2. Enabling blind subpoenas to be performed for legal purposes.

Benefits

1. Enhanced security measures for accessing sensitive data. 2. Efficient validation process without the need for decryption. 3. Facilitates isolated access to data for specific purposes.

Potential Commercial Applications

"Secure Data Access Validation Technology in Cybersecurity"

Possible Prior Art

One possible prior art could be a similar system that validates access requests without decrypting secret shares, but the specific method described in this patent application may be unique.

Unanswered Questions

How does this technology compare to traditional access control methods in terms of efficiency and security?

This article does not provide a direct comparison between this technology and traditional access control methods. Further research or a comparative study would be needed to address this question.

What are the potential limitations or vulnerabilities of this technology in real-world applications?

The article does not discuss potential limitations or vulnerabilities of this technology. Additional analysis or testing would be required to identify and address any weaknesses in practical implementations.


Original Abstract Submitted

Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.