Microsoft technology licensing, llc (20240119168). BLIND SUBPOENA PROTECTION simplified abstract

From WikiPatents
Jump to navigation Jump to search

BLIND SUBPOENA PROTECTION

Organization Name

microsoft technology licensing, llc

Inventor(s)

Ramarathnam Venkatesan of Redmond WA (US)

Nishanth Chandran of Bangalore (IN)

Panagiotis Antonopoulos of Redmond WA (US)

Srinath T.V. Setty of Redmond WA (US)

Basil Cherian of Bellevue WA (US)

Daniel John Carroll, Jr. of Columbia MD (US)

Jason Sydney Barnwell of Seattle WA (US)

BLIND SUBPOENA PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240119168 titled 'BLIND SUBPOENA PROTECTION

Simplified Explanation

The patent application describes a system that allows entities to access protected data by validating digital access requests without decrypting secret shares.

  • Entities can access protected data by validating digital access requests with encrypted secret shares.
  • The system verifies that access criteria of a security policy are met before providing access to the data.
  • The technology enables blind subpoenas and isolated access to data for specific purposes.

Potential Applications

The technology could be applied in industries where secure data access is crucial, such as healthcare, finance, and government.

Problems Solved

This technology solves the problem of securely granting access to protected data without compromising the security of the information.

Benefits

The system provides a secure and efficient way for entities to access protected data without the need to decrypt secret shares, ensuring data privacy and security.

Potential Commercial Applications

Potential commercial applications include secure data sharing platforms, encrypted communication systems, and secure cloud storage services.

Possible Prior Art

One possible prior art could be systems that use encryption and validation techniques to secure data access, but may not specifically address the blind subpoena aspect of the described technology.

Unanswered Questions

How does the system handle invalid digital access requests?

The patent application does not specify how the system deals with invalid access requests that do not meet the security policy criteria.

What measures are in place to prevent unauthorized access to the encrypted secret shares?

The patent application does not detail the specific security measures in place to protect the encrypted secret shares from unauthorized access.


Original Abstract Submitted

embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. the respective digital access requests are received, each comprising a proof. for each request, an encrypted secret share is obtained from a respective ledger database. each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. in response to validating all of the requests, a verification that an access criteria of a security policy is met is made. if so, at least one of the entities is provided with access to data protected by the security policy. in an aspect, embodiments enable a blind subpoena to be performed. in another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.