Providing low risk exceptional access with verification of device possession
Abstract:
A method and system for providing unencrypted access to encrypted data that may be stored on a device, sent as a message, or sent as a real-time communications stream. The method may include using public key cryptography to securely enable accessing the encrypted data stored on a device or communicated by a device. For instance, the method may include using a device vendor's public key to securely enable that vendor to enable only authorized parties to themselves decrypt previously-encrypted device storage, messages, or real-time communications streams. As an added layer of cybersecurity, the method may include a proof of possession verification process that authenticates the identity of an authorized party before any decryption data is provided.
Information query
Patent Agency Ranking
0/0