The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 12, 2021

Filed:

Jul. 15, 2019
Applicant:

Amazon Technologies, Inc., Seattle, WA (US);

Inventors:

Gregory B. Roth, Seattle, WA (US);

Marc R. Barbour, Woodinville, WA (US);

Bradley Jeffery Behm, Seattle, WA (US);

Cristian M. Ilac, Sammamish, WA (US);

Eric Jason Brandwine, Haymarket, VA (US);

Assignee:

Amazon Technologies, Inc., Seattle, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 9/08 (2006.01); G06F 21/64 (2013.01);
U.S. Cl.
CPC ...
H04L 63/062 (2013.01); G06F 21/64 (2013.01); H04L 9/0836 (2013.01); H04L 9/321 (2013.01); H04L 9/3242 (2013.01); H04L 9/3247 (2013.01); H04L 63/06 (2013.01); H04L 63/08 (2013.01); H04L 2209/38 (2013.01); H04L 2209/60 (2013.01); H04L 2463/061 (2013.01);
Abstract

Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.


Find Patent Forward Citations

Loading…