CPC G06F 21/78 (2013.01) [G06F 16/258 (2019.01); G06F 21/602 (2013.01); G06F 21/6227 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/085 (2013.01); H04L 9/0861 (2013.01); H04L 9/14 (2013.01); H04L 9/3226 (2013.01); H04L 9/3242 (2013.01); H04L 9/3247 (2013.01); H04L 63/0281 (2013.01); H04L 63/0442 (2013.01)] | 22 Claims |
1. A method of processing data comprising:
at least one processor operating an access control function to data using at least one input key;
the at least one input key each revealing a corresponding at least one access key configured to enable at least one operation on the data;
each respective revealed corresponding at least one access key combining in a respective logical operation with other revealed corresponding at least one access keys to specify a respective set of defined operations permitted on the data, wherein different combinations of respective revealed corresponding at least one access keys with other revealed corresponding at least one access keys yield different respective sets of defined operations permitted on the data; and
performing one of the defined operations on the data, wherein:
the performing produces at least one record of the one of the defined operations based on a selected combination of respective revealed corresponding at least one access keys used to perform the one of the defined operations,
the one of the defined operations performed on the data is a write operation on the data in response to a first revealed corresponding access key being an encrypting key and a second revealed corresponding access key being a signing key,
the one of the defined operations performed on the data is a read operation on the data in response to the first revealed corresponding access key being a verification key and the second revealed corresponding access key being a decryption key, and
the one of the defined operations performed on the data is a verify operation on the data in response to the first revealed corresponding access key being a verification key.
|