http://rdf.ncbi.nlm.nih.gov/pubchem/patent/KR-100996784-B1
Outgoing Links
Predicate | Object |
---|---|
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-6218 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F15-163 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-163 |
filingDate | 2003-04-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 2010-11-25-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationDate | 2010-11-25-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | KR-100996784-B1 |
titleOfInvention | One or more computer readable media storing a method, system and a plurality of instructions implemented in a computing device for storage and retrieval of data based on public key encryption. |
abstract | According to one aspect of the invention, data is retrieved from the calling program. A ciphertext containing this data is generated using public key cryptography in such a way that only one or more target programs can obtain data from the ciphertext. According to another aspect of the invention, a bit string is retrieved from the calling program. The identifier of the calling program is checked to determine if the calling program is allowed to access the data encrypted in the ciphertext of the bit string. The data is decrypted using public key decryption and returned to the calling program only if the calling program is allowed to access the data.n n n n Encryption, decryption, public key encryption, public key decryption, calling program, identifier, target program |
priorityDate | 2002-04-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 20.