US20010052071A1 - Encryption system with time-dependent decryption - Google Patents

Encryption system with time-dependent decryption Download PDF

Info

Publication number
US20010052071A1
US20010052071A1 US09/115,422 US11542298A US2001052071A1 US 20010052071 A1 US20010052071 A1 US 20010052071A1 US 11542298 A US11542298 A US 11542298A US 2001052071 A1 US2001052071 A1 US 2001052071A1
Authority
US
United States
Prior art keywords
time
key
information
decryption
manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/115,422
Other versions
US6381695B2 (en
Inventor
Michiharu Kudo
Masayuki Numao
Hiroshi Kawazoe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to IBM CORPORATION reassignment IBM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KAWAZOE, HIROSHI, KUDO, MICHIHARU, NUMAO, MASAYUKI
Publication of US20010052071A1 publication Critical patent/US20010052071A1/en
Application granted granted Critical
Publication of US6381695B2 publication Critical patent/US6381695B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Definitions

  • the present invention is directed to the field of encryption. It is more specifically directed to an encryption system.
  • FIG. 1 The use of a general certificate is shown in FIG. 1.
  • user B desires to encrypt data (M) and to transmit the encrypted data to user A
  • user B requests that a certification authority issue a certificate for user A.
  • This certificate includes the name of user A and a public encryption key (KEa) for user A, and also the digital signature of the certification authority for all the contents.
  • User B obtains the certificate for user A and confirms that the certification authority has provided the digital signature for the public encryption key for user A. If the digital signature is correct, user B encrypts the target message M by using the public encryption key (KEa) for user A, and transmits the encrypted message to user A.
  • KEa public encryption key
  • the general certificate is used to obtain a certain guarantee for a public encryption key for a partner (“Applied Cryptography,” Bruce Schneier, John Wiley & Suns, Inc., pp. 185-187, 1996), i.e., to provide a guarantee that no person other than user A can decrypt the encrypted data.
  • a condition for limiting the time during which user A can decrypt data can not be added to the general certificate.
  • a server use permission certificate includes an encryption key, which is used for encrypting data exchanged between a client machine and a key authority, and values for “current time” and “valid time.”
  • an encryption key of the present invention includes the subject for inhibiting decryption at times other than a decryption time.
  • the purposes of the keys differ.
  • the Kerberos system employs a symmetric key called DES
  • the present invention employs an asymmetric key.
  • a server use permission certificate includes a “current time” and a “valid time.”
  • the valid time for the issued server use permission certificate is designated to prevent the reading of a key.
  • the valid time for present invention doesn't define time for enabling the decryption of data that was encrypted using a public encryption key included in the certificate.
  • instruction identifier “Deferred delivery” is defined as an identifier for designating a mail delivery time. This is a description method for designating a time at which mail is to be delivered to an addressee. The identifier includes only a delivery time for a destination, and does not include a time for decrypting encrypted data. With this method, a time for decryption can not be designated in the certificate.
  • the UNIX system has a timed daemon program that synchronizes clocks at different workstations. This program communicates with a timed daemon program that is operating in another computer on the same LAN, and adjusts and synchronizes both clocks. However, since a daemon program merely adjust clocks, it differs from the time-key certificate manager of the present invention.
  • NTP network time protocol
  • a communication protocol called a network time protocol (NTP) that synchronizes clocks at workstations that are not linked together by a LAN (“Building Internet Firewalls,” D. B. Chapman and E. D. Zwicky, pp. 321 to 324, O'Reilly & Associates, Inc., 1995).
  • NTP network time protocol
  • a time broadcast is received, and a time server that constantly maintains the clock of a system is employed to adjust the clock of another system on the Internet to which that system is connected. Therefore, with this method, a time for enabling decryption of encrypted data can not be designated.
  • an encryption system with time-dependent decryption is constructed that has a time-key certificate manager for issuing a time-key certificate to guarantee that a time for enabling decryption of information is limited.
  • FIG. 2 An encryption system according to the present invention is shown in FIG. 2.
  • User B requests that a time-key certificate manager (hereinafter referred to simply as a time-key manager) issue a time-key certificate, including disclosure time information, and acquires it.
  • Data to be transmitted to user A are encrypted by using a public key for encryption (KEt) included in the time-key certificate, and the encrypted data are transmitted.
  • KEt public key for encryption
  • User A requests a decryption key from the time-key manager to decrypt the data received from user B. When the current time meets the decryption conditions, the decryption key is transmitted to user A, who can use it to decrypt the data.
  • KEt public key for encryption
  • the time-key certificate and the time-key manager are employed, the time during which a third party can acquire a decryption key for decrypting encrypted data can be limited.
  • the third party employs a time-key certificate to examine the public key for encryption included in a time-key certificate to determine whether or not it satisfies the decryption conditions.
  • the time-key manager issues a time-key certificate and then manages a decryption key.
  • a user encrypts data using his or her machine. And when the user acquires a time-key certificate, he or she can encrypt data in the same manner as for normal encryption by using a public encryption key included in the time-key certificate.
  • a public encryption key included in the time-key certificate it is possible to provide a system that ensures a high level of security and that, during the communication process, can prevent the alteration of data or wiretapping, which can occur when an external service is employed for encryption.
  • the user performing the encryption can trust the decryption condition service provided by the time-key certificate manager that issued the time-key certificate or by a person in charge of the server, so that an ID or a password used for an electronic safe system that satisfies a decryption condition need not be distributed to a person performing the decryption.
  • FIG. 1 is a diagram showing the use of a general certificate
  • FIG. 2 is a diagram showing the use of a time-key certificate
  • FIG. 3 is a diagram illustrating one embodiment of a disclosure time designation file transfer system
  • FIG. 4 is a diagram illustrating one embodiment of data library system having a disclosure date control function
  • FIG. 5 is a schematic diagram illustrating an example hardware arrangement for a system according to the present invention.
  • FIG. 6 is a diagram for an embodiment of a tendering system with a disclosure time function
  • FIG. 7 is a diagram for another embodiment of a tendering system with a disclosure time function
  • FIG. 8 is a diagram for an embodiment of an electronic safe system with a disclosure time function
  • FIG. 9 is a diagram for another embodiment of an electronic safe system with a disclosure time function.
  • FIG. 5 is a schematic diagram illustrating an example hardware arrangement for a system according to the present invention.
  • a system 100 includes a central processing unit (CPU) 1 and a memory 4 .
  • the CPU 1 and the memory 4 communicate across a bus 2 with a hard disk drive 13 , which is an auxiliary storage device.
  • a floppy disk drive (or a memory medium driver for an MO or a CD-ROM) 20 is connected to the bus 2 via a floppy disk controller 19 .
  • a floppy disk (or a memory medium for an MO or a CD-ROM) is inserted into the floppy disk drive (or a memory medium driver for an MO or a CD-ROM) 20 .
  • Code for a computer program for accomplishing the present invention can be recorded on the floppy disk or the hard disk drive 13 , or in a ROM 14 .
  • the computer program which interacts with an operating system to issue commands to the CPU 1 , is loaded into the memory 4 for execution.
  • the code for the computer program can be compressed, or can be divided into a plurality of segments to be recorded on a plurality of memory media.
  • the system 100 further includes user interface hardware components, such as a pointing device (a mouse, a joystick, etc.) 7 or a keyboard 6 , and a display 12 for providing visual data for a user. Furthermore, a printer and a modem can respectively be connected via a parallel port 16 and a serial port 15 .
  • the system 100 can be connected to a network through the serial port 15 and a modem, or through a communication adaptor card (ethernet or a token ring) 18 for communication with other computers.
  • a communication adaptor card ethernet or a token ring
  • An audio controller 21 performs D/A (digital/analog) conversion of an audio signal, and the converted signal is transmitted to an amplifier 22 for release sound through a loudspeaker 23 .
  • the audio controller 21 also performs A/D (analog/digital) conversion of audio information received at a microphone 24 , and obtains external audio information for the system 100 .
  • the encryption system of the present invention can be accomplished by an ordinary personal computer (PC) or workstation; a notebook PC; a palmtop PC; a network computer; an electric home appliance, such as a television incorporating a computer; a game machine having a communication function; a communication terminal having a communication function, such as a home telephone, a facsimile machine, a portable telephone, a PHS terminal or an electronic notebook; or a combination of such devices.
  • PC personal computer
  • notebook PC a notebook PC
  • a palmtop PC a network computer
  • an electric home appliance such as a television incorporating a computer
  • a game machine having a communication function
  • a communication terminal having a communication function such as a home telephone, a facsimile machine, a portable telephone, a PHS terminal or an electronic notebook
  • a decryption enabled time is a designated decryption condition.
  • the encryption system with time-dependent decryption is constituted by a time-key certificate and a time-key certificate manager.
  • the time-key certificate is employed when a third party proves that an public encryption key added to the certificate satisfies the decryption condition.
  • the time-key certificate manager issues the time-key certificate and then manages a decryption key.
  • information for which access is inhibited until a disclosure time is reached can be encrypted by using a time-key, and the encrypted data can be transmitted to the user before the date on which it is employed.
  • the information server requests that a time-key manger issue a time-key certificate.
  • the time-key manager transmits a time-key certificate to the information server.
  • the information server transmits to the information user those data, including information M, obtained by encrypting the time-key certificate using a public key.
  • the time-key manager transmits a decryption key to the information user after the disclosure time has been reached.
  • the information user decrypts encrypted information M using the decryption key, and acquires the desired information M.
  • a system for providing to many users data that are acquired from a plurality of information servers is called a data library system.
  • the data library system receives data from information servers and stores them in a database, and transmits data to requesters when the requesters are users having system memberships.
  • a cameraman desires to open an exclusive photograph on the data library system at a specific date, for example since Jan. 1, 1998, but the system has no control function for a disclosure time.
  • a data library system having a disclosure time control function could be applied in such a case.
  • the processing will now be described while referring to FIG. 4.
  • An information server designates a data discloser period as a decryption condition. For example, the information server requests that a time-key certificate manager issue a time-key certificate that designates Jan. 1, 1998, as the data disclosure date.
  • the information server acquires the time-key certificate and encrypts the data by using a public encryption key.
  • the information server transmits the encrypted data to the data library system.
  • a user accesses the data library system and acquires the desired encrypted data.
  • the time-key certificate manager compares the current time with the decryption enabled time contained in the time-key certificate. When the current time satisfies the decryption condition, the time-key certificate manager transmits the decryption key to the user; but when the current time does not satisfy the condition, the time-key certificate manager does not transmit the decryption key. Upon the receipt of the decryption key, the user employs it to decrypt the encrypted data received from the data library system and obtains the desired data.
  • the disclosure time designation file transfer system (FIG. 3), wherein the information user is replaced by an order submitter and the information server is replaced by an order receiver, can be employed as an electronic tendering system (FIG. 6).
  • the time-key manager Upon receipt of a request from an order receiver, the time-key manager transmits a time-key certificate that includes disclosure time information and a public key for encryption.
  • the order receiver transmits to an order submitter tender information that is encrypted using the public key in the time-key certificate.
  • the time-key manager transmits a decryption key to the order submitter after the disclosure time has been reached.
  • An electronic tendering system can therefore be provided that guarantees that a time for enabling decryption of tender information is limited. In this case, when tender types differ, a paired public key and secret key differ accordingly.
  • the tender manager 710 when direct communications among the order submitter, the order receiver and the time-key manager are to be avoided, only a special tender manager 710 need be provided for transmitting communications for the order submitter, the order receiver and the time-key manager (FIG. 7).
  • the tender manager exchanges messages with the order submitter, the order receiver, and the time-key manager.
  • the tender manager 710 obtains from the time-key manager a time-key certificate that includes time disclosure information and a public key for encryption, and transmits the time-key certificate to the order receiver.
  • the tender manager 710 receives tender information, which is encrypted by the order receiver using the public key in the time-key certificate.
  • the tender manager 710 acquires a decryption key from the time-key manager after the disclosure time has been reached, and transmits the decryption key to the order submitter.
  • the system can be used as an electronic safe system (FIG. 8).
  • the time-key manager Upon the receipt of a request from a depositor, the time-key manager transmits to the depositor a time-key certificate that includes disclosure time information and a public key for encryption.
  • the depositor electronically transmits to the bank money information that has been encrypted using the public key in the time-key certificate.
  • the time-key manager transmits a decryption key to the bank after the disclosure time has been reached. Therefore, an electronic safe system can be provided that guarantees that a time for decryption of electronic money information is limited. As safes differ, pairs of public keys and secret keys also differ.
  • the electronic money manager 910 when the direct interchange of messages by the bank, the depositor and the time-key manager are to be avoided, only a special electronic money manager 910 need be provided for transmitting the messages originating at the bank, the depositor and the time-key manager (FIG. 9).
  • the electronic money manager 910 receives from the time-key manager a time-key certificate that includes time disclosure information and a public key for encryption, and transmits the time-key certificate to the depositor. Then, the electronic money manager 910 receives electronic money information, which has been encrypted by the depositor using the public key in the time-key certificate.
  • the electronic money manger 910 Upon the receipt of a request from the bank, the electronic money manger 910 acquires a decryption key from the time-key manager after the disclosure time has been reached, and transmits the decryption key to the bank.
  • the other embodiments can be performed within the scope of the present invention.
  • a user who performs encryption employs the time-key certificate of the present invention, he or she can encrypt data using his or her machine. And when the user acquires a time-key certificate, he or she can encrypt data in the same manner as for normal encryption by using a public encryption key included in the time-key certificate. As a result, the alteration of data or wiretapping during the communication process, which may occur when an external service is employed for encryption, can be prevented.
  • the user performing the encryption can trust the decryption condition service provided by the time-key manager, which issued the time-key certificate, or by a person in charge of the server, so that an ID or a password used for an electronic safe system that satisfies a decryption condition need not be distributed to a person performing decryption.

Abstract

An object of the invention is to provide an encryption system and method for inhibiting the decryption of encrypted data unless a decryption condition is satisfied. Thus, according to the present invention, in order to provide the encryption system for inhibiting the decryption of encrypted data unless a decryption condition is satisfied, decryption enabled time is designated as a decryption condition, and an encryption system incorporating time-dependent decryption is constituted by a time-key certificate and a time-key certificate manager. A time-key certificate is employed when a third party proves that a public encryption key added to the certificate satisfies the decryption condition. The time-key certificate manager issues a time-key certificate and then manages a decryption key.

Description

    FIELD OF THE INVENTION
  • The present invention is directed to the field of encryption. It is more specifically directed to an encryption system. [0001]
  • BACKGROUND OF THE INVENTION Background Art
  • An explanation will be given for a difference between the use of a general certificate and the use of a time-key certificate. [0002]
  • The use of a general certificate is shown in FIG. 1. When user B desires to encrypt data (M) and to transmit the encrypted data to user A, user B requests that a certification authority issue a certificate for user A. This certificate includes the name of user A and a public encryption key (KEa) for user A, and also the digital signature of the certification authority for all the contents. User B obtains the certificate for user A and confirms that the certification authority has provided the digital signature for the public encryption key for user A. If the digital signature is correct, user B encrypts the target message M by using the public encryption key (KEa) for user A, and transmits the encrypted message to user A. [0003]
  • The general certificate is used to obtain a certain guarantee for a public encryption key for a partner (“Applied Cryptography,” Bruce Schneier, John Wiley & Suns, Inc., pp. 185-187, 1996), i.e., to provide a guarantee that no person other than user A can decrypt the encrypted data. However, a condition for limiting the time during which user A can decrypt data can not be added to the general certificate. [0004]
  • One example certificate that includes an encryption key and time is the Kerberos system (“Computer Network Encryption System,” Toyohiko Kikuchi, NEC Creative, pp. 57-68, 1995). A server use permission certificate includes an encryption key, which is used for encrypting data exchanged between a client machine and a key authority, and values for “current time” and “valid time.”[0005]
  • While the encryption key in the Kerberos system includes the subject for encrypting data that are being exchanged, an encryption key of the present invention includes the subject for inhibiting decryption at times other than a decryption time. Thus, the purposes of the keys differ. Furthermore, while the Kerberos system employs a symmetric key called DES, the present invention employs an asymmetric key. [0006]
  • In the Kerberos system, a server use permission certificate includes a “current time” and a “valid time.” The valid time for the issued server use permission certificate is designated to prevent the reading of a key. The valid time for present invention, however, doesn't define time for enabling the decryption of data that was encrypted using a public encryption key included in the certificate. [0007]
  • In ISO X. 400 MHS (http://www.iso.ch/), instruction identifier “Deferred delivery” is defined as an identifier for designating a mail delivery time. This is a description method for designating a time at which mail is to be delivered to an addressee. The identifier includes only a delivery time for a destination, and does not include a time for decrypting encrypted data. With this method, a time for decryption can not be designated in the certificate. [0008]
  • The UNIX system has a timed daemon program that synchronizes clocks at different workstations. This program communicates with a timed daemon program that is operating in another computer on the same LAN, and adjusts and synchronizes both clocks. However, since a daemon program merely adjust clocks, it differs from the time-key certificate manager of the present invention. [0009]
  • Then, there is a communication protocol called a network time protocol (NTP) that synchronizes clocks at workstations that are not linked together by a LAN (“Building Internet Firewalls,” D. B. Chapman and E. D. Zwicky, pp. 321 to 324, O'Reilly & Associates, Inc., 1995). According to this protocol, a time broadcast is received, and a time server that constantly maintains the clock of a system is employed to adjust the clock of another system on the Internet to which that system is connected. Therefore, with this method, a time for enabling decryption of encrypted data can not be designated. [0010]
  • And there is a Secure Time-stamping technique that employs a hash value for a digital document to prove that a document existed at a specific time (“How To Time-Stamp A Digital Document,” S. Haber and W. S. Stornetta, Advances in Cryptology-CRYPTO [0011] 190 Proceedings, Springer-Verlag, pp. 437 to 455, 1991). According to this technique, when a hash value for a digital document is transmitted to a system that provides the Secure Time-stamping service, based on matching of the time-stamping hash value calculated by the system, it can be proved that the document existed at a specific time. However, this technique does not teach a method for designating a time for enabling decryption of encrypted data.
  • Problems to be Solved by the Invention
  • It is, therefore, one object of the present invention to provide an encryption system and method for inhibiting the decryption of encrypted data unless a decryption condition is satisfied. [0012]
  • It is another object of the present invention to provide a disclosure time designation file transfer system. [0013]
  • It is an additional object of the present invention to provide a data library system with a disclosure time control function. [0014]
  • It is a further object of the present invention to provide a method and a system for controlling disclosure time. [0015]
  • It is yet another object of the present invention to provide a configuration for a time-key certificate and a time-key certificate manager. [0016]
  • It is yet an additional object of the present invention to provide a method for preventing the alteration of data or wiretapping during the communication process even when data is encrypted in the same manner as for normal encryption. [0017]
  • It is yet a further object of the present invention to provide an encryption system and method for which an ID or a password, used for an electronic safe system that satisfies a decryption condition, need not be distributed to a person performing the decryption. [0018]
  • SUMMARY OF THE INVENTION
  • In order to provide an encryption system for inhibiting decryption of encrypted data unless conditions for decryption are met, an encryption system with time-dependent decryption is constructed that has a time-key certificate manager for issuing a time-key certificate to guarantee that a time for enabling decryption of information is limited. [0019]
  • An encryption system according to the present invention is shown in FIG. 2. User B requests that a time-key certificate manager (hereinafter referred to simply as a time-key manager) issue a time-key certificate, including disclosure time information, and acquires it. Data to be transmitted to user A are encrypted by using a public key for encryption (KEt) included in the time-key certificate, and the encrypted data are transmitted. User A requests a decryption key from the time-key manager to decrypt the data received from user B. When the current time meets the decryption conditions, the decryption key is transmitted to user A, who can use it to decrypt the data. [0020]
  • As is described above, when the time-key certificate and the time-key manager are employed, the time during which a third party can acquire a decryption key for decrypting encrypted data can be limited. [0021]
  • In addition, the third party employs a time-key certificate to examine the public key for encryption included in a time-key certificate to determine whether or not it satisfies the decryption conditions. The time-key manager issues a time-key certificate and then manages a decryption key. [0022]
  • With this arrangement, a user encrypts data using his or her machine. And when the user acquires a time-key certificate, he or she can encrypt data in the same manner as for normal encryption by using a public encryption key included in the time-key certificate. As a result, it is possible to provide a system that ensures a high level of security and that, during the communication process, can prevent the alteration of data or wiretapping, which can occur when an external service is employed for encryption. [0023]
  • Furthermore, when the correct signature of the time-key certificate manager is included in the time-key certificate, the user performing the encryption can trust the decryption condition service provided by the time-key certificate manager that issued the time-key certificate or by a person in charge of the server, so that an ID or a password used for an electronic safe system that satisfies a decryption condition need not be distributed to a person performing the decryption.[0024]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other objects, features, and advantages of the present invention will become apparent upon further consideration of the following detailed description of the invention when read in conjunction with the drawing figures, in which: [0025]
  • FIG. 1 is a diagram showing the use of a general certificate; [0026]
  • FIG. 2 is a diagram showing the use of a time-key certificate; [0027]
  • FIG. 3 is a diagram illustrating one embodiment of a disclosure time designation file transfer system; [0028]
  • FIG. 4 is a diagram illustrating one embodiment of data library system having a disclosure date control function; [0029]
  • FIG. 5 is a schematic diagram illustrating an example hardware arrangement for a system according to the present invention; [0030]
  • FIG. 6 is a diagram for an embodiment of a tendering system with a disclosure time function; [0031]
  • FIG. 7 is a diagram for another embodiment of a tendering system with a disclosure time function; [0032]
  • FIG. 8 is a diagram for an embodiment of an electronic safe system with a disclosure time function; [0033]
  • FIG. 9 is a diagram for another embodiment of an electronic safe system with a disclosure time function.[0034]
  • DETAILED DESCRIPTION OF THE INVENTION Preferred Embodiment
  • The preferred embodiment of the present invention will now be described while referring to the drawings. FIG. 5 is a schematic diagram illustrating an example hardware arrangement for a system according to the present invention. A [0035] system 100 includes a central processing unit (CPU) 1 and a memory 4. The CPU 1 and the memory 4 communicate across a bus 2 with a hard disk drive 13, which is an auxiliary storage device. A floppy disk drive (or a memory medium driver for an MO or a CD-ROM) 20 is connected to the bus 2 via a floppy disk controller 19.
  • A floppy disk (or a memory medium for an MO or a CD-ROM) is inserted into the floppy disk drive (or a memory medium driver for an MO or a CD-ROM) [0036] 20. Code for a computer program for accomplishing the present invention can be recorded on the floppy disk or the hard disk drive 13, or in a ROM 14. The computer program, which interacts with an operating system to issue commands to the CPU 1, is loaded into the memory 4 for execution. The code for the computer program can be compressed, or can be divided into a plurality of segments to be recorded on a plurality of memory media.
  • The [0037] system 100 further includes user interface hardware components, such as a pointing device (a mouse, a joystick, etc.) 7 or a keyboard 6, and a display 12 for providing visual data for a user. Furthermore, a printer and a modem can respectively be connected via a parallel port 16 and a serial port 15. The system 100 can be connected to a network through the serial port 15 and a modem, or through a communication adaptor card (ethernet or a token ring) 18 for communication with other computers.
  • An [0038] audio controller 21 performs D/A (digital/analog) conversion of an audio signal, and the converted signal is transmitted to an amplifier 22 for release sound through a loudspeaker 23. The audio controller 21 also performs A/D (analog/digital) conversion of audio information received at a microphone 24, and obtains external audio information for the system 100.
  • As is described above, it would be easily understood that the encryption system of the present invention can be accomplished by an ordinary personal computer (PC) or workstation; a notebook PC; a palmtop PC; a network computer; an electric home appliance, such as a television incorporating a computer; a game machine having a communication function; a communication terminal having a communication function, such as a home telephone, a facsimile machine, a portable telephone, a PHS terminal or an electronic notebook; or a combination of such devices. The above described components are merely examples, and not all the components are required for the present invention. [0039]
  • According to the present invention, in order to provide an encryption system for inhibiting the decryption of encrypted data unless a decryption condition is satisfied, a decryption enabled time is a designated decryption condition. The encryption system with time-dependent decryption is constituted by a time-key certificate and a time-key certificate manager. The time-key certificate is employed when a third party proves that an public encryption key added to the certificate satisfies the decryption condition. The time-key certificate manager issues the time-key certificate and then manages a decryption key. The disclosure time designation file transfer system and the data library system having a disclosure time control function will now be described as embodiments of the encryption system with time-dependent decryption. [0040]
  • First, the disclosure time designation file transfer system will be explained. When a user provides information, he or she believes that the information should be disclosed at a specific time. As an example, information for personnel changes should not be disclosed before the date on which it is to be employed. [0041]
  • When the present invention is employed in this case, upon the receipt of a request from a user, information for which access is inhibited until a disclosure time is reached can be encrypted by using a time-key, and the encrypted data can be transmitted to the user before the date on which it is employed. [0042]
  • The processing performed by the system will now be explained while referring to FIG. 3. [0043]
  • (1) An information user requests information from an information server. [0044]
  • (2) The information server requests that a time-key manger issue a time-key certificate. [0045]
  • (3) The time-key manager transmits a time-key certificate to the information server. [0046]
  • (4) The information server transmits to the information user those data, including information M, obtained by encrypting the time-key certificate using a public key. [0047]
  • (5) The information user requests that the time-key manager issue a decryption key. [0048]
  • (6) The time-key manager transmits a decryption key to the information user after the disclosure time has been reached. [0049]
  • (7) The information user decrypts encrypted information M using the decryption key, and acquires the desired information M. [0050]
  • Next, a data library system having a disclosure time control function will be explained. [0051]
  • A system for providing to many users data that are acquired from a plurality of information servers is called a data library system. In this embodiment, the data library system receives data from information servers and stores them in a database, and transmits data to requesters when the requesters are users having system memberships. Consider a case where, for example, a cameraman desires to open an exclusive photograph on the data library system at a specific date, for example since Jan. 1, 1998, but the system has no control function for a disclosure time. [0052]
  • A data library system having a disclosure time control function could be applied in such a case. The processing will now be described while referring to FIG. 4. [0053]
  • (1) An information server designates a data discloser period as a decryption condition. For example, the information server requests that a time-key certificate manager issue a time-key certificate that designates Jan. 1, 1998, as the data disclosure date. [0054]
  • (2) The information server acquires the time-key certificate and encrypts the data by using a public encryption key. [0055]
  • (3) The information server transmits the encrypted data to the data library system. [0056]
  • (4) A user accesses the data library system and acquires the desired encrypted data. [0057]
  • (5) The user accesses the time-key certificate manager to request a decryption key. [0058]
  • (6) The time-key certificate manager compares the current time with the decryption enabled time contained in the time-key certificate. When the current time satisfies the decryption condition, the time-key certificate manager transmits the decryption key to the user; but when the current time does not satisfy the condition, the time-key certificate manager does not transmit the decryption key. Upon the receipt of the decryption key, the user employs it to decrypt the encrypted data received from the data library system and obtains the desired data. [0059]
  • The disclosure time designation file transfer system (FIG. 3), wherein the information user is replaced by an order submitter and the information server is replaced by an order receiver, can be employed as an electronic tendering system (FIG. 6). Upon receipt of a request from an order receiver, the time-key manager transmits a time-key certificate that includes disclosure time information and a public key for encryption. The order receiver transmits to an order submitter tender information that is encrypted using the public key in the time-key certificate. Then, upon the receipt of a request from the order submitter for a decryption key, the time-key manager transmits a decryption key to the order submitter after the disclosure time has been reached. An electronic tendering system can therefore be provided that guarantees that a time for enabling decryption of tender information is limited. In this case, when tender types differ, a paired public key and secret key differ accordingly. [0060]
  • In the electronic tendering system in FIG. 6, when direct communications among the order submitter, the order receiver and the time-key manager are to be avoided, only a special tender manager [0061] 710 need be provided for transmitting communications for the order submitter, the order receiver and the time-key manager (FIG. 7). In other words, the tender manager exchanges messages with the order submitter, the order receiver, and the time-key manager. First, upon receipt of a request from an order receiver, the tender manager 710 obtains from the time-key manager a time-key certificate that includes time disclosure information and a public key for encryption, and transmits the time-key certificate to the order receiver. Then, the tender manager 710 receives tender information, which is encrypted by the order receiver using the public key in the time-key certificate. Upon the receipt of a request from the order submitter, the tender manager 710 acquires a decryption key from the time-key manager after the disclosure time has been reached, and transmits the decryption key to the order submitter.
  • When the information user in FIG. 3 is replaced by a bank and the information server is replaced by a depositor, the system can be used as an electronic safe system (FIG. 8). Upon the receipt of a request from a depositor, the time-key manager transmits to the depositor a time-key certificate that includes disclosure time information and a public key for encryption. The depositor electronically transmits to the bank money information that has been encrypted using the public key in the time-key certificate. Then, upon the receipt of a request from the bank for a decryption key, the time-key manager transmits a decryption key to the bank after the disclosure time has been reached. Therefore, an electronic safe system can be provided that guarantees that a time for decryption of electronic money information is limited. As safes differ, pairs of public keys and secret keys also differ. [0062]
  • In the electronic safe system in FIG. 8, when the direct interchange of messages by the bank, the depositor and the time-key manager are to be avoided, only a special electronic money manager [0063] 910 need be provided for transmitting the messages originating at the bank, the depositor and the time-key manager (FIG. 9). First, upon receipt of a request from a depositor, the electronic money manager 910 receives from the time-key manager a time-key certificate that includes time disclosure information and a public key for encryption, and transmits the time-key certificate to the depositor. Then, the electronic money manager 910 receives electronic money information, which has been encrypted by the depositor using the public key in the time-key certificate. Upon the receipt of a request from the bank, the electronic money manger 910 acquires a decryption key from the time-key manager after the disclosure time has been reached, and transmits the decryption key to the bank. The other embodiments can be performed within the scope of the present invention.
  • Advantages of the Invention
  • Since a user who performs encryption employs the time-key certificate of the present invention, he or she can encrypt data using his or her machine. And when the user acquires a time-key certificate, he or she can encrypt data in the same manner as for normal encryption by using a public encryption key included in the time-key certificate. As a result, the alteration of data or wiretapping during the communication process, which may occur when an external service is employed for encryption, can be prevented. [0064]
  • Furthermore, when the correct signature of the time-key manager is included in the time-key certificate, the user performing the encryption can trust the decryption condition service provided by the time-key manager, which issued the time-key certificate, or by a person in charge of the server, so that an ID or a password used for an electronic safe system that satisfies a decryption condition need not be distributed to a person performing decryption. [0065]
  • It is noted that this invention may be used for many applications. Although the description is made for particular arrangements and applications, the intent and concept of the invention is suitable and applicable to other arrangements and applications. It will be clear to those skilled in the art that other modifications to the disclosed embodiments can be effected without departing from the spirit and scope of the invention. [0066]

Claims (14)

What is claimed is:
1. An encryption system with time-dependent decryption, including a time-key manager for guaranteeing that a time for enabling decryption of information is limited,
(1) wherein, upon receipt of a request from an information server, said time-key manager transmits to said information server a time-key certificate including disclosure time information and a public key for encryption; and
(2) wherein said information server transmits to an information user information encrypted using said public key, which is included in said time-key certificate, and said time-key manager, following the receipt of a request for a decryption key from said information user, transmits said decryption key to said information user at such time said disclosure time has been reached.
2. A time-key manager for guaranteeing that a time for enabling decryption of information is limited, comprising:
(1) means for, upon receipt of a request from an information server, transmitting to said information user a time-key certificate including disclosure time information and a public key for encryption; and
(2) means for, after said information server transmits to an information user information encrypted using said public key, which is included in said time-key certificate, receiving a request for a decryption key from said information user and transmitting said decryption key to said information user at such time said disclosure time has been reached.
3. A disclosure time designation file transfer system, which includes a time-key manager for guaranteeing that a time for enabling decryption of an encrypted file is limited,
(1) wherein, upon receipt of a request from an information server, said time-key manager transmits to said information server a time-key certificate including disclosure time information and a public key for encryption; and
(2) wherein said information server transmits to an information user said file encrypted using said public key, which is included in said time-key certificate, and said time-key manager, following the receipt of a request for a decryption key from said information user, transmits said decryption key to said information user at such time said disclosure time has been reached.
4. An electronic tendering system, which includes a time-key manager for guaranteeing that a time for enabling decryption of tender information is limited,
(1) wherein, upon receipt of a request from an order receiver, said time-key manager transmits to said order receiver a time-key certificate including disclosure time information and a public key for encryption; and
(2) wherein said order receiver transmits to an order submitter said tender information encrypted using said public key, which is included in said time-key certificate, and said time-key manager, following the receipt of a request for a decryption key from said order submitter, transmits said decryption key to said order submitter at such time said disclosure time has been reached.
5. An electronic tendering system, which includes a time-key manager, for guaranteeing that a time for enabling decryption of tender information is limited, and a tender manager for transmitting messages exchanged by an order receiver and an order submitter,
(1) wherein, upon receipt of a request from an order receiver, said tender manager acquires from said time-key manager a time-key certificate, which includes disclosure time information and a public key for encryption, and transmits said time-key certificate to said order receiver;
(2) wherein said tender manager receives tender information that said order receiver has encrypted using said public key included in said time-key certificate; and
(3) wherein, upon receipt of a request from said order submitter, said tender manager acquires a decryption key from said time-key manager after said disclosure time has been reached, and transmits said decryption key to said order submitter.
6. The system according to
claim 4
or
5
, wherein said public key and a secret key differ depending on tender types.
7. A tender manager for guaranteeing that a time for enabling decryption of tender information is limited, comprising:
(1) means for, upon receipt of a request from an order receiver, acquiring from said time-key manager a time-key certificate, which includes disclosure time information and a public key for encryption, and for transmitting said time-key certificate to said order receiver;
(2) means for receiving tender information that said order receiver has encrypted using said public key included in said time-key certificate; and
(3) means for, upon receipt of a request from said order submitter, acquiring a decryption key from said time-key manager after said disclosure time has been reached, and transmitting said decryption key to said order submitter.
8. An electronic safe system, which includes a time-key manager for guaranteeing that a time for enabling decryption of electronic money information is limited,
(1) wherein, upon receipt of a request from a depositor, said time-key manager transmits to said depositor a time-key certificate including disclosure time information and a public key for encryption; and
(2) wherein said depositor transmits to a bank said electronic money information encrypted using said public key, which is included in said time-key certificate, and said time-key manager, following the receipt of a request for a decryption key from said bank, transmits said decryption key to said bank after said disclosure time has been reached.
9. An electronic safe system, which includes a time-key manager for guaranteeing that a time for enabling decryption of electronic money information is limited, and an electronic money manager for transmitting messages exchanged by a depositor and a bank,
(1) wherein, upon receipt of a request from a depositor, said electronic money manager acquires from said time-key manager a time-key certificate, which includes disclosure time information and a public key for encryption, and transmits said time-key certificate to said depositor;
(2) wherein said electronic money manager receives electronic money information that said depositor has encrypted using said public key included in said time-key certificate; and
(3) wherein, upon receipt of a request from said bank, said electronic money manager acquires a decryption key from said time-key manager after said disclosure time has been reached, and transmits said decryption key to said bank.
10. The system according to
claim 8
or
9
, wherein said public key and a secret key differ depending on electronic money types.
11. An electronic money manager for guaranteeing that a time for enabling decryption of electronic money information is limited, comprising:
(1) means for, upon receipt of a request from a depositor, acquiring from said time-key manager a time-key certificate, which includes disclosure time information and a public key for encryption, and for transmitting said time-key certificate to said depositor;
(2) means for receiving electronic money information that said depositor has encrypted using said public key included in said lime-key certificate; and
(3) means for, upon receipt of a request from said bank, acquiring a decryption key from said time-key manager after said disclosure time has been reached, and for transmitting said decryption key to said bank.
12. A data library system, which has a time-key certificate manager and a data library and which has a disclosure time control function,
(1) wherein upon receipt of a request from an information server said time-key certificate manager sends to said information server a time-key certificate that includes disclosure time information and a public key for encryption;
(2) wherein said data library receives from said information server encrypted data, including data that has been encrypted by employing said public key in said time-key certificate;
(3) wherein said data library transmits said encrypted data to an information user; and
(4) wherein, upon receipt of a request from said information user, said time-key certificate manager compares a current time with a time for enabling decryption of said time-key certificate and transmits a decryption key to said information user when said current time satisfies a condition for decryption or does not transmit said decryption key when said current time does not satisfy said condition for decryption.
13. A time-key management method for guaranteeing that a time for enabling decryption of information is limited, comprising the steps of:
(1) upon receipt of a request from an information server, transmitting to an information user a time-key certificate including disclosure time information and a public key for encryption; and
(2) after said information server transmits to said information user information encrypted using said public key, which is included in said time-key certificate, receiving a request for a decryption key from said information user and transmitting said decryption key to said information user after said disclosure time has been reached.
14. A storage medium for storing a program for performing time-key management to guarantee that a time for enabling decryption of information is limited, said program comprising:
(1) a function for, upon receipt of a request from an information server, transmitting to an information user a time-key certificate including disclosure time information and a public key for encryption; and
(2) a function for, after said information server transmits to said information user information encrypted using said public key, which is included in said time-key certificate, receiving a request for a decryption key from said information user and for transmitting said decryption key to said information user after said disclosure time has been reached.
US09/115,422 1997-08-22 1998-07-14 Encryption system with time-dependent decryption Expired - Fee Related US6381695B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP22690397 1997-08-22
JP9-226903 1997-08-22
JP9-322825 1997-11-25
JP32282597A JP3542895B2 (en) 1997-08-22 1997-11-25 Time-constrained cryptosystem

Publications (2)

Publication Number Publication Date
US20010052071A1 true US20010052071A1 (en) 2001-12-13
US6381695B2 US6381695B2 (en) 2002-04-30

Family

ID=26527400

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/115,422 Expired - Fee Related US6381695B2 (en) 1997-08-22 1998-07-14 Encryption system with time-dependent decryption

Country Status (2)

Country Link
US (1) US6381695B2 (en)
JP (1) JP3542895B2 (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010054025A1 (en) * 2000-06-19 2001-12-20 Adams William M. Method of securely delivering a package
US20030140226A1 (en) * 2000-12-12 2003-07-24 Masaaki Yamamoto Authentication method, communication apparatus, and relay apparatus
EP1355445A2 (en) * 2002-04-18 2003-10-22 Hewlett-Packard Development Company, L.P. Method and apparatus for encrypting/decrypting data
GB2398713A (en) * 2003-02-22 2004-08-25 Hewlett Packard Development Co Anonymous access to online services for users registered with a group membership authority
GB2399724A (en) * 2003-03-15 2004-09-22 Hewlett Packard Development Co Identifier based encryption (IBE) scheme where trusted authority public/private keys are associated with particular access time periods
GB2413863A (en) * 2004-05-08 2005-11-09 Ibm Method and system for distribution of information
GB2414144A (en) * 2004-04-19 2005-11-16 Matsushita Electric Ind Co Ltd To set up a secure communications channel only the requesting node (not the receiving node) communicates with a trusted third party
US20060156019A1 (en) * 2004-12-30 2006-07-13 Honeywell International Inc. System and method for initializing secure communications with lightweight devices
US20070038862A1 (en) * 2003-06-04 2007-02-15 Noble Gary P Method and system for controlling the disclosure time of information
DE10248006B4 (en) * 2001-10-15 2008-01-17 Hewlett-Packard Development Co., L.P., Houston Method and device for encrypting data
JP2008524931A (en) * 2004-12-17 2008-07-10 株式会社エヌ・ティ・ティ・ドコモ Multiple certificate revocation using encrypted certificate data for certificate validity / invalidity certification
EP2099190A1 (en) 2008-03-05 2009-09-09 Research In Motion Limited Media security system and method
US20100161965A1 (en) * 2008-12-23 2010-06-24 Bladelogic, Inc. Secure Credential Store
WO2012087692A2 (en) * 2010-12-19 2012-06-28 Motorola Solutions, Inc. System and method for secure communications in a communication system
WO2012165664A1 (en) * 2011-06-02 2012-12-06 Sharp Kabushiki Kaisha Customer data access control method and customer-managed device
US20130318344A1 (en) * 2001-06-12 2013-11-28 Blackberry Limited System and method for processing encoded messages for exchange with a mobile data communication device
US20140229739A1 (en) * 2013-02-12 2014-08-14 Amazon Technologies, Inc. Delayed data access
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US9832171B1 (en) 2013-06-13 2017-11-28 Amazon Technologies, Inc. Negotiating a session with a cryptographic domain
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US9942036B2 (en) 2014-06-27 2018-04-10 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
EP3312758A1 (en) * 2016-10-20 2018-04-25 Hewlett Packard Enterprise Development LP Encrypted capabilities stored in global memory
US10055594B2 (en) 2012-06-07 2018-08-21 Amazon Technologies, Inc. Virtual service provider zones
US10075295B2 (en) 2013-02-12 2018-09-11 Amazon Technologies, Inc. Probabilistic key rotation
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
CN109829316A (en) * 2017-11-23 2019-05-31 三星电子株式会社 Encrypt equipment, system on chip and electronic equipment including the encryption equipment
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
WO2020104025A1 (en) * 2018-11-21 2020-05-28 Emirat Ag Computer implemented method for fraud-resistant disclosure of secret information
US10721075B2 (en) 2014-05-21 2020-07-21 Amazon Technologies, Inc. Web of trust management in a distributed system
US11036869B2 (en) 2013-02-12 2021-06-15 Amazon Technologies, Inc. Data security with a security module
US20210351933A1 (en) * 2018-09-27 2021-11-11 Scptime Secure time synchronization
US11537740B2 (en) 2021-01-04 2022-12-27 Bank Of America Corporation System for enhanced data security using versioned encryption

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3657396B2 (en) * 1997-07-07 2005-06-08 株式会社日立製作所 Key management system, key management apparatus, information encryption apparatus, information decryption apparatus, and storage medium storing program
US6510515B1 (en) * 1998-06-15 2003-01-21 Telefonaktlebolaget Lm Ericsson Broadcast service access control
CN1354935A (en) * 1999-02-26 2002-06-19 奥廷提戴特控股有限公司 Digital file management and imaging system and method including secure file marking
JP4560004B2 (en) * 1999-07-23 2010-10-13 株式会社東芝 Information certification method
US6990578B1 (en) * 1999-10-29 2006-01-24 International Business Machines Corp. Method and apparatus for encrypting electronic messages composed using abbreviated address books
US6742119B1 (en) * 1999-12-10 2004-05-25 International Business Machines Corporation Time stamping method using time delta in key certificate
AU4717401A (en) * 1999-12-16 2001-07-03 Microsoft Corporation Method of pre-releasing digital content and encryption key database for use therewith
WO2001071622A1 (en) * 2000-03-21 2001-09-27 Rittmaster Ted R System and process for distribution of information on a communication network
US6847719B1 (en) * 2000-08-11 2005-01-25 Eacceleration Corp. Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext
US7136840B2 (en) * 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
JP2003018149A (en) * 2001-06-27 2003-01-17 Innovation & Initiative:Kk Information disclosure method
EP1425874B1 (en) * 2001-08-13 2010-04-21 Board Of Trustees Of The Leland Stanford Junior University Systems and methods for identity-based encryption and related cryptographic techniques
EP1425680A4 (en) * 2001-08-31 2006-05-03 Trac Medical Solutions Inc System for interactive processing of form documents
US20030123667A1 (en) * 2001-12-28 2003-07-03 Cable Television Laboratories, Inc. Method for encryption key generation
JP2003271831A (en) * 2002-03-15 2003-09-26 Nippon Telegr & Teleph Corp <Ntt> Contents circulation method, contents circulation system and program therefor, and recording medium
SG145524A1 (en) * 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
DE10245763A1 (en) * 2002-10-01 2004-04-15 Deutsche Telekom Ag Timed Decryption Service Provider secure confidential communication system makes private decryption key available with time delay after encryption key
DE10311634A1 (en) * 2003-03-14 2004-09-30 Authentidate International Ag Electronic transmission of documents
US20040199768A1 (en) * 2003-04-04 2004-10-07 Nail Robert A. System and method for enabling enterprise application security
US20060155652A1 (en) * 2003-06-16 2006-07-13 Colby Steven M Expiring encryption
KR100561847B1 (en) * 2003-10-08 2006-03-16 삼성전자주식회사 Method of public key encryption and decryption method
US7499541B2 (en) * 2004-05-11 2009-03-03 National Institute Of Information And Communications Technology Cipher strength evaluation apparatus
US20050262361A1 (en) * 2004-05-24 2005-11-24 Seagate Technology Llc System and method for magnetic storage disposal
US7814314B2 (en) 2004-08-31 2010-10-12 Ntt Docomo, Inc. Revocation of cryptographic digital certificates
US8130944B2 (en) * 2004-11-03 2012-03-06 Ricoh Co., Ltd. Digital encrypted time capsule
JP4545050B2 (en) * 2005-06-15 2010-09-15 シャープ株式会社 Image transmission system and image transmission apparatus
JP4762673B2 (en) * 2005-10-27 2011-08-31 株式会社エヌ・ティ・ティ・データ Information processing apparatus, information processing system, and program
AT506344B1 (en) * 2008-01-30 2015-06-15 Evva Sicherheitstechnologie METHOD AND DEVICE FOR CONTROLLING THE ACCESS CONTROL
JP4979085B2 (en) * 2008-02-26 2012-07-18 Kddi株式会社 Timed encryption method and apparatus, timed decryption method and apparatus, and timed encryption and decryption system
US9003192B2 (en) * 2008-04-10 2015-04-07 Microsoft Technology Licensing, Llc Protocol for protecting third party cryptographic keys
US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing
US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks
US8341141B2 (en) * 2008-12-16 2012-12-25 Krislov Clinton A Method and system for automated document registration
JP5097145B2 (en) * 2009-02-09 2012-12-12 日本電信電話株式会社 Encryption system and encryption method
US8842840B2 (en) * 2011-11-03 2014-09-23 Arvind Gidwani Demand based encryption and key generation and distribution systems and methods
US9992026B2 (en) * 2014-03-28 2018-06-05 Mohammed Alawi E GEOFFREY Electronic biometric (dynamic) signature references enrollment method
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
DE102016002549A1 (en) * 2016-01-18 2017-07-20 Roland Harras Method for the multi-layered protection of (login) data, in particular passwords
JP2022545809A (en) * 2019-08-23 2022-10-31 コモンウェルス サイエンティフィック アンド インダストリアル リサーチ オーガナイゼーション Secure environment for cryptographic key generation

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
FR2722596A1 (en) * 1994-07-13 1996-01-19 France Telecom SYSTEM FOR CONTROLLING ACCESS LIMITED TO AUTHORIZED AND RENEWABLE TIME PLACES USING A PORTABLE MEMORY MEDIUM
ZA957405B (en) * 1994-09-14 1996-04-17 Diebold Inc Electronic security system
US5633928A (en) * 1995-03-10 1997-05-27 Bell Communications Research, Inc. Key escrow method with warrant bounds
US5852665A (en) * 1995-04-13 1998-12-22 Fortress U & T Ltd. Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
US5671276A (en) * 1995-07-21 1997-09-23 General Instrument Corporation Of Delaware Method and apparatus for impulse purchasing of packaged information services
JP3145667B2 (en) * 1997-11-13 2001-03-12 株式会社ジャストシステム An online gift system, a server system of an online gift system, a terminal device of the online gift system, an online gift server system, a terminal device, a gift method of the online gift system, an online gift method, and a program for causing a computer to execute those methods are recorded. Computer readable recording medium

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010054025A1 (en) * 2000-06-19 2001-12-20 Adams William M. Method of securely delivering a package
EP1343270A4 (en) * 2000-12-12 2009-10-28 Ntt Docomo Inc Authentication method, communication apparatus, and relay apparatus
EP1343270A1 (en) * 2000-12-12 2003-09-10 NTT DoCoMo, Inc. Authentication method, communication apparatus, and relay apparatus
US20030140226A1 (en) * 2000-12-12 2003-07-24 Masaaki Yamamoto Authentication method, communication apparatus, and relay apparatus
US7707403B2 (en) 2000-12-12 2010-04-27 Ntt Docomo, Inc. Authentication method, communication apparatus, and relay apparatus
US9172540B2 (en) * 2001-06-12 2015-10-27 Blackberry Limited System and method for processing encoded messages for exchange with a mobile data communication device
US20130318344A1 (en) * 2001-06-12 2013-11-28 Blackberry Limited System and method for processing encoded messages for exchange with a mobile data communication device
DE10248006B8 (en) * 2001-10-15 2008-05-15 Hewlett-Packard Development Co., L.P., Houston Method and device for encrypting data
DE10248006B4 (en) * 2001-10-15 2008-01-17 Hewlett-Packard Development Co., L.P., Houston Method and device for encrypting data
EP1355445A2 (en) * 2002-04-18 2003-10-22 Hewlett-Packard Development Company, L.P. Method and apparatus for encrypting/decrypting data
US20030198348A1 (en) * 2002-04-18 2003-10-23 Mont Marco Casassa Method and apparatus for encrypting/decrypting data
EP1355445A3 (en) * 2002-04-18 2004-03-10 Hewlett-Packard Development Company, L.P. Method and apparatus for encrypting/decrypting data
US7321660B2 (en) 2002-04-18 2008-01-22 Hewlett-Packard Development Company, L.P. Method and apparatus for encrypting/decrypting data using timed-release keys
GB2398713B (en) * 2003-02-22 2005-11-30 Hewlett Packard Development Co Limiting service provision to group members
US20040165728A1 (en) * 2003-02-22 2004-08-26 Hewlett-Packard Development Company, L.P. Limiting service provision to group members
GB2398713A (en) * 2003-02-22 2004-08-25 Hewlett Packard Development Co Anonymous access to online services for users registered with a group membership authority
US20040230540A1 (en) * 2003-03-15 2004-11-18 Crane Stephen James Method and system for regulating access to a service
GB2399724B (en) * 2003-03-15 2005-04-27 Hewlett Packard Development Co Method and system for regulating access to a service
GB2399724A (en) * 2003-03-15 2004-09-22 Hewlett Packard Development Co Identifier based encryption (IBE) scheme where trusted authority public/private keys are associated with particular access time periods
US20070038862A1 (en) * 2003-06-04 2007-02-15 Noble Gary P Method and system for controlling the disclosure time of information
US8930703B2 (en) * 2003-06-04 2015-01-06 International Business Machines Corporation Methods, systems and computer program products for controlling the disclosure time of information
GB2414144A (en) * 2004-04-19 2005-11-16 Matsushita Electric Ind Co Ltd To set up a secure communications channel only the requesting node (not the receiving node) communicates with a trusted third party
GB2414144B (en) * 2004-04-19 2006-07-26 Matsushita Electric Ind Co Ltd Fast and secure connectivity for a mobile node
GB2413863A (en) * 2004-05-08 2005-11-09 Ibm Method and system for distribution of information
US20050256901A1 (en) * 2004-05-08 2005-11-17 International Business Machines Corporation Method and system for distribution of information
JP2008524931A (en) * 2004-12-17 2008-07-10 株式会社エヌ・ティ・ティ・ドコモ Multiple certificate revocation using encrypted certificate data for certificate validity / invalidity certification
US8051296B2 (en) * 2004-12-30 2011-11-01 Honeywell International Inc. System and method for initializing secure communications with lightweight devices
US20060156019A1 (en) * 2004-12-30 2006-07-13 Honeywell International Inc. System and method for initializing secure communications with lightweight devices
EP2099190A1 (en) 2008-03-05 2009-09-09 Research In Motion Limited Media security system and method
US9094217B2 (en) 2008-12-23 2015-07-28 Bladelogic, Inc. Secure credential store
US8510810B2 (en) * 2008-12-23 2013-08-13 Bladelogic, Inc. Secure credential store
US20100161965A1 (en) * 2008-12-23 2010-06-24 Bladelogic, Inc. Secure Credential Store
US8582779B2 (en) 2010-12-19 2013-11-12 Motorola Solutions, Inc. System and method for secure communications in a communication system
WO2012087692A3 (en) * 2010-12-19 2012-10-26 Motorola Solutions, Inc. System and method for secure communications in a communication system
WO2012087692A2 (en) * 2010-12-19 2012-06-28 Motorola Solutions, Inc. System and method for secure communications in a communication system
WO2012165664A1 (en) * 2011-06-02 2012-12-06 Sharp Kabushiki Kaisha Customer data access control method and customer-managed device
US10834139B2 (en) 2012-06-07 2020-11-10 Amazon Technologies, Inc. Flexibly configurable data modification services
US10474829B2 (en) 2012-06-07 2019-11-12 Amazon Technologies, Inc. Virtual service provider zones
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US10055594B2 (en) 2012-06-07 2018-08-21 Amazon Technologies, Inc. Virtual service provider zones
US10075295B2 (en) 2013-02-12 2018-09-11 Amazon Technologies, Inc. Probabilistic key rotation
US10404670B2 (en) 2013-02-12 2019-09-03 Amazon Technologies, Inc. Data security service
US11695555B2 (en) 2013-02-12 2023-07-04 Amazon Technologies, Inc. Federated key management
US10666436B2 (en) 2013-02-12 2020-05-26 Amazon Technologies, Inc. Federated key management
US20140229739A1 (en) * 2013-02-12 2014-08-14 Amazon Technologies, Inc. Delayed data access
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
US10210341B2 (en) * 2013-02-12 2019-02-19 Amazon Technologies, Inc. Delayed data access
US11372993B2 (en) 2013-02-12 2022-06-28 Amazon Technologies, Inc. Automatic key rotation
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US11036869B2 (en) 2013-02-12 2021-06-15 Amazon Technologies, Inc. Data security with a security module
US10382200B2 (en) 2013-02-12 2019-08-13 Amazon Technologies, Inc. Probabilistic key rotation
US11470054B2 (en) 2013-06-13 2022-10-11 Amazon Technologies, Inc. Key rotation techniques
US10313312B2 (en) 2013-06-13 2019-06-04 Amazon Technologies, Inc. Key rotation techniques
US9832171B1 (en) 2013-06-13 2017-11-28 Amazon Technologies, Inc. Negotiating a session with a cryptographic domain
US10601789B2 (en) 2013-06-13 2020-03-24 Amazon Technologies, Inc. Session negotiations
US11323479B2 (en) 2013-07-01 2022-05-03 Amazon Technologies, Inc. Data loss prevention techniques
US10721075B2 (en) 2014-05-21 2020-07-21 Amazon Technologies, Inc. Web of trust management in a distributed system
US9942036B2 (en) 2014-06-27 2018-04-10 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US10587405B2 (en) 2014-06-27 2020-03-10 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US11368300B2 (en) 2014-06-27 2022-06-21 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US11626996B2 (en) 2014-09-15 2023-04-11 Amazon Technologies, Inc. Distributed system web of trust provisioning
US10372897B2 (en) 2016-10-20 2019-08-06 Hewlett Packard Enterprise Development Lp Encrypted capabilities stored in global memory
EP3312758A1 (en) * 2016-10-20 2018-04-25 Hewlett Packard Enterprise Development LP Encrypted capabilities stored in global memory
KR102488636B1 (en) * 2017-11-23 2023-01-17 삼성전자주식회사 Encryption device encrypting data and timestamp, system on chip including the same, and electronic device
KR20190059528A (en) * 2017-11-23 2019-05-31 삼성전자주식회사 Encryption device encrypting data and timestamp, system on chip including the same, and electronic device
US11354453B2 (en) * 2017-11-23 2022-06-07 Samsung Electronics Co., Ltd. Encryption device for encrypting data and timestamp, system on chip including the same, and electronic device
CN109829316A (en) * 2017-11-23 2019-05-31 三星电子株式会社 Encrypt equipment, system on chip and electronic equipment including the encryption equipment
US20210351933A1 (en) * 2018-09-27 2021-11-11 Scptime Secure time synchronization
WO2020104025A1 (en) * 2018-11-21 2020-05-28 Emirat Ag Computer implemented method for fraud-resistant disclosure of secret information
US11537740B2 (en) 2021-01-04 2022-12-27 Bank Of America Corporation System for enhanced data security using versioned encryption

Also Published As

Publication number Publication date
US6381695B2 (en) 2002-04-30
JP3542895B2 (en) 2004-07-14
JPH11136230A (en) 1999-05-21

Similar Documents

Publication Publication Date Title
US6381695B2 (en) Encryption system with time-dependent decryption
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US5748735A (en) Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
US8281136B2 (en) Techniques for key distribution for use in encrypted communications
JP5265744B2 (en) Secure messaging system using derived key
US6651166B1 (en) Sender driven certification enrollment system
US7395549B1 (en) Method and apparatus for providing a key distribution center without storing long-term server secrets
US6834112B1 (en) Secure distribution of private keys to multiple clients
US6266420B1 (en) Method and apparatus for secure group communications
US7200230B2 (en) System and method for controlling and enforcing access rights to encrypted media
US6988199B2 (en) Secure and reliable document delivery
US9544297B2 (en) Method for secured data processing
US6247127B1 (en) Method and apparatus for providing off-line secure communications
US7263619B1 (en) Method and system for encrypting electronic message using secure ad hoc encryption key
JP2002501218A (en) Client-side public key authentication method and device using short-lived certificate
US20080031459A1 (en) Systems and Methods for Identity-Based Secure Communications
US7266705B2 (en) Secure transmission of data within a distributed computer system
JP2003530635A (en) System and method for securely storing confidential information, and digital content distribution device and server used in the system and method
US11570155B2 (en) Enhanced secure encryption and decryption system
Makris et al. Network and data security design for telemedicine applications
US20020071562A1 (en) Method and system for encrypting shared documents for transit and storage
JP2001285286A (en) Authentication method, recording medium, authentication system, terminal, and device for generating recording medium for authentication
KR100380335B1 (en) Secure data management and synchronization method on internet using cryptography and digital signature
JP2001147899A (en) System for distributing contents
US20020126840A1 (en) Method and apparatus for adapting symetric key algorithm to semi symetric algorithm

Legal Events

Date Code Title Description
AS Assignment

Owner name: IBM CORPORATION, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUDO, MICHIHARU;NUMAO, MASAYUKI;KAWAZOE, HIROSHI;REEL/FRAME:009318/0955

Effective date: 19980618

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20100430