AU3879497A - Cryptographic key split combiner - Google Patents
Cryptographic key split combinerInfo
- Publication number
- AU3879497A AU3879497A AU38794/97A AU3879497A AU3879497A AU 3879497 A AU3879497 A AU 3879497A AU 38794/97 A AU38794/97 A AU 38794/97A AU 3879497 A AU3879497 A AU 3879497A AU 3879497 A AU3879497 A AU 3879497A
- Authority
- AU
- Australia
- Prior art keywords
- cryptographic key
- key split
- split combiner
- combiner
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US3969697P | 1997-02-13 | 1997-02-13 | |
US60039696 | 1997-02-13 | ||
PCT/US1997/011304 WO1998036520A1 (fr) | 1997-02-13 | 1997-06-20 | Combineur de segments de cles cryptographiques |
Publications (1)
Publication Number | Publication Date |
---|---|
AU3879497A true AU3879497A (en) | 1998-09-08 |
Family
ID=21906888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU38794/97A Abandoned AU3879497A (en) | 1997-02-13 | 1997-06-20 | Cryptographic key split combiner |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU3879497A (fr) |
WO (1) | WO1998036520A1 (fr) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6286030B1 (en) | 1998-07-10 | 2001-09-04 | Sap Aktiengesellschaft | Systems and methods for recording and visually recreating sessions in a client-server environment |
US6286098B1 (en) | 1998-08-28 | 2001-09-04 | Sap Aktiengesellschaft | System and method for encrypting audit information in network applications |
US7111173B1 (en) * | 1998-09-01 | 2006-09-19 | Tecsec, Inc. | Encryption process including a biometric unit |
US7095851B1 (en) | 1999-03-11 | 2006-08-22 | Tecsec, Inc. | Voice and data encryption method using a cryptographic key split combiner |
MXPA01009051A (es) * | 1999-03-11 | 2004-04-05 | Tecsec Inc | Metodo de criptograficacion de datos y de voz que usa un combinador de division de clave criptografica. |
KR100373669B1 (ko) | 1999-09-29 | 2003-02-26 | 가부시키가이샤 히타치세이사쿠쇼 | 비밀 정보의 처리 장치, 비밀 정보의 처리 프로그램을 기록한 기록 매체 및 처리 시스템 |
AU2003252789B2 (en) * | 1999-09-29 | 2006-02-23 | Hitachi, Ltd. | Processing apparatus, program, or system of secret information |
WO2002067494A1 (fr) * | 2001-02-21 | 2002-08-29 | Stockburger, Andreas | Procede et systeme de transmission securisee de codes et de transmission de commandes et de donnees dans des reseaux de donnees |
US8583772B2 (en) | 2008-08-14 | 2013-11-12 | International Business Machines Corporation | Dynamically configurable session agent |
US8949406B2 (en) | 2008-08-14 | 2015-02-03 | International Business Machines Corporation | Method and system for communication between a client system and a server system |
US8868533B2 (en) | 2006-06-30 | 2014-10-21 | International Business Machines Corporation | Method and apparatus for intelligent capture of document object model events |
US8127000B2 (en) | 2006-06-30 | 2012-02-28 | Tealeaf Technology, Inc. | Method and apparatus for monitoring and synchronizing user interface events with network data |
US8042055B2 (en) | 2007-08-31 | 2011-10-18 | Tealeaf Technology, Inc. | Replaying captured network interactions |
US9934320B2 (en) | 2009-03-31 | 2018-04-03 | International Business Machines Corporation | Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions |
US8930818B2 (en) | 2009-03-31 | 2015-01-06 | International Business Machines Corporation | Visualization of website analytics |
JP6066096B2 (ja) | 2011-02-22 | 2017-01-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | コンテンツのオンページ操作およびリアルタイム置換のための方法、システム、およびコンピュータ・プログラム |
US9635094B2 (en) | 2012-10-15 | 2017-04-25 | International Business Machines Corporation | Capturing and replaying application sessions using resource files |
US9536108B2 (en) | 2012-10-23 | 2017-01-03 | International Business Machines Corporation | Method and apparatus for generating privacy profiles |
US9535720B2 (en) | 2012-11-13 | 2017-01-03 | International Business Machines Corporation | System for capturing and replaying screen gestures |
US10474735B2 (en) | 2012-11-19 | 2019-11-12 | Acoustic, L.P. | Dynamic zooming of content with overlays |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5208853A (en) * | 1991-09-09 | 1993-05-04 | Motorola, Inc. | Method and apparatus for usage protection of data files using split key and unique variable |
US5375169A (en) * | 1993-05-28 | 1994-12-20 | Tecsec, Incorporated | Cryptographic key management method and apparatus |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
-
1997
- 1997-06-20 WO PCT/US1997/011304 patent/WO1998036520A1/fr active Application Filing
- 1997-06-20 AU AU38794/97A patent/AU3879497A/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO1998036520A1 (fr) | 1998-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU1732597A (en) | Communication method using common cryptographic key | |
EP0906677A3 (fr) | Systeme de communication cryptographique | |
AU1060999A (en) | Cryptographic co-processor | |
AU1224701A (en) | Key encryption using client-unique additional key | |
AU3879497A (en) | Cryptographic key split combiner | |
AU6759998A (en) | Cryptographic digital identity method | |
AU3859599A (en) | Single-key security system | |
AU6938398A (en) | Electronic cryptographic packing | |
AU6733198A (en) | Authentication method | |
AU2187597A (en) | Transmitter combiner arrangement | |
AU6134098A (en) | Secure authentication key management | |
AU9426598A (en) | Key validation scheme | |
AU6344798A (en) | Continuously operating liquid-cooled panel | |
AUPO957097A0 (en) | Hammer | |
AU1425197A (en) | Multiple cryptographic key distribution | |
AU6244896A (en) | Restritedly blindable certificates on secret keys | |
AU5871799A (en) | Improved key pad | |
AU9569098A (en) | Improved block cipher method | |
AU6576698A (en) | Simplified, secure, swift cryptographic key exchange | |
AU4951799A (en) | Cryptographic key-recovery mechanism | |
AU4125199A (en) | Accelerated cryptographic operations | |
AU1292300A (en) | Crusher | |
AU2207499A (en) | Keymate - compact key with key case, holding unit | |
AU8450198A (en) | System for generating sub-keys | |
AU1906599A (en) | Pancreatic-derived factors, and uses related thereto |