IL135770A0 - Virtual matrix encryption (vme) and virtual key cryptographic method and apparatus - Google Patents
Virtual matrix encryption (vme) and virtual key cryptographic method and apparatusInfo
- Publication number
- IL135770A0 IL135770A0 IL13577098A IL13577098A IL135770A0 IL 135770 A0 IL135770 A0 IL 135770A0 IL 13577098 A IL13577098 A IL 13577098A IL 13577098 A IL13577098 A IL 13577098A IL 135770 A0 IL135770 A0 IL 135770A0
- Authority
- IL
- Israel
- Prior art keywords
- virtual
- vme
- key cryptographic
- cryptographic method
- matrix encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/957,288 US6219421B1 (en) | 1997-10-24 | 1997-10-24 | Virtual matrix encryption (VME) and virtual key cryptographic method and apparatus |
PCT/IB1998/001698 WO1999022485A1 (fr) | 1997-10-24 | 1998-10-22 | Chiffrement de matrice virtuelle (cmv), et procede et appareil de chiffrement de cle virtuelle |
Publications (1)
Publication Number | Publication Date |
---|---|
IL135770A0 true IL135770A0 (en) | 2001-05-20 |
Family
ID=25499364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IL13577098A IL135770A0 (en) | 1997-10-24 | 1998-10-22 | Virtual matrix encryption (vme) and virtual key cryptographic method and apparatus |
Country Status (9)
Country | Link |
---|---|
US (1) | US6219421B1 (fr) |
EP (1) | EP1025671A1 (fr) |
JP (1) | JP2001522056A (fr) |
KR (1) | KR20010024562A (fr) |
CN (1) | CN1279851A (fr) |
AU (1) | AU9454498A (fr) |
CA (1) | CA2307234A1 (fr) |
IL (1) | IL135770A0 (fr) |
WO (1) | WO1999022485A1 (fr) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6850252B1 (en) | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
USRE48056E1 (en) | 1991-12-23 | 2020-06-16 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
USRE46310E1 (en) | 1991-12-23 | 2017-02-14 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US5903454A (en) | 1991-12-23 | 1999-05-11 | Hoffberg; Linda Irene | Human-factored interface corporating adaptive pattern recognition based controller apparatus |
USRE47908E1 (en) | 1991-12-23 | 2020-03-17 | Blanding Hovenweep, Llc | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
US6665800B1 (en) * | 1999-01-26 | 2003-12-16 | Dell Usa, L.P. | System and method for securing a computer system |
US6823068B1 (en) * | 1999-02-01 | 2004-11-23 | Gideon Samid | Denial cryptography based on graph theory |
US20020099746A1 (en) * | 1999-07-26 | 2002-07-25 | Tie Teck Sing | T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring |
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
US6640303B1 (en) * | 2000-04-28 | 2003-10-28 | Ky Quy Vu | System and method for encryption using transparent keys |
JP5159006B2 (ja) * | 2000-05-25 | 2013-03-06 | インベンテイオ・アクテイエンゲゼルシヤフト | 建物内において手続きを開始する方法 |
CA2329590C (fr) | 2000-12-27 | 2012-06-26 | Certicom Corp. | Methode de generation de cle publique |
US7003670B2 (en) * | 2001-06-08 | 2006-02-21 | Musicrypt, Inc. | Biometric rights management system |
CN1322701C (zh) * | 2002-07-24 | 2007-06-20 | 谢道裕 | 幻方身份双向认证与密钥传输一体化方法 |
US7406174B2 (en) * | 2003-10-21 | 2008-07-29 | Widevine Technologies, Inc. | System and method for n-dimensional encryption |
US7885411B2 (en) | 2004-04-02 | 2011-02-08 | Research In Motion Limited | Key agreement and re-keying over a bidirectional communication path |
EP1592165A1 (fr) * | 2004-04-26 | 2005-11-02 | Ahmed Friaa | Méthode de cryptographie basée sur des k-cubes particuliers et utilisation de ces k-cubes en cryptographie |
US7412054B2 (en) * | 2004-05-04 | 2008-08-12 | International Business Machines Corporation | Matrix encryption method and system |
DE102004050187B4 (de) | 2004-08-23 | 2020-07-09 | Karl Eckhart Heinz | Verfahren zur Chiffrierung und Dechiffrierung von Datenelementen |
US8331559B2 (en) * | 2004-10-12 | 2012-12-11 | Chiou-Haun Lee | Diffused data encryption/decryption processing method |
US8489659B2 (en) * | 2007-10-19 | 2013-07-16 | Schneider Electric USA, Inc. | Pseudorandom number generation |
US20090119115A1 (en) * | 2007-11-05 | 2009-05-07 | Shmuel Shaffer | Customizing A Target Using An Endpoint |
US8618908B2 (en) * | 2007-11-20 | 2013-12-31 | Cisco Technology, Inc. | Providing an endpoint access to a locked target |
US20110296165A1 (en) * | 2009-02-25 | 2011-12-01 | Junko Suginaka | Information processing apparatus, transmission information encryption method, and transmission information encryption program |
US20110320813A1 (en) * | 2009-03-10 | 2011-12-29 | Junko Suginaka | Network system and authentication method thereof |
CN102752108B (zh) * | 2012-06-29 | 2014-12-10 | 湖北大学 | 魔方加密和解密方法 |
US10204530B1 (en) | 2014-07-11 | 2019-02-12 | Shape Matrix Geometric Instruments, LLC | Shape-matrix geometric instrument |
US10952069B1 (en) | 2017-11-07 | 2021-03-16 | Imam Abdulrahman Bin Faisal University | IoT cryptosystem device, system, method and computer program product |
US10783230B2 (en) | 2018-05-09 | 2020-09-22 | Shape Matrix Geometric Instruments, LLC | Methods and apparatus for encoding passwords or other information |
CN109474428A (zh) * | 2018-11-28 | 2019-03-15 | 北京杰睿中恒科技有限公司 | 基于数字信号数据的动态加密方法和装置 |
US11282288B2 (en) | 2019-11-20 | 2022-03-22 | Shape Matrix Geometric Instruments, LLC | Methods and apparatus for encoding data in notched shapes |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US744041A (en) * | 1901-09-21 | 1903-11-17 | Charles G Burke | Telegraphic code. |
NL279100A (fr) * | 1961-05-30 | |||
DE2658065A1 (de) | 1976-12-22 | 1978-07-06 | Ibm Deutschland | Maschinelles chiffrieren und dechiffrieren |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4988987A (en) * | 1985-12-30 | 1991-01-29 | Supra Products, Inc. | Keysafe system with timer/calendar features |
US5058160A (en) * | 1988-04-29 | 1991-10-15 | Scientific-Atlanta, Inc. | In-band controller |
IL108645A (en) * | 1994-02-14 | 1997-09-30 | Elementrix Technologies Ltd | Protected communication method and system |
US5787172A (en) * | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5663896A (en) | 1994-09-22 | 1997-09-02 | Intel Corporation | Broadcast key distribution apparatus and method using Chinese Remainder |
US5724428A (en) | 1995-11-01 | 1998-03-03 | Rsa Data Security, Inc. | Block encryption algorithm with data-dependent rotations |
US5771291A (en) * | 1995-12-11 | 1998-06-23 | Newton; Farrell | User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer |
-
1997
- 1997-10-24 US US08/957,288 patent/US6219421B1/en not_active Expired - Fee Related
-
1998
- 1998-10-22 IL IL13577098A patent/IL135770A0/xx unknown
- 1998-10-22 CN CN98811457A patent/CN1279851A/zh active Pending
- 1998-10-22 WO PCT/IB1998/001698 patent/WO1999022485A1/fr not_active Application Discontinuation
- 1998-10-22 CA CA002307234A patent/CA2307234A1/fr not_active Abandoned
- 1998-10-22 KR KR1020007004433A patent/KR20010024562A/ko not_active Application Discontinuation
- 1998-10-22 JP JP2000518475A patent/JP2001522056A/ja active Pending
- 1998-10-22 AU AU94544/98A patent/AU9454498A/en not_active Abandoned
- 1998-10-22 EP EP98947721A patent/EP1025671A1/fr not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO1999022485A1 (fr) | 1999-05-06 |
AU9454498A (en) | 1999-05-17 |
CA2307234A1 (fr) | 1999-05-06 |
CN1279851A (zh) | 2001-01-10 |
JP2001522056A (ja) | 2001-11-13 |
EP1025671A1 (fr) | 2000-08-09 |
US6219421B1 (en) | 2001-04-17 |
KR20010024562A (ko) | 2001-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL135770A0 (en) | Virtual matrix encryption (vme) and virtual key cryptographic method and apparatus | |
EP0962072A4 (fr) | Procede et appareil de cryptage et de decryptage | |
GB2296639B (en) | Apparatus for key distribution in an encryption system | |
IL130239A (en) | Public key cryptographic apparatus and method | |
SG83093A1 (en) | Encryption/decryption method and encryption/ decryption apparatus | |
AU1333295A (en) | Apparatus and method for encrypting communications without exchanging an encryption key | |
GB9213169D0 (en) | Cryptographic key management apparatus and method | |
AU1061499A (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
EP0686906A3 (fr) | Procédé et dispositif pour améliorer la sûreté de logiciel et pour la distribution de logiciel | |
EP1040618A4 (fr) | Procede et appareil de cryptage et de compression simultanes de donnees | |
HUP9902892A3 (en) | Method and apparatus for providing for the recovery of a cryptographic key | |
AU3544499A (en) | Secret key cryptosystem and method utilizing factorizations of permutation groups of arbritrary order 2I | |
AU3199399A (en) | Encryption key management system and method | |
AU1702900A (en) | Data encrypting and decrypting apparatus and methods | |
PL347367A1 (en) | Cryptographic communication process and apparatus | |
AU1994799A (en) | Method and apparatus for generating encryption stream ciphers | |
GB9503738D0 (en) | Cryptographic key management | |
EP0974913A4 (fr) | Systeme informatique, systeme cryptographique, circuit systeme lsi, et appareil electronique | |
GB9709311D0 (en) | Data encryption/decryption method and apparatus | |
IL122521A0 (en) | Decryption of retransmitted data in an encrypted communication system | |
NO960793L (no) | Fremgangsmåte for tilveiebringelse og fordeling av ikke-personspesifiserte fortrolige elektroniske nökler | |
AU6015999A (en) | Method and apparatus for centralized encryption key calculation | |
IL128846A0 (en) | Method and apparatus for data encryption | |
IL122520A0 (en) | Decryption of retransmitted data in an encrypted communication system | |
GB2329308B (en) | Encryption method and apparatus |