JPH09505711A - コンピュータ・ネットワーク暗号鍵配布システム - Google Patents
コンピュータ・ネットワーク暗号鍵配布システムInfo
- Publication number
- JPH09505711A JPH09505711A JP7526587A JP52658795A JPH09505711A JP H09505711 A JPH09505711 A JP H09505711A JP 7526587 A JP7526587 A JP 7526587A JP 52658795 A JP52658795 A JP 52658795A JP H09505711 A JPH09505711 A JP H09505711A
- Authority
- JP
- Japan
- Prior art keywords
- key
- public
- access control
- encryption
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
Abstract
Description
Claims (1)
- 【特許請求の範囲】 1. 暗号器(10)、復号器(30)、鍵公表エージェント(32)を含むコンピ ュータ・ネットワークを通じてメッセージ暗号鍵を公開して配布する方法におい て: 暗号器は鍵公表公開鍵とアクセス制御復号ブロックに関連する識別子を配布し 、アクセス制御復号ブロックは鍵公表公開鍵(14)を使用して生成され、メッ セージ暗号鍵を再生し; 復号器はローカルに保護されたトラザクション(44)によって識別子、アク セス制御復号ブロックを鍵公表エージェントに送り、前記識別子は鍵開放公開鍵 に対応する鍵公表個人鍵を示し; 鍵公表エージェントは、識別子を使用してアクセス制御復号ブロックからメッ セージ暗号鍵を再生し、もし復号器がメッセージ暗号鍵で暗号化されたメッセー ジを解読する認証を与えられているならば、メッセージ暗号鍵を復号器に送るこ とを特徴とするメッセージ暗号鍵公開配布方法。 2. 請求項1のコンピュータ・ネットワークにおけるメッセージ暗号鍵公開配 布方法は、さらに: 暗号器は、鍵公表公開鍵の下でメッセージ暗号鍵を暗号化することによってア クセス制御復号ブロックを生成し、そこで鍵公表公開鍵は、鍵公表個人鍵は可逆 公開鍵暗号化システムの鍵の対を構成することを特徴とするメッセージ暗号鍵公 開配布方法。 3. 請求項1のコンピュータ・ネットワークにおけるメッセージ暗号鍵公開配 布方法は、さらに: 暗号器は、ディフィ・ヘルマン鍵生成技術によって鍵公表公開鍵から生成され た対称鍵の下でメッセージ暗号鍵を暗号化することによって、アクセス制御復号 ブロックを生成することを特徴とするメッセージ暗号鍵公開配布方法。 4. 請求項1のコンピュータ・ネットワークにおけるメッセージ暗号鍵公開配 布方法は、さらに: 暗号器は、ディフィ・ヘルマン鍵生成技術によってメッセージ暗号鍵を生成す ることを特徴とする方法。 5. 暗号器、復号器、鍵公表エージェントを含み、メッセージ暗号鍵の下で暗 号化されたメッセージ暗号文を転送するコンピュータ・ネットワークを通じてメ ッセージ暗号鍵を公開して配布する方法において: 暗号器は、アクセス制御復号ブロックを生成し、そのアクセス制御復号ブロッ クはメッセージ暗号鍵と認証された復号器のステートメントを含み、それらは鍵 公表公開鍵によって保護され、特定の安全領域の鍵公表エージェントのみが鍵公 表公開鍵に対応する鍵公表個人鍵の知識を有し; 暗号器は、アクセス制御復号ブロック、安全領域識別子、鍵公表個人鍵の識別 子を配布し; 復号器は、ローカルに保護されたトラザクションによって、アクセス制御復号 ブロック、鍵公表個人鍵の識別子、復号器のアイデンティティを含む復号器属性 を含む鍵公表要求を鍵公表エージェントへ送り; 鍵公表エージェントは、鍵公表個人鍵を使用して、メッセージ暗号鍵とアクセ ス制御属性をアクセス制御復号ブロックから再生し、復号器属性とアクセス制御 復号ブロック中の認証された復号器のステートメントに基づき、復号器がメッセ ージ暗号文を解読する認証が与えられているかを決定し;さらに 鍵公表エージェントは、もし復号器に認証が与えられていると、メッセージ暗 号鍵をローカルに保護されたトラザクションで復号器に送ることを特徴とするメ ッセージ暗号鍵公開配布方法。 6. 請求項5のメッセージ暗号鍵公開配布方法は、さらに: アクセス制御属性をアクセス制御暗号鍵の下で暗号化し; アクセス制御暗号鍵とメッセージ暗号鍵を鍵公表公開鍵を使用して暗号化し( 56);さらに 暗号化されたアクセス制御属性、アクセス制御暗号鍵、メッセージ暗号鍵をア クセス制御復号ブロックへ挿入(58)することを特徴とするメッセージ暗号鍵 公開配布方法。 7. 請求項6のメッセージ暗号鍵公開配布方法において: 鍵公表公開鍵は、ディフィ・ヘルマン鍵生成技術で使用される鍵であり、復号 器に送出する暗号器のステップは、ディフィ・ヘルマン鍵生成技術で使用される 指数(84)を含むアクセス制御復号ブロックを送るステップを含むことを特徴 とするメッセージ暗号鍵公開配布方法。 8. 請求項6のメッセージ暗号鍵公開配布方法において: 鍵公表公開鍵はディフィ・ヘルマン鍵生成技術に使用され、メッセージ暗号鍵 とアクセス制御暗号鍵を含むD鍵を生成することを特徴とするメッセージ暗号鍵 公開配布方法。 9. 請求項5のメッセージ暗号鍵公開配布方法において: 復号器に送出する暗号器のステップは、復号器の認証を示すアクセス制御属性 をさらに含むアクセス制御復号ブロックを送るステップを含むことを特徴とする 一般にメッセージ暗号鍵を配布する方法。 10.請求項9のメッセージ暗号鍵公開配布方法は、さらに: 鍵公表エージェントが別のチャンネル上のデータベースから復号器属性を得る ことを特徴とするメッセージ暗号鍵公開配布方法。 11.鍵公表エージェント(32)によって、暗号器(10)と復号器(30) との間でメッセージ暗号鍵を公開して配布するコンピュータ・ネットワークにお いて: 暗号器は、復号器にネットワークを通じて暗号文、アクセス制御復号ブロック 、公表鍵に関連する識別子を送信する送信手段を含み、アクセス制御復号ブロッ ク は、一組のアクセス制御属性とメッセージ暗号鍵を含み、暗号器は、さらに、メ ッセージ暗号鍵を使用して暗号文を生成するメッセージ暗号化手段と、公表鍵を 使用してアクセス制御復号ブロックを生成するACD生成手段(16)とを含み ; トラザクションを有する復号器は、アクセス制御復号ブロックと識別子を一組 の復号器属性と共にローカルに保護されたトラザクション(44)を通じて鍵公 表エージェントに送る送信手段を有し;さらに 鍵公表エージェントは、公表鍵とACD処理手段(36)を有し、公表鍵を使 用してメッセージ暗号鍵とアクセス制御属性を再生し、鍵公表エージェントはさ らに、復号されたアクセス制御属性と復号器属性に基づいて、復号器が復号を認 証されているかどうかを決定する決定手段と、ローカルに保護されたトラザクシ ョンによってメッセージ暗号鍵を復号器に送る送信手段を含むことを特徴とする コンピュータ・ネットワーク。 12.請求項11のコンピュータ・ネットワークにおいて、暗号器はさらに: アクセス制御暗号鍵の下でアクセス制御属性をアクセス制御暗号鍵の下で暗号 化するアクセス制御暗号化装置(52)と、メッセージ暗号鍵とアクセス制御暗 号鍵を公表鍵の下で暗号化するACD生成装置(56)とを有することを特徴と するコンピュータ・ネットワーク。 13.請求項11のコンピュータ・ネットワークにおいて: 公表鍵は、可逆公開鍵暗号化システムに使用される公開鍵(14)と対応の個 人鍵を有し、その暗号器は公開鍵を有し、鍵公表エージェントは個人鍵を有する ことを特徴とするコンピュータ・ネットワーク。 14.請求項12のコンピュータ・ネットワークにおいて: 公表鍵は、可逆公開鍵暗号化システムに使用される公開鍵と対応の個人鍵を有 し、その暗号器は公開鍵を有し、鍵公表エージェントは個人鍵を有することを特 徴とするコンピュータ・ネットワーク。 15.請求項11のコンピュータ・ネットワークにおいて: 公表鍵は、ディフィ・ヘルマン鍵生成技術によって生成される鍵を含むことを 特徴とするコンピュータ・ネットワーク。 16.請求項12のコンピュータ・ネットワークにおいて: 公表鍵は、ディフィ・ヘルマン鍵生成技術によって生成される鍵を含むことを 特徴とするコンピュータ・ネットワーク。 17.請求項13のコンピュータ・ネットワークにおいて: メッセージ暗号鍵と公表鍵は同一であり、これらはディフィ・ヘルマン鍵生成 技術によって生成された鍵を含むことを特徴とするコンピュータ・ネットワーク 。 18.請求項12のコンピュータ・ネットワークにおいて: 鍵公表エージェントは、さらに、暗号器と復号器以外の第三者が暗号文を解読 することを認証されているかどうかを決定する鍵エスクロ手段を含むことを特徴 とするコンピュータ・ネットワーク。 19.請求項12のコンピュータ・ネットワークにおいて: 鍵公表エージェントは、さらに、データベースに接続された長距離通信チャン ネルを含み、復号器属性を得ることを特徴とするコンピュータ・ネットワーク。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/227,871 | 1994-04-15 | ||
US227,871 | 1994-04-15 | ||
US08/227,871 US5481613A (en) | 1994-04-15 | 1994-04-15 | Computer network cryptographic key distribution system |
PCT/CA1995/000084 WO1995028784A1 (en) | 1994-04-15 | 1995-02-22 | Computer network cryptographic key distribution system |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH09505711A true JPH09505711A (ja) | 1997-06-03 |
JP3060071B2 JP3060071B2 (ja) | 2000-07-04 |
Family
ID=22854805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP7526587A Expired - Fee Related JP3060071B2 (ja) | 1994-04-15 | 1995-02-22 | コンピュータ・ネットワーク暗号鍵配布システム |
Country Status (6)
Country | Link |
---|---|
US (1) | US5481613A (ja) |
EP (1) | EP0755598B1 (ja) |
JP (1) | JP3060071B2 (ja) |
CA (1) | CA2187035C (ja) |
DE (1) | DE69504823T2 (ja) |
WO (1) | WO1995028784A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014171513A1 (ja) | 2013-04-18 | 2014-10-23 | 岡本硝子株式会社 | 水中ビデオカメラ用ハウジング |
JP2016514914A (ja) * | 2013-03-28 | 2016-05-23 | エアバス・ディフェンス・アンド・スペース・リミテッド | 衛星システムにおける鍵配布 |
Families Citing this family (135)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870474A (en) * | 1995-12-04 | 1999-02-09 | Scientific-Atlanta, Inc. | Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers |
US6292568B1 (en) | 1966-12-16 | 2001-09-18 | Scientific-Atlanta, Inc. | Representing entitlements to service in a conditional access system |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
IL106796A (en) * | 1993-08-25 | 1997-11-20 | Algorithmic Res Ltd | Broadcast encryption |
US20020013898A1 (en) * | 1997-06-04 | 2002-01-31 | Sudia Frank W. | Method and apparatus for roaming use of cryptographic values |
US5825880A (en) | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
US5557346A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption |
US5557765A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery |
CA2138302C (en) * | 1994-12-15 | 1999-05-25 | Michael S. Fortinsky | Provision of secure access to external resources from a distributed computing environment |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US7133846B1 (en) * | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US6272632B1 (en) * | 1995-02-21 | 2001-08-07 | Network Associates, Inc. | System and method for controlling access to a user secret using a key recovery field |
US5633928A (en) * | 1995-03-10 | 1997-05-27 | Bell Communications Research, Inc. | Key escrow method with warrant bounds |
US7224798B2 (en) * | 1995-04-03 | 2007-05-29 | Scientific-Atlanta, Inc. | Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system |
US6246767B1 (en) | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US8548166B2 (en) | 1995-04-03 | 2013-10-01 | Anthony J. Wasilewski | Method for partially encrypting program data |
US6157719A (en) * | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
US6937729B2 (en) * | 1995-04-03 | 2005-08-30 | Scientific-Atlanta, Inc. | Representing entitlements to service in a conditional access system |
US6252964B1 (en) * | 1995-04-03 | 2001-06-26 | Scientific-Atlanta, Inc. | Authorization of services in a conditional access system |
US6560340B1 (en) | 1995-04-03 | 2003-05-06 | Scientific-Atlanta, Inc. | Method and apparatus for geographically limiting service in a conditional access system |
US6105134A (en) * | 1995-04-03 | 2000-08-15 | Scientific-Atlanta, Inc. | Verification of the source of program information in a conditional access system |
US20040136532A1 (en) * | 1995-04-03 | 2004-07-15 | Pinder Howard G. | Partial dual-encrypted stream utilizing program map tables |
US6424717B1 (en) | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
ATE492088T1 (de) * | 1995-06-05 | 2011-01-15 | Cqrcert Llc | Verfahren und einrichtung zur digitalen unterschrift in mehreren schritten |
US5687235A (en) * | 1995-10-26 | 1997-11-11 | Novell, Inc. | Certificate revocation performance optimization |
DE19540930C1 (de) * | 1995-11-03 | 1997-04-24 | Strohschneider Sabine | Verfahren zum Erstellen eines Informationsverteilungssystems für beliebig viele geschlossene Nutzergruppen mit Hilfe einer physikalischen Einheit |
DE19549014C1 (de) * | 1995-12-28 | 1997-02-20 | Siemens Ag | Verfahren zum Aktivieren und Ausführen von gesicherten Funktionen in einem Kommunikationssystem |
ES2123479T1 (es) * | 1995-12-29 | 1999-01-16 | Scientific Atlanta | Metodo y aparato para proporcionar acceso condicional en redes interactivas de conexion orientada, con una multiplicidad de proveedores de servicios. |
US5768373A (en) * | 1996-05-06 | 1998-06-16 | Symantec Corporation | Method for providing a secure non-reusable one-time password |
FR2763192B1 (fr) * | 1996-10-18 | 1999-07-02 | Bull Sa | Procede de recuperation de cles mis en oeuvre pour un chiffrement fort de message |
US6483920B2 (en) | 1996-12-04 | 2002-11-19 | Bull, S.A. | Key recovery process used for strong encryption of messages |
US5920630A (en) * | 1997-02-25 | 1999-07-06 | United States Of America | Method of public key cryptography that includes key escrow |
US6035041A (en) * | 1997-04-28 | 2000-03-07 | Certco, Inc. | Optimal-resilience, proactive, public-key cryptographic system and method |
DE19718583C5 (de) * | 1997-05-05 | 2007-04-26 | T-Mobile Deutschland Gmbh | Ende-zu-Ende Verschlüsselung |
IL132961A0 (en) * | 1997-05-28 | 2001-03-19 | Young Adam Lucas | Auto-recoverable auto-certifiable cryptosystems |
US6314190B1 (en) * | 1997-06-06 | 2001-11-06 | Networks Associates Technology, Inc. | Cryptographic system with methods for user-controlled message recovery |
US6775382B1 (en) * | 1997-06-30 | 2004-08-10 | Sun Microsystems, Inc. | Method and apparatus for recovering encryption session keys |
US6229894B1 (en) * | 1997-07-14 | 2001-05-08 | Entrust Technologies, Ltd. | Method and apparatus for access to user-specific encryption information |
US6603857B1 (en) * | 1997-07-14 | 2003-08-05 | Entrust Technologies Limited | Method and apparatus for controlling release of time sensitive information |
AU8757398A (en) * | 1997-07-15 | 1999-02-10 | V-One Corporation | File encryption with key recovery |
US7515712B2 (en) * | 1997-08-01 | 2009-04-07 | Cisco Technology, Inc. | Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system |
US6160891A (en) * | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
US6349289B1 (en) * | 1998-01-16 | 2002-02-19 | Ameritech Corporation | Method and system for tracking computer system usage through a remote access security device |
US6192129B1 (en) | 1998-02-04 | 2001-02-20 | International Business Machines Corporation | Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block |
US6243470B1 (en) | 1998-02-04 | 2001-06-05 | International Business Machines Corporation | Method and apparatus for advanced symmetric key block cipher with variable length key and block |
US6189095B1 (en) | 1998-06-05 | 2001-02-13 | International Business Machines Corporation | Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks |
WO2000022787A2 (en) * | 1998-10-09 | 2000-04-20 | Bankers Trust Company | Method, system, and computer program product for providing enhanced electronic mail services |
US6230266B1 (en) | 1999-02-03 | 2001-05-08 | Sun Microsystems, Inc. | Authentication system and process |
US20020026321A1 (en) | 1999-02-26 | 2002-02-28 | Sadeg M. Faris | Internet-based system and method for fairly and securely enabling timed-constrained competition using globally time-sychronized client subsystems and information servers having microsecond client-event resolution |
EP1208412A2 (en) * | 1999-02-26 | 2002-05-29 | Reveo, Inc. | Globally time-synchronized systems, devices and methods |
US6625734B1 (en) * | 1999-04-26 | 2003-09-23 | Disappearing, Inc. | Controlling and tracking access to disseminated information |
SE514105C2 (sv) * | 1999-05-07 | 2001-01-08 | Ericsson Telefon Ab L M | Säker distribution och skydd av krypteringsnyckelinformation |
US6694025B1 (en) | 1999-06-02 | 2004-02-17 | Koninklijke Philips Electronics N.V. | Method and apparatus for secure distribution of public/private key pairs |
US7142676B1 (en) * | 1999-06-08 | 2006-11-28 | Entrust Limited | Method and apparatus for secure communications using third-party key provider |
US7269261B1 (en) * | 1999-09-22 | 2007-09-11 | Raytheon Company | Key escrow systems |
US20080082446A1 (en) * | 1999-10-01 | 2008-04-03 | Hicks Christian B | Remote Authorization for Unlocking Electronic Data System and Method |
US7076061B1 (en) | 2000-02-07 | 2006-07-11 | Citibank, N.A. | Efficient and compact subgroup trace representation (“XTR”) |
US20050213758A1 (en) * | 2000-02-07 | 2005-09-29 | Lenstra Arjen K | Efficient and compact subgroup trace representation ("XTR") |
SG103257A1 (en) * | 2000-04-13 | 2004-04-29 | Kent Ridge Digital Labs | Private retrieval of digital objects |
US6807277B1 (en) * | 2000-06-12 | 2004-10-19 | Surety, Llc | Secure messaging system with return receipts |
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
AU7182701A (en) * | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
US6851049B1 (en) * | 2000-10-02 | 2005-02-01 | Pgp Corporation | Method and apparatus for facilitating secure anonymous email recipients |
US20020071567A1 (en) * | 2000-12-12 | 2002-06-13 | Kurn David Michael | Scalable computer system using remote agents to manipulate cryptographic keys |
US8161565B1 (en) * | 2000-12-26 | 2012-04-17 | Entrust, Inc. | Key release systems, components and methods |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
WO2002080401A2 (en) * | 2001-03-28 | 2002-10-10 | Qualcomm Incorporated | Power control for point-to-multipoint services provided in communication systems |
US7693508B2 (en) * | 2001-03-28 | 2010-04-06 | Qualcomm Incorporated | Method and apparatus for broadcast signaling in a wireless communication system |
US8121296B2 (en) * | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
US9100457B2 (en) * | 2001-03-28 | 2015-08-04 | Qualcomm Incorporated | Method and apparatus for transmission framing in a wireless communication system |
US8077679B2 (en) * | 2001-03-28 | 2011-12-13 | Qualcomm Incorporated | Method and apparatus for providing protocol options in a wireless communication system |
JP2003023421A (ja) * | 2001-07-09 | 2003-01-24 | C4 Technology Inc | 暗号方法、そのプログラム、そのプログラムを記録した記録媒体および暗号装置並びに復号方法および復号装置 |
US8077861B2 (en) | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
US7577250B2 (en) | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
US7564970B2 (en) * | 2004-08-12 | 2009-07-21 | Cmla, Llc | Exponential data transform to enhance security |
US20040120527A1 (en) * | 2001-08-20 | 2004-06-24 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US7185362B2 (en) * | 2001-08-20 | 2007-02-27 | Qualcomm, Incorporated | Method and apparatus for security in a data processing system |
US7697523B2 (en) * | 2001-10-03 | 2010-04-13 | Qualcomm Incorporated | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) * | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
US7093133B2 (en) * | 2001-12-20 | 2006-08-15 | Hewlett-Packard Development Company, L.P. | Group signature generation system using multiple primes |
US7146009B2 (en) * | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
FR2836609A1 (fr) * | 2002-02-25 | 2003-08-29 | Thomson Licensing Sa | Procede de traitement de donnees chiffrees pour un premier domaine et recues dans un reseau appartenant a un second domaine |
US20040117618A1 (en) * | 2002-03-13 | 2004-06-17 | Kyoko Kawaguchi | Service execution module |
US6711678B2 (en) * | 2002-04-05 | 2004-03-23 | Expand Beyond Corporation | Pre-authenticated communication within a secure computer network |
TW576063B (en) * | 2002-07-10 | 2004-02-11 | Benq Corp | Device and method for securing information associated with a subscriber in a communication apparatus |
US7599655B2 (en) * | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
DE10305730B4 (de) * | 2003-02-12 | 2005-04-07 | Deutsche Post Ag | Verfahren zum Überprüfen der Gültigkeit von digitalen Freimachungsvermerken |
EP1460796A3 (en) * | 2003-03-17 | 2005-02-16 | Broadcom Corporation | Encryption-decryption key generation and distribution |
US8098818B2 (en) * | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US8718279B2 (en) * | 2003-07-08 | 2014-05-06 | Qualcomm Incorporated | Apparatus and method for a secure broadcast system |
US8724803B2 (en) * | 2003-09-02 | 2014-05-13 | Qualcomm Incorporated | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system |
US8332652B2 (en) * | 2003-10-01 | 2012-12-11 | International Business Machines Corporation | Computing device that securely runs authorized software |
US8396216B2 (en) * | 2003-11-21 | 2013-03-12 | Howard G. Pinder | Partial dual-encryption using program map tables |
EP1741224B1 (en) * | 2004-05-03 | 2008-12-10 | Research In Motion Limited | System and method for generating reproducible session keys |
US7548152B2 (en) * | 2004-10-08 | 2009-06-16 | Entrust Limited | RFID transponder information security methods systems and devices |
US20060182283A1 (en) * | 2005-02-14 | 2006-08-17 | Tricipher, Inc. | Architecture for asymmetric crypto-key storage |
US8099607B2 (en) * | 2005-01-18 | 2012-01-17 | Vmware, Inc. | Asymmetric crypto-graphy with rolling key security |
US20060182277A1 (en) * | 2005-02-14 | 2006-08-17 | Tricipher, Inc. | Roaming utilizing an asymmetric key pair |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US8095960B2 (en) * | 2005-11-21 | 2012-01-10 | Novell, Inc. | Secure synchronization and sharing of secrets |
US8135645B2 (en) * | 2005-12-06 | 2012-03-13 | Microsoft Corporation | Key distribution for secure messaging |
US7499552B2 (en) * | 2006-01-11 | 2009-03-03 | International Business Machines Corporation | Cipher method and system for verifying a decryption of an encrypted user data key |
US8670564B1 (en) * | 2006-08-14 | 2014-03-11 | Key Holdings, LLC | Data encryption system and method |
US20090097657A1 (en) * | 2007-10-05 | 2009-04-16 | Scheidt Edward M | Constructive Channel Key |
US8376381B2 (en) | 2008-12-01 | 2013-02-19 | Commonwheel Ventures, Inc. | Versatile, collapsible cart-trailer with modular components |
US8819446B2 (en) * | 2009-06-26 | 2014-08-26 | International Business Machines Corporation | Support for secure objects in a computer system |
US9846789B2 (en) | 2011-09-06 | 2017-12-19 | International Business Machines Corporation | Protecting application programs from malicious software or malware |
US9298894B2 (en) * | 2009-06-26 | 2016-03-29 | International Business Machines Corporation | Cache structure for a computer system providing support for secure objects |
US8954752B2 (en) | 2011-02-23 | 2015-02-10 | International Business Machines Corporation | Building and distributing secure object software |
US9954875B2 (en) | 2009-06-26 | 2018-04-24 | International Business Machines Corporation | Protecting from unintentional malware download |
US8578175B2 (en) | 2011-02-23 | 2013-11-05 | International Business Machines Corporation | Secure object having protected region, integrity tree, and unprotected region |
US8397281B2 (en) * | 2009-12-30 | 2013-03-12 | Symantec Corporation | Service assisted secret provisioning |
US9026805B2 (en) | 2010-12-30 | 2015-05-05 | Microsoft Technology Licensing, Llc | Key management using trusted platform modules |
US9864853B2 (en) | 2011-02-23 | 2018-01-09 | International Business Machines Corporation | Enhanced security mechanism for authentication of users of a system |
WO2012129546A2 (en) * | 2011-03-23 | 2012-09-27 | Selerity, Inc. | Securely enabling access to information over a network across multiple protocols |
CA2795287C (en) * | 2011-04-01 | 2018-02-27 | Certicom Corp. | Identity-based decryption |
US9172529B2 (en) * | 2011-09-16 | 2015-10-27 | Certicom Corp. | Hybrid encryption schemes |
EP2756627B1 (en) | 2011-09-28 | 2018-11-14 | Koninklijke Philips N.V. | Hierarchical attribute-based encryption and decryption |
US9008316B2 (en) * | 2012-03-29 | 2015-04-14 | Microsoft Technology Licensing, Llc | Role-based distributed key management |
US9223965B2 (en) | 2013-12-10 | 2015-12-29 | International Business Machines Corporation | Secure generation and management of a virtual card on a mobile device |
US9235692B2 (en) | 2013-12-13 | 2016-01-12 | International Business Machines Corporation | Secure application debugging |
US10002512B2 (en) | 2014-01-30 | 2018-06-19 | Le-Jun Yin | System and method for object entry and egress control in a predefined area |
US11200560B2 (en) | 2014-12-19 | 2021-12-14 | Capital One Services, Llc | Systems and methods for contactless and secure data transfer |
US20160292445A1 (en) | 2015-03-31 | 2016-10-06 | Secude Ag | Context-based data classification |
JP6419660B2 (ja) * | 2015-07-29 | 2018-11-07 | 株式会社日立製作所 | 秘密情報設定方法、秘密情報設定システム、および秘密情報設定装置 |
EP3196798A1 (en) | 2016-01-19 | 2017-07-26 | Secude AG | Context-sensitive copy and paste block |
US10484379B2 (en) * | 2017-03-16 | 2019-11-19 | Motorola Solutions, Inc. | System and method for providing least privilege access in a microservices architecture |
US10944733B2 (en) | 2017-07-31 | 2021-03-09 | Cisco Technology, Inc. | Dynamic disassociated channel encryption key distribution |
CN107590748B (zh) * | 2017-08-17 | 2020-07-10 | 天津大学 | 一种配电网安全域的全维观测方法 |
US11115395B2 (en) | 2019-07-23 | 2021-09-07 | Harris Global Communications, Inc. | Cross-domain information transfer system and associated methods |
WO2021092488A1 (en) * | 2019-11-06 | 2021-05-14 | Washington University | Public key encryption using self powered timers |
US11372986B1 (en) * | 2021-01-18 | 2022-06-28 | Axiom Technologies LLC | Systems and methods for encrypted content management |
RU2766319C1 (ru) * | 2021-03-24 | 2022-03-15 | федеральное государственное казенное военное образовательное учреждение высшего образования "Военная орденов Жукова и Ленина Краснознаменная академия связи имени Маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации | Способ формирования ключа шифрования / дешифрования |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
NL8301458A (nl) * | 1983-04-26 | 1984-11-16 | Philips Nv | Werkwijze voor het distribueren en benutten van vercijferingssleutels. |
US4888801A (en) * | 1988-05-02 | 1989-12-19 | Motorola, Inc. | Hierarchical key management system |
US4864615A (en) * | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
JP3080382B2 (ja) * | 1990-02-21 | 2000-08-28 | 株式会社日立製作所 | 暗号通信システム |
GB9104909D0 (en) * | 1991-03-08 | 1991-04-24 | Int Computers Ltd | Access control in a distributed computer system |
US5200999A (en) * | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Public key cryptosystem key management based on control vectors |
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5265164A (en) * | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5276737B1 (en) * | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use |
US5315658B1 (en) * | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use |
US5341426A (en) * | 1992-12-15 | 1994-08-23 | Motorola, Inc. | Cryptographic key management apparatus and method |
-
1994
- 1994-04-15 US US08/227,871 patent/US5481613A/en not_active Expired - Fee Related
-
1995
- 1995-02-22 DE DE69504823T patent/DE69504823T2/de not_active Expired - Lifetime
- 1995-02-22 EP EP95908852A patent/EP0755598B1/en not_active Expired - Lifetime
- 1995-02-22 CA CA002187035A patent/CA2187035C/en not_active Expired - Lifetime
- 1995-02-22 WO PCT/CA1995/000084 patent/WO1995028784A1/en active IP Right Grant
- 1995-02-22 JP JP7526587A patent/JP3060071B2/ja not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016514914A (ja) * | 2013-03-28 | 2016-05-23 | エアバス・ディフェンス・アンド・スペース・リミテッド | 衛星システムにおける鍵配布 |
US10069624B2 (en) | 2013-03-28 | 2018-09-04 | Airbus Defence And Space Limited | Autonomous and seamless key distribution mechanism |
WO2014171513A1 (ja) | 2013-04-18 | 2014-10-23 | 岡本硝子株式会社 | 水中ビデオカメラ用ハウジング |
US9829771B2 (en) | 2013-04-18 | 2017-11-28 | Okamoto Glass Co., Ltd. | Housing for an underwater video camera |
Also Published As
Publication number | Publication date |
---|---|
EP0755598B1 (en) | 1998-09-16 |
US5481613A (en) | 1996-01-02 |
DE69504823D1 (de) | 1998-10-22 |
DE69504823T2 (de) | 1999-02-11 |
EP0755598A1 (en) | 1997-01-29 |
CA2187035C (en) | 1999-10-05 |
WO1995028784A1 (en) | 1995-10-26 |
CA2187035A1 (en) | 1995-10-26 |
JP3060071B2 (ja) | 2000-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3060071B2 (ja) | コンピュータ・ネットワーク暗号鍵配布システム | |
US5748735A (en) | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |
US7657037B2 (en) | Apparatus and method for identity-based encryption within a conventional public-key infrastructure | |
KR100568233B1 (ko) | 인증서를 이용한 기기 인증 방법 및 상기 방법을 이용하여기기 인증을 수행하는 디지털 컨텐츠 처리 기기 | |
US6058188A (en) | Method and apparatus for interoperable validation of key recovery information in a cryptographic system | |
US8108678B1 (en) | Identity-based signcryption system | |
US5604801A (en) | Public key data communications system under control of a portable security device | |
US6483920B2 (en) | Key recovery process used for strong encryption of messages | |
US6694025B1 (en) | Method and apparatus for secure distribution of public/private key pairs | |
US6092201A (en) | Method and apparatus for extending secure communication operations via a shared list | |
US7624269B2 (en) | Secure messaging system with derived keys | |
US6192130B1 (en) | Information security subscriber trust authority transfer system with private key history transfer | |
US7688975B2 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
US20050152542A1 (en) | Public key encryption for groups | |
WO1995027355A1 (en) | Electronic proof of receipt | |
JPH11119650A (ja) | ディジタル署名の長期検証のための方法及び装置 | |
KR20010067966A (ko) | 피케이아이 기반의 상업용 키위탁 방법 및 시스템 | |
GB2385955A (en) | Key certification using certificate chains | |
US20040073790A1 (en) | Intermediated delivery scheme for asymmetric fair exchange of electronic items | |
Benantar | The Internet public key infrastructure | |
US8161565B1 (en) | Key release systems, components and methods | |
JPH09305661A (ja) | 出所認証方法 | |
US8307098B1 (en) | System, method, and program for managing a user key used to sign a message for a data processing system | |
JP2003501878A (ja) | 公開鍵−秘密鍵のペアを安全に生成する方法及びその装置 | |
JPH09130376A (ja) | 利用者パスワード認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20080428 Year of fee payment: 8 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090428 Year of fee payment: 9 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100428 Year of fee payment: 10 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100428 Year of fee payment: 10 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20110428 Year of fee payment: 11 |
|
LAPS | Cancellation because of no payment of annual fees |