会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Secure key management using programable control vector checking
    • 使用可编程控制向量检查实现安全密钥管理
    • US5007089A
    • 1991-04-09
    • US506319
    • 1990-04-09
    • Stephen M. MatyasDonald B. JohnsonAn V. LeWilliam C. MartinRostislaw PrymakJohn D. Wilkins
    • Stephen M. MatyasDonald B. JohnsonAn V. LeWilliam C. MartinRostislaw PrymakJohn D. Wilkins
    • G06F21/22G09C1/00H04L9/08
    • H04L9/088
    • The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the cryptographic facility by one of several means. A first means for linking the repository to the cryptographic facility would include a physically secure data communications link. A second means for connecting the repository to the cryptographic facility would be by using an insecure channel with authentication, wherein either a modification detection code or alternately a message authentication code would be transmitted to the cryptographic facility and then the desired control vector checking code would be transmitted over the link. The cryptographic facility will include a code authorization mechanism to compare the transmitted MAC or MDC with a corresponding value computed from the received control vector checking code. If the two values of the MDC or the MAC compare, then the control vector checking code is authenticated and loaded into the control vector checking unit for carrying out the control vector checking operations desired. The control vector checking code repository can be located in a remote system connected by means of the communications link to the crypto facility, or alternately the repository can reside in the same system as the crypto facility. This provides for the dynamic updating of control vector checking code, where improvements or alterations are made to the control vector checking sequence. This also provides for a reduced memory size in the crypto facility, being sufficiently large to accommodate subsidiary control vector checking applications, with alternate control vector checking applications requiring the reloading of the control vector checking unit from the repository.
    • 2. 发明授权
    • Public key cryptosystem key management based on control vectors
    • 基于控制向量的公钥关键CRYPTOSYSTEM密钥管理
    • US5200999A
    • 1993-04-06
    • US766260
    • 1991-09-27
    • Stephen M. MatyasDonald B. JohnsonAn V. LeRostislaw PrymakWilliam C. MartinWilliam S. RohlandJohn D. Wilkins
    • Stephen M. MatyasDonald B. JohnsonAn V. LeRostislaw PrymakWilliam C. MartinWilliam S. RohlandJohn D. Wilkins
    • G09C1/00G06F9/30H04L9/08
    • H04L9/0844G06F9/30007G06F9/30018H04L9/088H04L2209/12H04L2209/38
    • A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector. The method then forms a private key token which includes the private control vector and the private key record, and stores the private key token in the data processing system.At a later time, the method receives a first key use request in the data processing system, requiring the first public key algorithm. In response to this, the method continues by accessing the private key token in the data processing system and checking the private control vector to determine if the private key record contains a key having permitted uses which will satisfy the first request. The method then decrypts the private key record under the first master key expression in the data processing system and extracts the first private key from the private key record. The method selects the first public key algorithm in the data processing system for the first key use request and executes the first public key algorithm in the data processing system using the first private key to perform a cryptographic operation to satisfy the first key use request.
    • 8. 发明授权
    • Method and system for multimedia access control enablement
    • 多媒体访问控制功能的方法和系统
    • US5319705A
    • 1994-06-07
    • US964324
    • 1992-10-21
    • Bernard J. HalterAlphonse M. BraccoDonald B. JohnsonAn V. LeStephen M. MatyasRostislaw Prymak, deceasedJames D. RandallJohn D. Wilkins
    • Bernard J. HalterAlphonse M. BraccoDonald B. JohnsonAn V. LeStephen M. MatyasRostislaw Prymak, deceasedJames D. RandallJohn D. Wilkins
    • G06F9/445G06F1/00G06F12/14G06F13/00G06F21/00G06F21/20G06F21/22G06F21/24G09C1/00H04L9/08H04L9/00
    • H04L9/0894G06F21/10H04L9/0637H04L9/0822H04L2209/56H04L2209/605
    • A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a customer key which includes a clear customer number and a derived portion derived from the customer number. The customer key is transformed into a second customer key which serves as a key expression for encrypting a file encryption key specifically intended for a respective one of the plurality of files. A plurality of software files can be stored together, for example on a CD-ROM, with each file encrypted under a corresponding file encryption key. The CD-ROM can be distributed to many user processors. When a specific user processor needs to run one of the software files, a request will be transmitted from the user processor to the software distribution processor. In response to that request, an encrypted file encryption key specific for the requested file, will be transmitted to the user processor. This will enable the user processor to decrypt only the requested file from the CD-ROM. All other files on the CD-ROM remain in their encrypted form and cannot be decrypted and used by the file encryption key received from the software distribution processor.
    • 公开了一种用于将多个软件文件从软件分发处理器安全地分发到用户处理器的方法和系统,同时选择性地使得用户处理器仅使用较少多个软件文件的子集。 这是通过采用客户密钥来实现的,客户密钥包括清除客户号码和从客户号码导出的派生部分。 客户密钥被转换成第二客户密钥,其作为用于加密专门针对多个文件中的相应文件的文件加密密钥的关键表达。 可以将多个软件文件一起存储在例如CD-ROM上,每个文件在相应的文件加密密钥下被加密。 CD-ROM可以分发给许多用户处理器。 当特定用户处理器需要运行其中一个软件文件时,将从用户处理器向软件分发处理器发送请求。 响应于该请求,特定于所请求文件的加密文件加密密钥将被发送到用户处理器。 这将使用户处理器只能从CD-ROM解密所请求的文件。 CD-ROM上的所有其他文件保持加密形式,不能被从软件分发处理器接收的文件加密密钥解密和使用。