scispace - formally typeset
R

Rostislaw Prymak

Researcher at IBM

Publications -  19
Citations -  1969

Rostislaw Prymak is an academic researcher from IBM. The author has contributed to research in topics: Key management & Key (cryptography). The author has an hindex of 15, co-authored 19 publications receiving 1969 citations.

Papers
More filters
Patent

Method and system for multimedia access control enablement

TL;DR: In this article, a method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files.
Patent

Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors

TL;DR: In this paper, the authors describe a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key encryption key and control information associated with it) using a public key algorithm and a private key belonging to the intended recipient.
Patent

Public key cryptosystem key management based on control vectors

TL;DR: In this article, a data processing system, method and program are disclosed, for managing a public key cryptographic system, which includes the steps of generating a first public key and a first private key as a first pair in the data process system, for use with a first key algorithm and further generating a second public key, and a second private key, as a second pair, for using with a second key algorithm, and encrypting the private key record under a first master key expression which is a function of the private control vector.
Patent

Method to establish and enforce a network cryptographic security policy in a public key cryptosystem

TL;DR: In this article, the authors present a public key cryptographic network, where the certification center is required to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector.
Patent

Cryptographic facility environment backup/restore and replication in a public key cryptosystem

TL;DR: In this paper, the authors describe a system that includes a first cryptographic facility containing a portable part which personalizes the first cryptographic device and a second cryptographic device which is linked to the first by a public key cryptographic system.