scispace - formally typeset
Search or ask a question
Author

Sudia Frank W

Bio: Sudia Frank W is an academic researcher. The author has contributed to research in topics: Escrow & Key escrow. The author has an hindex of 1, co-authored 4 publications receiving 671 citations.

Papers
More filters
Patent
19 Feb 1997
TL;DR: In this article, a cryptographic system with key escrow feature that uses a method for verifiably splitting user's private encryption keys into components and for sending those components to trusted agents chosen by the particular users is provided.
Abstract: A cryptographic system with key escrow feature that uses a method for verifiably splitting user's private encryption keys into components and for sending those components to trusted agents chosen by the particular users is provided. The system uses public key certificate management, enforced by a chip device that also self-certifies. The methods for key escrow and receiving an escrow certificate are applied to register a trusted device with a trusted third party and to receive authorization from that party enabling the device to communicate with other trusted devices. The methods for key escrow also provide assurance that a trusted device will engage in electronic transactions in accordance with predetermined rules.

669 citations

Patent
28 May 1999
TL;DR: In this article, the authors proposed a key escrow scheme for verifiably splitting users' private encryption keys into components and sending those components to trusted agents chosen by the particular users, enforced by a chip device that also self-certifies.
Abstract: The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern public key certificate management, enforced by a chip device that also self-certifies. In a preferred embodiment of this invention, the chip encrypts or decrypts only if certain conditions are met, namely, (1) if a valid "sender certificate" and a valid "recipient certificate" are input, where "valid" means that the particular user's private decryption key is provably escrowed with a specified number of escrow agents and that the master escrow center is registered and certified by the chip manufacturer, and (2) if a valid Message Control Header is generated by the sender and validated by the recipient, thereby giving authorized investigators sufficient information with which to request and obtain the escrowed keys.

1 citations

Patent
01 Sep 2001
TL;DR: In this paper, the authors present a SUMINISTEMA CRIPTOGRAFICO and UN METODO CON UNA CARACTERISTICA DE PLICA DE CLAVE QUE UTILIZA UNMETODO PARA DIVIDIR DE FORMA VERIFICABLE LAS CLAVES DE ENCRIPTACION PRIVADAS DE LOS USUARIOS EN COMPONENTES Y PARA ENVIAR ESOS COMPonentes A AGENTES DE CONFIANZA ESCOGIDOS POR L
Abstract: LA INVENCION SUMINISTRA UN SISTEMA CRIPTOGRAFICO Y UN METODO CON UNA CARACTERISTICA DE PLICA DE CLAVE QUE UTILIZA UN METODO PARA DIVIDIR DE FORMA VERIFICABLE LAS CLAVES DE ENCRIPTACION PRIVADAS DE LOS USUARIOS EN COMPONENTES Y PARA ENVIAR ESOS COMPONENTES A AGENTES DE CONFIANZA ESCOGIDOS POR LOS USUARIOS PARTICULARES, Y SUMINISTRA UN SISTEMA QUE UTILIZA UN MANEJO CERTIFICADO DE CLAVES PUBLICAS REFORZADO POR UN DISPOSITIVO DE CHIP QUE TAMBIEN EFECTUA UNA AUTOCERTIFICACION EN UNA CONFORMACION PREFERIDA DE LA INVENCION EL CHIP ENCRIPTA O DESENCRIPTA SOLAMENTE SI SE ENCUENTRAN CIERTAS CONDICIONES, NOMINALMENTE, 1) SI SE INTRODUCEN UN "CERTIFICADO DE REMITENTE" VALIDO Y UN "CERTIFICADO DE RECEPTOR" VALIDO, EN DONDE "VALIDO" SIGNIFICA QUE LA CLAVE DE DESENCRIPTADO PRIVADA DEL USUARIO PARTICULAR ESTA PROBABLEMENTE APLICADA CON UN NUMERO ESPECIFICADO DE AGENTES DE PLICA Y QUE EL CENTRO DE PLICA MAESTRO ESTA REGISTRADO Y CERTIFICADO POR EL MANUFACTURADOR DEL CHIP, Y 2) SI UNA CABECERA DE CONTROL DEMENSAJE VALIDA ES GENERADA POR EL REMITENTE Y VALIDADA POR EL RECEPTOR, DANDO INFORMACION SUFICIENTE DE INVESTIGADORES ACTUALIZADOS CON LA CUAL PEDIR Y OBTENER LAS CLAVES ESCONDIDAS UNA CONFORMACION PREFERIDA ADICIONAL DE LA INVENCION SUMINISTRA UN METODO PARA GENERAR COMUNICACIONES DE CONFIANZA VERIFICABLE ENTRE UNA PLURALIDAD DE USUARIOS, QUE COMPRENDE LOS PASOS DE OCULTAR EN UN CENTRO DE PLICA DE CONFIANZA UNA PLURALIDAD DE CLAVES CRIPTOGRAFICAS ASIMETRICAS PARA SER UTILIZADAS POR UNA PLURALIDAD DE USUARIOS; VERIFICAR CADA UNA DE LA PLURALIDAD DE CLAVES EN EL CENTRO DE PLICAS; CERTIFICAR LA AUTORIZACION DE CADA UNA DE LA PLURALIDAD DE CLAVES DESPUES DE LA VERIFICACION; E INICIAR UNA COMUNICACION ENTRE CADA UNO DE LA PLURALIDAD DE USUARIOS UTILIZANDO UNA CLAVE RESPECTIVA DE LA PLURALIDAD DE CLAVES DESPUES DE LA MENCIONADA CERTIFICACION

1 citations

Patent
20 Jun 2006
TL;DR: In this paper, a commercial key escrow system that operates by a method of inspiring credit and confidence of the users by using the algorithm disclosed, and solving the problem brought up by national security and by request from the police is proposed.
Abstract: PROBLEM TO BE SOLVED: To provide a commercial key escrow system that operates by a method of inspiring credit and confidence of the users by using the algorithm disclosed, and solving the problem brought up by national security and by request from the police. SOLUTION: A cryptographic system and method with a key escrow function that uses a method for dividing user's a secret encryption key into components and for transmitting those components to a trusted agent chosen by the specified user and a method of receiving a key escrow and an escrow authentication to be executed by a chip device for self-certification are also applied to a more generalized case of registering a trusted device 150 with a trusted third party and receiving the authorization enabling the device to communicate with other trusted devices from that party. The method comprises a step of escrowing a plurality of asymmetric encryption keys to be used by a plurality of users in a trusted escrow center 153; a step of confirming the plurality of keys in the escrow center; and a step of authenticating the authorities of the plurality of keys at the time of confirming. COPYRIGHT: (C)2006,JPO&NCIPI

Cited by
More filters
Patent
05 Jul 2001
TL;DR: In this paper, a business model for the creation, maintenance, transmission, and use of digital medical records is presented, which allows financial burdens to be reallocated optimally and equitably, resulting in decreased overall societal cost.
Abstract: A method of maintaining digital medical records, comprising a step of receiving a medical transaction record (102), encrypted with a key in accordance with a patient-file association. Also comprising a step of accessing the encrypted medical transaction record according to a patient association with the record (111). And further comprising a step of re-encryption of the encrypted accessed medical transaction record with a key associated with an intended recipient of the medical record. The system and method according to the present invention presents a new business model for creation, maintenance, transmission, and use of medical records. The invention also allows financial burdens to be reallocated optimally and equitably, resulting in decreased overall societal cost and providing a successful business model for a database proprietor. Secure entrusted medical records are held in trust by an independent third party on behalf of the patient (113), and serve the medical community at large. Separately encrypted record elements may be aggregated as an information polymer.

1,457 citations

Patent
25 Mar 2002
TL;DR: In this paper, the authors propose a system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first parties and the second parties.
Abstract: A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it.

1,193 citations

Patent
01 Feb 1999
TL;DR: An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context, is presented for confirmation by the user, and the predictive mechanism is updated based on this feedback as mentioned in this paper.
Abstract: An adaptive interface for a programmable system, for predicting a desired user function, based on user history, as well as machine internal status and context. The apparatus receives an input from the user and other data. A predicted input is presented for confirmation by the user, and the predictive mechanism is updated based on this feedback. Also provided is a pattern recognition system for a multimedia device, wherein a user input is matched to a video stream on a conceptual basis, allowing inexact programming of a multimedia device. The system analyzes a data stream for correspondence with a data pattern for processing and storage. The data stream is subjected to adaptive pattern recognition to extract features of interest to provide a highly compressed representation that may be efficiently processed to determine correspondence. Applications of the interface and system include a video cassette recorder (VCR), medical device, vehicle control system, audio device, environmental control system, securities trading terminal, and smart house. The system optionally includes an actuator for effecting the environment of operation, allowing closed-loop feedback operation and automated learning.

1,182 citations

Patent
19 Dec 2001
TL;DR: In this paper, the authors propose a file-splitting processor that splits the file into a plurality of message segments and addresses the message segments to the plurality of addresses assigned to the receiving host.
Abstract: An apparatus for transmitting a file with enhanced transmission security through a network includes a file-splitting processor that splits the file into a plurality of message segments and addresses the plurality of message segments to a plurality of addresses assigned to a receiving host. The apparatus includes a message segment transmitter for transmitting the plurality of message segments to the receiving host.

1,080 citations

Patent
03 Oct 2006
TL;DR: In this paper, the authors propose a method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent, providing a synthetic economic value to a first set of agents at the a high level of the hierarchy, allocating portions of the synthetic economy value by the first sets of agents to a second subset of agents, at respectively different hierarchal ranks than the first set, and conducting an auction amongst agents using the synthetic economic values as the currency.
Abstract: A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.

850 citations