scispace - formally typeset
Proceedings ArticleDOI

An authenticate processing for the information system in Industrial Technology Research Institute

Reads0
Chats0
TLDR
A technique for storing, processing, and transmitting highly sensitive information over a computer network in the Industrial Technology Research Institute's application system and the concept of the digital signature is used to let authorized users execute authentication programs and extract information.
Abstract
A technique for storing, processing, and transmitting highly sensitive information over a computer network in the Industrial Technology Research Institute's application system is described. Both secrecy information and user passwords for accessing this information are encrypted by using the public key cryptosystem of the RSA (River-Shamir-Adleman) scheme and El Gamal public key cryptosystem. Based on the special characteristics of this system where the development system and product system are located in different computers, the concept of the digital signature is used to let authorized users execute authentication programs and extract information. >

read more

Citations
More filters
Patent

Digital information library and delivery system with logic for generating files targeting a playback device

TL;DR: In this article, the authors present a computer network based digital information library system employing authentication and encryption protocols for the secure transfer of digital information libraries programs to a client computer system and a mobile digital information playback device removably connectable to the client computer systems.
Patent

A digital information library and delivery system

TL;DR: In this article, a computer network based digital information library system employing authentication and encryption protocols for the secure transfer of digital information libraries programs to a client computer system (214) and a mobile digital information playback device (212) is presented.
Patent

Personalized time-shifted programming

TL;DR: In this article, the authors proposed a method and apparatus for personalized time-shifted programming, where the user can designate portions of a playback time provided by the playback device (125) to various selections.
Patent

License management for digital content

TL;DR: In this paper, a method and apparatus for digital content license management is disclosed that provides one or more license management devices that manage licenses for playback of digital content, where the license is also included in digital content that the license authorizes for playback.
Patent

Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device

TL;DR: In this article, the authors present a computer network based digital information library system employing authentication and encryption protocols for the secure transfer of digital information libraries programs to a client computer system and a mobile digital information playback device removably connectable to the client computer systems.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Hiding information and signatures in trapdoor knapsacks

TL;DR: Specific instances of the knapsack problem that appear very difficult to solve unless one possesses "trapdoor information" used in the design of the problem are demonstrated.
Journal ArticleDOI

Exponentiation cryptosystems on the IBM PC

P. G. Comba
- 01 Oct 1990 - 
TL;DR: A mixed system that combines the superior key management capabilities inherent in public key cryptosystems with the much higher bulk-encryption speed obtainable with the Data Encryption Algorithm is discussed.