Patent
Communications system capable of communicating encrypted information
TLDR
In this paper, a registration control device is provided for registering an index number in relation to an operation number in the remote terminal data registration mode and for registering a cipher number in relations to an index numbers in the cypher key registration mode.Abstract:
A communications system for transmitting and receiving information encrypted by a cipher key to and from a remote communication apparatus includes a cipher key storage device for storing a cipher key table in which a plurality of cipher keys and their index numbers are registered and updated. A remote terminal data storage device stores a remote terminal data table including index numbers of the individual cipher keys registered in relation to predefined operation numbers. Input devices are provided for inputting the cipher keys, the index numbers, and the operation numbers. A registration mode setup device is provided for selectively activating a remote terminal data registration mode in which data is registered in the remote terminal data table or a cipher key registration mode in which data is registered in the cipher key table. A registration control device is provided for registering an index number in relation to an operation number in the remote terminal data registration mode and for registering a cipher number in relation to an index number in the cypher key registration mode. Control is provided for automatically switching to plaintext transmission or halting transmission and accepting encryption data when required encryption data is absent.read more
Citations
More filters
Patent
System and method for delivering encrypted information in a communication network using location identity and key tables
TL;DR: Geo-Encryption as mentioned in this paper is a method in which plaintext data is first encrypted using a data encrypting key that is generated at the time of encryption, and then encrypted (or locked) using a key encrypted key and information derived from the location of the intended receiver.
Patent
Cryptographic system and method for geolocking and securing digital information
TL;DR: In this paper, the location identity attribute is associated with digital information such that the digital information can be accessed only at a specific geographic location and the location value corresponds to a location of an intended recipient appliance.
Patent
System and method for processing and protecting content
TL;DR: In this paper, the authors present a system that processes and protects content and control information via a first device coupled to a second device. But the content processing system processes incoming content based upon at least the control information.
Patent
System and method for authenticating sessions and other transactions
TL;DR: In this article, the authors present a system and method for authenticating a transaction, which computes a message digest of a user ID, selects an index number, selects selecting an encryption key from a plurality of encryption keys, encrypts the message digest using the selected encryption key, and converts the encrypted message into an ASCII string.
Patent
Method and system in a digital wireless data communication network for arranging data encryption and corresponding server
Jakke Makela,Jussi Jaatinen +1 more
TL;DR: In this article, a method and system in a digital wireless data communication network for arranging data encryption as one-time pad encryption is presented, where the index index is transmitted to the receiving terminal equipment.
References
More filters
Patent
Encryption/decryption apparatus with non-accessible table of keys
TL;DR: An encryption/decryption unit (EDU) handles management of encryption keys used in the secure exchange of data over non-secure communication links as discussed by the authors, which enables the EDU to establish secure communications with another similar EDU over a nonsecure link.
Patent
Key management system for on-line communication
TL;DR: In this article, a new and improved key management system was proposed to facilitate communication between point of sale terminals and a host processor, where the system provides for the generation of a table of keys in the terminal.
Patent
Method of cryptographically transforming electronic digital data from one form to another
TL;DR: A key table from a single key such that the relationship between the keys in the key table cannot be determined even if the system implementation is known as discussed by the authors, is a cryptographic system that uses variable functions in which the determinants are changed by the variable function chosen by the determinant.
Patent
Key hashing in data processors
TL;DR: In this paper, the authors described a system for producing a near-random hash value from a key value, which consisted of combining each key byte in turn with a corresponding byte in a predefined table, substituting each key bytes with a byte from a second table, the location of the substitute byte in the table being equal to the value of the key byte.