scispace - formally typeset
Patent

Communications system capable of communicating encrypted information

TLDR
In this paper, a registration control device is provided for registering an index number in relation to an operation number in the remote terminal data registration mode and for registering a cipher number in relations to an index numbers in the cypher key registration mode.
Abstract
A communications system for transmitting and receiving information encrypted by a cipher key to and from a remote communication apparatus includes a cipher key storage device for storing a cipher key table in which a plurality of cipher keys and their index numbers are registered and updated. A remote terminal data storage device stores a remote terminal data table including index numbers of the individual cipher keys registered in relation to predefined operation numbers. Input devices are provided for inputting the cipher keys, the index numbers, and the operation numbers. A registration mode setup device is provided for selectively activating a remote terminal data registration mode in which data is registered in the remote terminal data table or a cipher key registration mode in which data is registered in the cipher key table. A registration control device is provided for registering an index number in relation to an operation number in the remote terminal data registration mode and for registering a cipher number in relation to an index number in the cypher key registration mode. Control is provided for automatically switching to plaintext transmission or halting transmission and accepting encryption data when required encryption data is absent.

read more

Citations
More filters
Patent

System and method for delivering encrypted information in a communication network using location identity and key tables

TL;DR: Geo-Encryption as mentioned in this paper is a method in which plaintext data is first encrypted using a data encrypting key that is generated at the time of encryption, and then encrypted (or locked) using a key encrypted key and information derived from the location of the intended receiver.
Patent

Cryptographic system and method for geolocking and securing digital information

TL;DR: In this paper, the location identity attribute is associated with digital information such that the digital information can be accessed only at a specific geographic location and the location value corresponds to a location of an intended recipient appliance.
Patent

System and method for processing and protecting content

TL;DR: In this paper, the authors present a system that processes and protects content and control information via a first device coupled to a second device. But the content processing system processes incoming content based upon at least the control information.
Patent

System and method for authenticating sessions and other transactions

Ted Johnson
TL;DR: In this article, the authors present a system and method for authenticating a transaction, which computes a message digest of a user ID, selects an index number, selects selecting an encryption key from a plurality of encryption keys, encrypts the message digest using the selected encryption key, and converts the encrypted message into an ASCII string.
Patent

Method and system in a digital wireless data communication network for arranging data encryption and corresponding server

TL;DR: In this article, a method and system in a digital wireless data communication network for arranging data encryption as one-time pad encryption is presented, where the index index is transmitted to the receiving terminal equipment.
References
More filters
Patent

Encryption/decryption apparatus with non-accessible table of keys

TL;DR: An encryption/decryption unit (EDU) handles management of encryption keys used in the secure exchange of data over non-secure communication links as discussed by the authors, which enables the EDU to establish secure communications with another similar EDU over a nonsecure link.
Patent

Key management system for on-line communication

TL;DR: In this article, a new and improved key management system was proposed to facilitate communication between point of sale terminals and a host processor, where the system provides for the generation of a table of keys in the terminal.
Patent

Method of cryptographically transforming electronic digital data from one form to another

TL;DR: A key table from a single key such that the relationship between the keys in the key table cannot be determined even if the system implementation is known as discussed by the authors, is a cryptographic system that uses variable functions in which the determinants are changed by the variable function chosen by the determinant.
Patent

Key hashing in data processors

TL;DR: In this paper, the authors described a system for producing a near-random hash value from a key value, which consisted of combining each key byte in turn with a corresponding byte in a predefined table, substituting each key bytes with a byte from a second table, the location of the substitute byte in the table being equal to the value of the key byte.