Patent
Data cryptography using control vectors
Stephen M. Matyas,Dennis G. Abraham,Donald B. Johnson,Ramesh K. Karne,An V. Le,Rostislaw Prymak,Julian Thomas,John D. Wilkins,Phil C. Yeh +8 more
TLDR
In this paper, data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorisation for the uses of the key intended by the originator.Abstract:
Data cryptography is achieved in an improved manner by associating with the
data cryptography key, a control vector which provides the authorisation for
the uses of the key intended by the originator of the key. Among the uses
specified by the control vector are limitations on encryption, decryption,
authentication code generation and verification, translation of the user's
data. Complex combinations of data manipulation functions are possible
using the control vectors, in accordance with the invention. The system
administrator can exercise flexibility in changing the implementation of his
security policy by selecting appropriate control vectors in accordance with
the invention. Complex scenarios such as encrypted mail box, session
protection, file protection, ciphertext translation centre, peer-to-peer
ciphertext translation, message authentication, message authentication with
non-repudiation and many others can be easily implemented by a system
designer using the control vectors, in accordance with the invention.read more
Citations
More filters
Patent
Secure data parser method and system
TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent
Data management system
TL;DR: A data management system for managing the storage of data on primary and secondary storage from a primary information source having original file content to be stored that may be accessed without stateful middleware.
Patent
Secure processor with external memory using block chaining and block re-ordering
Brant Candelore,Eric Sprunk +1 more
TL;DR: In this paper, a scrambled data transmission is descrambled by communicating encrypted program information and authentication information between an external storage device and block buffers of a secure circuit, where the program information is communicated in block chains to reduce the overhead of the authentication information.
Patent
Systems and methods for securing data in motion
Rick L. Orsini,Mark S. O'hare +1 more
TL;DR: In this article, the authors present a solution that makes data provably secure and accessible, by addressing data security at the bit level, thereby eliminating the need for multiple perimeter hardware and software technologies.
Patent
Data copyright management system
TL;DR: In this paper, the authors proposed a data copyright management system consisting of a database for storing original data, a key control centre for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections.
References
More filters
Patent
Controlling the use of cryptographic keys via generating station established control values
TL;DR: In this paper, a method for controlling the use of a cryptographic key at a using station by a generating station in a network of generating and using stations is disclosed, where the key and control value are authenticated via a special authentication code before use by the using station and coupled during key generation such that the key is recovered only if a correct control value is specified.
Patent
Crytographic key notarization methods and apparatus
Miles E. Smid,Dennis K. Branstad +1 more
TL;DR: In this paper, the identity of a user of a cryptographic function is authenticated as a condition to access to an interchange key, and authentication is accomplished by comparing a password designation supplied by the user with a prestored version thereof which has been notarized by having been encrypted with the cryptograpic function using a notarizing cryptographic key derived from the identifier designation of the corresponding authorized user.
Book ChapterDOI
User functions for the generation and distribution of encipherment keys
TL;DR: This paper proposes key manipulation functions which are simple from the user's point of view and seeks to justify them in terms of the final secure applications and discusses how they may be implemented by lower level techniques described elsewhere.