scispace - formally typeset
Patent

Data cryptography using control vectors

TLDR
In this paper, data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorisation for the uses of the key intended by the originator.
Abstract
Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorisation for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation centre, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.

read more

Citations
More filters
Patent

Secure data parser method and system

TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent

Data management system

TL;DR: A data management system for managing the storage of data on primary and secondary storage from a primary information source having original file content to be stored that may be accessed without stateful middleware.
Patent

Secure processor with external memory using block chaining and block re-ordering

TL;DR: In this paper, a scrambled data transmission is descrambled by communicating encrypted program information and authentication information between an external storage device and block buffers of a secure circuit, where the program information is communicated in block chains to reduce the overhead of the authentication information.
Patent

Systems and methods for securing data in motion

TL;DR: In this article, the authors present a solution that makes data provably secure and accessible, by addressing data security at the bit level, thereby eliminating the need for multiple perimeter hardware and software technologies.
Patent

Data copyright management system

Makoto Saito
TL;DR: In this paper, the authors proposed a data copyright management system consisting of a database for storing original data, a key control centre for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections.
References
More filters
Patent

Controlling the use of cryptographic keys via generating station established control values

TL;DR: In this paper, a method for controlling the use of a cryptographic key at a using station by a generating station in a network of generating and using stations is disclosed, where the key and control value are authenticated via a special authentication code before use by the using station and coupled during key generation such that the key is recovered only if a correct control value is specified.
Patent

Crytographic key notarization methods and apparatus

TL;DR: In this paper, the identity of a user of a cryptographic function is authenticated as a condition to access to an interchange key, and authentication is accomplished by comparing a password designation supplied by the user with a prestored version thereof which has been notarized by having been encrypted with the cryptograpic function using a notarizing cryptographic key derived from the identifier designation of the corresponding authorized user.
Book ChapterDOI

User functions for the generation and distribution of encipherment keys

R W Jones
TL;DR: This paper proposes key manipulation functions which are simple from the user's point of view and seeks to justify them in terms of the final secure applications and discusses how they may be implemented by lower level techniques described elsewhere.