Patent
Secure deterministic encryption key generator system and method
Guy L. Fielder,Paul N. Alito +1 more
Reads0
Chats0
TLDR
In this article, an encryption key generator (100) is disclosed which is highly resistant to cryptographic analysis or brute force attacks, and which accommodates the destruction of an encrypted key after each use by providing for the recreation of the key without need of key directories or other encryption key storage processes.Abstract:
An encryption key generator (100) is disclosed which is highly resistant to cryptographic analysis or brute force attacks, and which accommodates the destruction of an encryption key after each use by providing for the recreation of the key without need of key directories or other encryption key storage processes. A constant value (51) and a secret E-Key Seed (50) are applied as an input to a bit-shuffling algorithm (52) to provide a first many-to-few bit mapping and produce a first pseudo-random number. The first pseudo-random number in turn is applied as an input to a secure one-way hash algorithm (53) to provide a second many-to-few bit mapping and produce a second pseudo-random number or message digest that may be truncated to a desired bit length to serve as a non-predictable but deterministic encryption key (55). Same constant value (51) and E-Key Seed (50) inputs to the key generator (100) provide the same message digest and hence the same key (55).read more
Citations
More filters
Patent
Secure data parser method and system
TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent
Method and apparatus for the secure identification of the owner of a portable device
TL;DR: In this paper, an authentication system is provided that includes a portable device and a decryption node, where an individual uses the portable device such as a portable devices like a cell phone to compute a challenge and a response.
Patent
Distributed, scalable cryptographic access control
TL;DR: In this article, the authors propose to publish resources in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer system are able to recover them.
Patent
State-varying hybrid stream cipher
TL;DR: In one embodiment, a state-varying hybrid stream cipher operating within a computing device as discussed by the authors comprises at least two software routines, one for dividing plain text into variable-sized blocks, and the other for converting plain text to cipher text based on an encryption key, an internal identifier and a percentage of random data value.
Patent
Method and apparatus for a non-revealing do-not-contact list system
TL;DR: In this article, a method and apparatus for a non-revealing do-not-contact list system in which a donotcontact list of one-way hashed consumer contact information is provided to a set of one or more entities is presented.
References
More filters
Patent
System and method for electronic transmission, storage and retrieval of authenticated documents
TL;DR: In this paper, the authors address the interoperability problem between PKI and CA from a different point of view, with a focus on establishing a trust environment suitable for the creation, execution, maintenance, transfer, retrieval and destruction of electronic original information objects that may also be transferable records.
Patent
Personal security system
Kenneth P. Weiss,Sheldon Howard +1 more
TL;DR: In this paper, a method and apparatus for verifying the identity of a system user is presented, where each user has a token which processes an inputted seed to generate a stored value which is either a current seed value or a function thereof.
Patent
Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system
TL;DR: In this paper, a smart card (1) which includes a random access memory RAM (10) and a read-only memory PROM (7) incorporating a production key (PK), a distributor key (MK), a bearer code (CP), and a serial number (NS) generates a unique number (NU) which is stored in the memory RAM(10) in the card after execution of a program which is specific of the card.
Patent
Computer access control system and method
Robert J. Bosen,John R. Muir +1 more
TL;DR: In this paper, a password issuing device can store and generate passwords for a multiplicity of distinct protected host systems, each of which can store, decrypt, and display one or more random digits.
Patent
Method and apparatus for verifying the integrity of a file stored separately from a computer
TL;DR: In this paper, a method and apparatus for verifying a file stored separately from a computer to be identical with a previous version of the file, before using the file is presented, by following a defined procedure to generate a first identifier based on the contents of the previous version, storing this identifier locally on the computer, and storing the file at a separate storage location.