CA2187035A1 - Computer Network Cryptographic Key Distribution System - Google Patents

Computer Network Cryptographic Key Distribution System

Info

Publication number
CA2187035A1
CA2187035A1 CA2187035A CA2187035A CA2187035A1 CA 2187035 A1 CA2187035 A1 CA 2187035A1 CA 2187035 A CA2187035 A CA 2187035A CA 2187035 A CA2187035 A CA 2187035A CA 2187035 A1 CA2187035 A1 CA 2187035A1
Authority
CA
Canada
Prior art keywords
key
release agent
decryptor
security domain
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2187035A
Other languages
French (fr)
Other versions
CA2187035C (en
Inventor
Warwick Stanley Ford
Michael James Wiener
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Entrust Ltd
Original Assignee
Warwick Stanley Ford
Michael James Wiener
Bell-Northern Research Ltd.
Northern Telecom Limited
Entrust Technologies Ltd.
Entrust Limited
Entrust Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Warwick Stanley Ford, Michael James Wiener, Bell-Northern Research Ltd., Northern Telecom Limited, Entrust Technologies Ltd., Entrust Limited, Entrust Inc. filed Critical Warwick Stanley Ford
Publication of CA2187035A1 publication Critical patent/CA2187035A1/en
Application granted granted Critical
Publication of CA2187035C publication Critical patent/CA2187035C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Abstract

Novel cryptographic key distribution techniques to be used in large computer networks are disclosed. The techniques require trusted key release agent systems in each security domain. The encryptor (10) of a data message nominates to set of authorized decryptors (30), using a set of access control attributes recognized by a key release agent (32) in a target security domain. Data enabling the message decryption key and the access control attributes to be recovered are sent to the decryptor in an access controlled decryption block, which is encrypted under a separate key. The access controlled decryption block can only be decrypted by a key release agent (32) in the correct security domain. The key release agent recovers the decryption key and supplies it to an authorized decryptor (30), which allows the decryptor to recover the original data message.
CA002187035A 1994-04-15 1995-02-22 Computer network cryptographic key distribution system Expired - Lifetime CA2187035C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/227,871 US5481613A (en) 1994-04-15 1994-04-15 Computer network cryptographic key distribution system
US08/227,871 1994-04-15
PCT/CA1995/000084 WO1995028784A1 (en) 1994-04-15 1995-02-22 Computer network cryptographic key distribution system

Publications (2)

Publication Number Publication Date
CA2187035A1 true CA2187035A1 (en) 1995-10-26
CA2187035C CA2187035C (en) 1999-10-05

Family

ID=22854805

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002187035A Expired - Lifetime CA2187035C (en) 1994-04-15 1995-02-22 Computer network cryptographic key distribution system

Country Status (6)

Country Link
US (1) US5481613A (en)
EP (1) EP0755598B1 (en)
JP (1) JP3060071B2 (en)
CA (1) CA2187035C (en)
DE (1) DE69504823T2 (en)
WO (1) WO1995028784A1 (en)

Families Citing this family (137)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870474A (en) 1995-12-04 1999-02-09 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US6292568B1 (en) 1966-12-16 2001-09-18 Scientific-Atlanta, Inc. Representing entitlements to service in a conditional access system
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
IL106796A (en) * 1993-08-25 1997-11-20 Algorithmic Res Ltd Broadcast encryption
US20020013898A1 (en) * 1997-06-04 2002-01-31 Sudia Frank W. Method and apparatus for roaming use of cryptographic values
US5825880A (en) * 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
US5557765A (en) * 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5557346A (en) * 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for key escrow encryption
CA2138302C (en) * 1994-12-15 1999-05-25 Michael S. Fortinsky Provision of secure access to external resources from a distributed computing environment
US6658568B1 (en) * 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US7133846B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US6272632B1 (en) * 1995-02-21 2001-08-07 Network Associates, Inc. System and method for controlling access to a user secret using a key recovery field
US5633928A (en) * 1995-03-10 1997-05-27 Bell Communications Research, Inc. Key escrow method with warrant bounds
US6246767B1 (en) 1995-04-03 2001-06-12 Scientific-Atlanta, Inc. Source authentication of download information in a conditional access system
US6157719A (en) * 1995-04-03 2000-12-05 Scientific-Atlanta, Inc. Conditional access system
US6937729B2 (en) * 1995-04-03 2005-08-30 Scientific-Atlanta, Inc. Representing entitlements to service in a conditional access system
US6252964B1 (en) 1995-04-03 2001-06-26 Scientific-Atlanta, Inc. Authorization of services in a conditional access system
US7224798B2 (en) * 1995-04-03 2007-05-29 Scientific-Atlanta, Inc. Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system
US8548166B2 (en) 1995-04-03 2013-10-01 Anthony J. Wasilewski Method for partially encrypting program data
US20040136532A1 (en) * 1995-04-03 2004-07-15 Pinder Howard G. Partial dual-encrypted stream utilizing program map tables
US6424717B1 (en) 1995-04-03 2002-07-23 Scientific-Atlanta, Inc. Encryption devices for use in a conditional access system
US6560340B1 (en) 1995-04-03 2003-05-06 Scientific-Atlanta, Inc. Method and apparatus for geographically limiting service in a conditional access system
DE69638307D1 (en) * 1995-06-05 2011-01-27 Cqrcert Llc Method and device for digital signature in several steps
US5687235A (en) * 1995-10-26 1997-11-11 Novell, Inc. Certificate revocation performance optimization
DE19540930C1 (en) * 1995-11-03 1997-04-24 Strohschneider Sabine Method for creating an information distribution system for any number of closed user groups using a physical unit
DE19549014C1 (en) * 1995-12-28 1997-02-20 Siemens Ag Protected function activation method for communication system
EP0872077B1 (en) * 1995-12-29 2009-09-23 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US5768373A (en) * 1996-05-06 1998-06-16 Symantec Corporation Method for providing a secure non-reusable one-time password
FR2763192B1 (en) * 1996-10-18 1999-07-02 Bull Sa METHOD FOR RECOVERING KEYS IMPLEMENTED FOR A STRONG MESSAGE ENCRYPTION
US6483920B2 (en) 1996-12-04 2002-11-19 Bull, S.A. Key recovery process used for strong encryption of messages
US5920630A (en) * 1997-02-25 1999-07-06 United States Of America Method of public key cryptography that includes key escrow
US6035041A (en) * 1997-04-28 2000-03-07 Certco, Inc. Optimal-resilience, proactive, public-key cryptographic system and method
DE19718583C5 (en) * 1997-05-05 2007-04-26 T-Mobile Deutschland Gmbh End-to-end encryption
KR20010013155A (en) * 1997-05-28 2001-02-26 아담 루카스 영 Auto-recoverable auto-certifiable cryptosystems
US6314190B1 (en) * 1997-06-06 2001-11-06 Networks Associates Technology, Inc. Cryptographic system with methods for user-controlled message recovery
US6775382B1 (en) * 1997-06-30 2004-08-10 Sun Microsystems, Inc. Method and apparatus for recovering encryption session keys
US6603857B1 (en) * 1997-07-14 2003-08-05 Entrust Technologies Limited Method and apparatus for controlling release of time sensitive information
US6229894B1 (en) * 1997-07-14 2001-05-08 Entrust Technologies, Ltd. Method and apparatus for access to user-specific encryption information
AU8757398A (en) * 1997-07-15 1999-02-10 V-One Corporation File encryption with key recovery
JP2001513587A (en) * 1997-07-31 2001-09-04 サイエンティフィック−アトランタ・インコーポレーテッド Verification of source of information program in conditional access system
US7515712B2 (en) * 1997-08-01 2009-04-07 Cisco Technology, Inc. Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system
US6160891A (en) * 1997-10-20 2000-12-12 Sun Microsystems, Inc. Methods and apparatus for recovering keys
US6349289B1 (en) 1998-01-16 2002-02-19 Ameritech Corporation Method and system for tracking computer system usage through a remote access security device
US6243470B1 (en) 1998-02-04 2001-06-05 International Business Machines Corporation Method and apparatus for advanced symmetric key block cipher with variable length key and block
US6192129B1 (en) 1998-02-04 2001-02-20 International Business Machines Corporation Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block
US6189095B1 (en) 1998-06-05 2001-02-13 International Business Machines Corporation Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
WO2000022787A2 (en) * 1998-10-09 2000-04-20 Bankers Trust Company Method, system, and computer program product for providing enhanced electronic mail services
US6230266B1 (en) 1999-02-03 2001-05-08 Sun Microsystems, Inc. Authentication system and process
US20020026321A1 (en) 1999-02-26 2002-02-28 Sadeg M. Faris Internet-based system and method for fairly and securely enabling timed-constrained competition using globally time-sychronized client subsystems and information servers having microsecond client-event resolution
EP1208412A2 (en) * 1999-02-26 2002-05-29 Reveo, Inc. Globally time-synchronized systems, devices and methods
US6625734B1 (en) * 1999-04-26 2003-09-23 Disappearing, Inc. Controlling and tracking access to disseminated information
SE514105C2 (en) * 1999-05-07 2001-01-08 Ericsson Telefon Ab L M Secure distribution and protection of encryption key information
US6694025B1 (en) 1999-06-02 2004-02-17 Koninklijke Philips Electronics N.V. Method and apparatus for secure distribution of public/private key pairs
US7142676B1 (en) * 1999-06-08 2006-11-28 Entrust Limited Method and apparatus for secure communications using third-party key provider
US7269261B1 (en) * 1999-09-22 2007-09-11 Raytheon Company Key escrow systems
US20080082446A1 (en) * 1999-10-01 2008-04-03 Hicks Christian B Remote Authorization for Unlocking Electronic Data System and Method
US7076061B1 (en) 2000-02-07 2006-07-11 Citibank, N.A. Efficient and compact subgroup trace representation (“XTR”)
US20050213758A1 (en) * 2000-02-07 2005-09-29 Lenstra Arjen K Efficient and compact subgroup trace representation ("XTR")
SG103257A1 (en) * 2000-04-13 2004-04-29 Kent Ridge Digital Labs Private retrieval of digital objects
US6807277B1 (en) 2000-06-12 2004-10-19 Surety, Llc Secure messaging system with return receipts
US20040073617A1 (en) * 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
WO2002005061A2 (en) * 2000-07-06 2002-01-17 David Paul Felsher Information record infrastructure, system and method
US6851049B1 (en) * 2000-10-02 2005-02-01 Pgp Corporation Method and apparatus for facilitating secure anonymous email recipients
US20020071567A1 (en) * 2000-12-12 2002-06-13 Kurn David Michael Scalable computer system using remote agents to manipulate cryptographic keys
US8161565B1 (en) * 2000-12-26 2012-04-17 Entrust, Inc. Key release systems, components and methods
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US7693508B2 (en) * 2001-03-28 2010-04-06 Qualcomm Incorporated Method and apparatus for broadcast signaling in a wireless communication system
UA75125C2 (en) * 2001-03-28 2006-03-15 Квалкомм Інкорпорейтид Method for controlling signal power in point-to-multipoint data communication (variants) and a device for the realization of the method (variants)
US8077679B2 (en) * 2001-03-28 2011-12-13 Qualcomm Incorporated Method and apparatus for providing protocol options in a wireless communication system
US9100457B2 (en) * 2001-03-28 2015-08-04 Qualcomm Incorporated Method and apparatus for transmission framing in a wireless communication system
US8121296B2 (en) * 2001-03-28 2012-02-21 Qualcomm Incorporated Method and apparatus for security in a data processing system
JP2003023421A (en) * 2001-07-09 2003-01-24 C4 Technology Inc Encryption method, program thereof, recording medium recorded with the program, encryption device, decoding method, and decoder
US7564970B2 (en) * 2004-08-12 2009-07-21 Cmla, Llc Exponential data transform to enhance security
US8077861B2 (en) 2004-08-12 2011-12-13 Cmla, Llc Permutation data transform to enhance security
US7577250B2 (en) 2004-08-12 2009-08-18 Cmla, Llc Key derivation functions to enhance security
US20040120527A1 (en) * 2001-08-20 2004-06-24 Hawkes Philip Michael Method and apparatus for security in a data processing system
US7185362B2 (en) * 2001-08-20 2007-02-27 Qualcomm, Incorporated Method and apparatus for security in a data processing system
US7697523B2 (en) * 2001-10-03 2010-04-13 Qualcomm Incorporated Method and apparatus for data packet transport in a wireless communication system using an internet protocol
US7352868B2 (en) * 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
US7649829B2 (en) 2001-10-12 2010-01-19 Qualcomm Incorporated Method and system for reduction of decoding complexity in a communication system
US7093133B2 (en) * 2001-12-20 2006-08-15 Hewlett-Packard Development Company, L.P. Group signature generation system using multiple primes
US7146009B2 (en) * 2002-02-05 2006-12-05 Surety, Llc Secure electronic messaging system requiring key retrieval for deriving decryption keys
FR2836609A1 (en) * 2002-02-25 2003-08-29 Thomson Licensing Sa Data transfer process for domestic digital network includes decoding and encoding using secrets specific to transmitting and receiving domains
US20040117618A1 (en) * 2002-03-13 2004-06-17 Kyoko Kawaguchi Service execution module
US6711678B2 (en) * 2002-04-05 2004-03-23 Expand Beyond Corporation Pre-authenticated communication within a secure computer network
TW576063B (en) * 2002-07-10 2004-02-11 Benq Corp Device and method for securing information associated with a subscriber in a communication apparatus
US7599655B2 (en) * 2003-01-02 2009-10-06 Qualcomm Incorporated Method and apparatus for broadcast services in a communication system
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
DE10305730B4 (en) * 2003-02-12 2005-04-07 Deutsche Post Ag Method for verifying the validity of digital indicia
EP1460796A3 (en) * 2003-03-17 2005-02-16 Broadcom Corporation Encryption-decryption key generation and distribution
US8098818B2 (en) * 2003-07-07 2012-01-17 Qualcomm Incorporated Secure registration for a multicast-broadcast-multimedia system (MBMS)
US8718279B2 (en) * 2003-07-08 2014-05-06 Qualcomm Incorporated Apparatus and method for a secure broadcast system
US8724803B2 (en) * 2003-09-02 2014-05-13 Qualcomm Incorporated Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
US8332652B2 (en) * 2003-10-01 2012-12-11 International Business Machines Corporation Computing device that securely runs authorized software
US8396216B2 (en) * 2003-11-21 2013-03-12 Howard G. Pinder Partial dual-encryption using program map tables
AU2004319170B2 (en) * 2004-05-03 2008-05-01 Blackberry Limited System and method for generating reproducible session keys
US7548152B2 (en) * 2004-10-08 2009-06-16 Entrust Limited RFID transponder information security methods systems and devices
US20060182283A1 (en) * 2005-02-14 2006-08-17 Tricipher, Inc. Architecture for asymmetric crypto-key storage
US20060182277A1 (en) * 2005-02-14 2006-08-17 Tricipher, Inc. Roaming utilizing an asymmetric key pair
US8099607B2 (en) * 2005-01-18 2012-01-17 Vmware, Inc. Asymmetric crypto-graphy with rolling key security
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8095960B2 (en) * 2005-11-21 2012-01-10 Novell, Inc. Secure synchronization and sharing of secrets
US8135645B2 (en) * 2005-12-06 2012-03-13 Microsoft Corporation Key distribution for secure messaging
US7499552B2 (en) * 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US8670564B1 (en) * 2006-08-14 2014-03-11 Key Holdings, LLC Data encryption system and method
US20090097657A1 (en) * 2007-10-05 2009-04-16 Scheidt Edward M Constructive Channel Key
WO2010065509A2 (en) 2008-12-01 2010-06-10 Nadia Shalaby Versatile, collapsible cart-trailer with modular components
US9846789B2 (en) 2011-09-06 2017-12-19 International Business Machines Corporation Protecting application programs from malicious software or malware
US9954875B2 (en) 2009-06-26 2018-04-24 International Business Machines Corporation Protecting from unintentional malware download
US8954752B2 (en) 2011-02-23 2015-02-10 International Business Machines Corporation Building and distributing secure object software
US8819446B2 (en) * 2009-06-26 2014-08-26 International Business Machines Corporation Support for secure objects in a computer system
US9298894B2 (en) * 2009-06-26 2016-03-29 International Business Machines Corporation Cache structure for a computer system providing support for secure objects
US8578175B2 (en) 2011-02-23 2013-11-05 International Business Machines Corporation Secure object having protected region, integrity tree, and unprotected region
US8397281B2 (en) * 2009-12-30 2013-03-12 Symantec Corporation Service assisted secret provisioning
US9026805B2 (en) 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules
US9864853B2 (en) 2011-02-23 2018-01-09 International Business Machines Corporation Enhanced security mechanism for authentication of users of a system
WO2012129546A2 (en) * 2011-03-23 2012-09-27 Selerity, Inc. Securely enabling access to information over a network across multiple protocols
EP2700189B1 (en) * 2011-04-01 2020-01-22 BlackBerry Limited Identity-based decryption
US9172529B2 (en) * 2011-09-16 2015-10-27 Certicom Corp. Hybrid encryption schemes
BR112014007061A2 (en) 2011-09-28 2017-03-28 Koninklijke Philips Nv cryptographic system, method of generating a user secret key for use in a hierarchical attribute-based cryptographic system, decryption method of a ciphertext for use in a hierarchical attribute-based cryptographic system, method of encrypting a message for use in a hierarchical attribute-based cryptographic system, and, computer program
US9008316B2 (en) * 2012-03-29 2015-04-14 Microsoft Technology Licensing, Llc Role-based distributed key management
EP2785010A1 (en) * 2013-03-28 2014-10-01 Astrium Limited Key distribution in a satellite system
JP6373261B2 (en) 2013-04-18 2018-08-15 岡本硝子株式会社 Underwater video camera housing
US9223965B2 (en) 2013-12-10 2015-12-29 International Business Machines Corporation Secure generation and management of a virtual card on a mobile device
US9235692B2 (en) 2013-12-13 2016-01-12 International Business Machines Corporation Secure application debugging
US10002512B2 (en) 2014-01-30 2018-06-19 Le-Jun Yin System and method for object entry and egress control in a predefined area
US11200560B2 (en) 2014-12-19 2021-12-14 Capital One Services, Llc Systems and methods for contactless and secure data transfer
US20160292445A1 (en) 2015-03-31 2016-10-06 Secude Ag Context-based data classification
JP6419660B2 (en) * 2015-07-29 2018-11-07 株式会社日立製作所 Secret information setting method, secret information setting system, and secret information setting device
EP3196798A1 (en) 2016-01-19 2017-07-26 Secude AG Context-sensitive copy and paste block
US10484379B2 (en) * 2017-03-16 2019-11-19 Motorola Solutions, Inc. System and method for providing least privilege access in a microservices architecture
US10944733B2 (en) 2017-07-31 2021-03-09 Cisco Technology, Inc. Dynamic disassociated channel encryption key distribution
CN107590748B (en) * 2017-08-17 2020-07-10 天津大学 Full-dimensional observation method for security domain of power distribution network
US11115395B2 (en) 2019-07-23 2021-09-07 Harris Global Communications, Inc. Cross-domain information transfer system and associated methods
US20220382851A1 (en) * 2019-11-06 2022-12-01 Washington University Public key encryption using self powered timers
US11372986B1 (en) * 2021-01-18 2022-06-28 Axiom Technologies LLC Systems and methods for encrypted content management
RU2766319C1 (en) * 2021-03-24 2022-03-15 федеральное государственное казенное военное образовательное учреждение высшего образования "Военная орденов Жукова и Ленина Краснознаменная академия связи имени Маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации Method for generating the encryption/decryption key

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
NL8301458A (en) * 1983-04-26 1984-11-16 Philips Nv METHOD FOR DISTRIBUTING AND USING ENCRYPTION KEYS.
US4888801A (en) * 1988-05-02 1989-12-19 Motorola, Inc. Hierarchical key management system
US4864615A (en) * 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data
JP3080382B2 (en) * 1990-02-21 2000-08-28 株式会社日立製作所 Cryptographic communication system
GB9104909D0 (en) * 1991-03-08 1991-04-24 Int Computers Ltd Access control in a distributed computer system
US5200999A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Public key cryptosystem key management based on control vectors
US5241599A (en) * 1991-10-02 1993-08-31 At&T Bell Laboratories Cryptographic protocol for secure communications
US5265164A (en) * 1991-10-31 1993-11-23 International Business Machines Corporation Cryptographic facility environment backup/restore and replication in a public key cryptosystem
US5315658B1 (en) * 1992-04-20 1995-09-12 Silvio Micali Fair cryptosystems and methods of use
US5276737B1 (en) * 1992-04-20 1995-09-12 Silvio Micali Fair cryptosystems and methods of use
US5341426A (en) * 1992-12-15 1994-08-23 Motorola, Inc. Cryptographic key management apparatus and method

Also Published As

Publication number Publication date
EP0755598B1 (en) 1998-09-16
WO1995028784A1 (en) 1995-10-26
DE69504823T2 (en) 1999-02-11
CA2187035C (en) 1999-10-05
JPH09505711A (en) 1997-06-03
EP0755598A1 (en) 1997-01-29
DE69504823D1 (en) 1998-10-22
JP3060071B2 (en) 2000-07-04
US5481613A (en) 1996-01-02

Similar Documents

Publication Publication Date Title
CA2187035A1 (en) Computer Network Cryptographic Key Distribution System
US5604801A (en) Public key data communications system under control of a portable security device
US8483393B2 (en) Key management system for digital cinema
CA2438255C (en) Secure encryption key distribution
WO2002080170A3 (en) Method and system for providing bus encryption based on cryptographic key exchange
EP0343805A3 (en) Reproduction of secure keys by using distributed key generation data
CA2068488A1 (en) Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
AU780325C (en) Information processing system and method
WO1996008912A3 (en) Conditional access system
WO2000074297A3 (en) Method and apparatus for secure distribution of public/private key pairs
WO1998047259A3 (en) File encryption method and system
CA2221553A1 (en) Method for verifying the expected postage security device and an authorized host system
EP0936776A3 (en) A network system using a threshold secret sharing method
Clark et al. On the Security of Recent Protocols.
EP0912011A3 (en) Method and apparatus for encoding and recovering keys
CA2446364C (en) Secure group secret distribution
AU1207600A (en) System and method of authenticating a key and transmitting secure data
CA2186699C (en) Encryption system for mixed-trust environments
JP3684266B2 (en) Access control method and system for encrypted shared data
US7069448B2 (en) Context oriented crypto processing on a parallel processor array
MY130422A (en) Method to create a private virtual network using a public network
CA2344689A1 (en) A secure data transfer system
CN112187456A (en) Key hierarchical management and collaborative recovery system and method
JP3331327B2 (en) Key management method and program recording medium
KR102328896B1 (en) Crypto Key distribution and recovery method for 3rd party managed system

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20150223