DE69111556D1 - Verfahren und Einrichtung zur Steuerung der Benutzung eines öffentlichen Schlüssels auf Grundlage des Integritätsgrades des Schlüssels. - Google Patents

Verfahren und Einrichtung zur Steuerung der Benutzung eines öffentlichen Schlüssels auf Grundlage des Integritätsgrades des Schlüssels.

Info

Publication number
DE69111556D1
DE69111556D1 DE69111556T DE69111556T DE69111556D1 DE 69111556 D1 DE69111556 D1 DE 69111556D1 DE 69111556 T DE69111556 T DE 69111556T DE 69111556 T DE69111556 T DE 69111556T DE 69111556 D1 DE69111556 D1 DE 69111556D1
Authority
DE
Germany
Prior art keywords
integrity
degree
controlling
key
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE69111556T
Other languages
English (en)
Other versions
DE69111556T2 (de
Inventor
Stephen M Matyas
Donald B Johnson
An V Le
William C Martin
William S Rohland
John D Wilkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of DE69111556D1 publication Critical patent/DE69111556D1/de
Application granted granted Critical
Publication of DE69111556T2 publication Critical patent/DE69111556T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
DE69111556T 1990-10-24 1991-09-25 Verfahren und Einrichtung zur Steuerung der Benutzung eines öffentlichen Schlüssels auf Grundlage des Integritätsgrades des Schlüssels. Expired - Lifetime DE69111556T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US07/602,989 US5073934A (en) 1990-10-24 1990-10-24 Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key

Publications (2)

Publication Number Publication Date
DE69111556D1 true DE69111556D1 (de) 1995-08-31
DE69111556T2 DE69111556T2 (de) 1996-03-07

Family

ID=24413598

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69111556T Expired - Lifetime DE69111556T2 (de) 1990-10-24 1991-09-25 Verfahren und Einrichtung zur Steuerung der Benutzung eines öffentlichen Schlüssels auf Grundlage des Integritätsgrades des Schlüssels.

Country Status (4)

Country Link
US (1) US5073934A (de)
EP (1) EP0482371B1 (de)
JP (1) JP2575558B2 (de)
DE (1) DE69111556T2 (de)

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4003386C1 (de) * 1990-02-05 1991-05-23 Siemens Ag, 1000 Berlin Und 8000 Muenchen, De
US5142579A (en) * 1991-01-29 1992-08-25 Anderson Walter M Public key cryptographic system and method
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5142578A (en) * 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
US5201000A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase
US5179591A (en) * 1991-10-16 1993-01-12 Motorola, Inc. Method for algorithm independent cryptographic key management
US5519433A (en) * 1991-11-20 1996-05-21 Zing Systems, L.P. Interactive television security through transaction time stamping
US5421006A (en) * 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software
US5379343A (en) * 1993-02-26 1995-01-03 Motorola, Inc. Detection of unauthorized use of software applications in communication units
IL110891A (en) * 1993-09-14 1999-03-12 Spyrus System and method for controlling access to data
US5343527A (en) * 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
NZ329891A (en) * 1994-01-13 2000-01-28 Certco Llc Method of upgrading firmware of trusted device using embedded key
US5537540A (en) * 1994-09-30 1996-07-16 Compaq Computer Corporation Transparent, secure computer virus detection method and apparatus
US5812669A (en) * 1995-07-19 1998-09-22 Jenkins; Lew Method and system for providing secure EDI over an open network
US5953502A (en) * 1997-02-13 1999-09-14 Helbig, Sr.; Walter A Method and apparatus for enhancing computer system security
US6405313B1 (en) * 1997-04-25 2002-06-11 At&T Corp. Method for providing authentication assurance in a key-binding system
US6125185A (en) * 1997-05-27 2000-09-26 Cybercash, Inc. System and method for encryption key generation
WO1999014881A2 (en) * 1997-09-16 1999-03-25 Information Resource Engineering, Inc. Cryptographic co-processor
GB9719726D0 (en) * 1997-09-16 1998-03-18 Simoco Int Ltd Encryption method and apparatus
US6308266B1 (en) * 1998-03-04 2001-10-23 Microsoft Corporation System and method for enabling different grades of cryptography strength in a product
US6438678B1 (en) * 1998-06-15 2002-08-20 Cisco Technology, Inc. Apparatus and method for operating on data in a data communications system
US6567913B1 (en) * 1998-12-24 2003-05-20 Pitney Bowes Inc. Selective security level certificate meter
US7246244B2 (en) * 1999-05-14 2007-07-17 Fusionarc, Inc. A Delaware Corporation Identity verification method using a central biometric authority
US6785811B1 (en) * 2000-03-23 2004-08-31 International Business Machines Corporation Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library
US7327846B1 (en) * 2000-09-05 2008-02-05 Chung Nan Chang Secure cryptographic key exchange and verifiable digital signature
WO2002084590A1 (en) * 2001-04-11 2002-10-24 Applied Minds, Inc. Knowledge web
DE10118267A1 (de) * 2001-04-12 2002-10-24 Bosch Gmbh Robert Verfahren zur Authentifizierung eines Anwenders bei einem Zugang zu einem softwarebasierten System über ein Zugangsmedium
US7844610B2 (en) * 2003-12-12 2010-11-30 Google Inc. Delegated authority evaluation system
US8069175B2 (en) 2002-04-10 2011-11-29 Google Inc. Delegating authority to evaluate content
US20030196094A1 (en) * 2002-04-10 2003-10-16 Hillis W. Daniel Method and apparatus for authenticating the content of a distributed database
US20030212889A1 (en) * 2002-05-13 2003-11-13 Khieu Andrew K. Method and system for exchanging data over networks using public key encryption
US7274792B2 (en) * 2002-08-09 2007-09-25 Broadcom Corporation Methods and apparatus for initialization vector processing
US7765206B2 (en) 2002-12-13 2010-07-27 Metaweb Technologies, Inc. Meta-Web
US8012025B2 (en) * 2002-12-13 2011-09-06 Applied Minds, Llc Video game controller hub with control input reduction and combination schemes
US20050131918A1 (en) * 2003-12-12 2005-06-16 W. Daniel Hillis Personalized profile for evaluating content
EP1717723A1 (de) * 2005-04-29 2006-11-02 ST Incard S.r.l. Verbesserte virtuelle Maschine oder Hardware-Prozessor für tragbare elektronische Einrichtungen mit einer Chipkarte
US10216523B2 (en) 2015-07-17 2019-02-26 General Electric Company Systems and methods for implementing control logic

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4218582A (en) * 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US4908861A (en) * 1987-08-28 1990-03-13 International Business Machines Corporation Data authentication using modification detection codes based on a public one way encryption function
EP0356065B1 (de) * 1988-08-11 1996-03-20 International Business Machines Corporation Sichere Schlüsselverwaltung mittels Steuervektoren
US4941176A (en) * 1988-08-11 1990-07-10 International Business Machines Corporation Secure management of keys using control vectors
US4924514A (en) * 1988-08-26 1990-05-08 International Business Machines Corporation Personal identification number processing using control vectors
US4924515A (en) * 1988-08-29 1990-05-08 International Business Machines Coprporation Secure management of keys using extended control vectors
US4918728A (en) * 1989-08-30 1990-04-17 International Business Machines Corporation Data cryptography operations using control vectors

Also Published As

Publication number Publication date
JPH04265031A (ja) 1992-09-21
EP0482371A3 (en) 1993-03-17
JP2575558B2 (ja) 1997-01-29
EP0482371B1 (de) 1995-07-26
US5073934A (en) 1991-12-17
EP0482371A2 (de) 1992-04-29
DE69111556T2 (de) 1996-03-07

Similar Documents

Publication Publication Date Title
DE69111556T2 (de) Verfahren und Einrichtung zur Steuerung der Benutzung eines öffentlichen Schlüssels auf Grundlage des Integritätsgrades des Schlüssels.
DE69434546D1 (de) Vorrichtung und verfahren zur verringerung der akustischen rückkopplung
DE69230533D1 (de) Gerät und verfahren zur steuerung der übertragungsleitung eines modem
DE69117095D1 (de) Strömungsmittelbetätigte Vorrichtung und Verfahren zur Stabilisierung
DE69111352T2 (de) Verfahren und vorrichtung zur ungefähr vertikal ausgerichteten abwicklung von schläuchen.
DE59202509D1 (de) Verfahren und Vorrichtung zur Minimierung des Seitenwind-Einflusses auf das Fahrverhalten eines Fahrzeugs.
DE69323966D1 (de) Verfahren zur Ausführung eines Kopierverfahrens und Vorrichtung zur Durchführung des Verfahrens
DE69522982D1 (de) Verfahren und Vorrichtung zur Unterbindung von unautorisierter Wiederverwendung einer Einwegkamera und zum Erlauben von autorisierter Wiederverwendung der Kamera
DE69417834D1 (de) Gerät zur Aufzeichnung auf einem Aufzeichnungsträger und Verfahren zur Steuerung der Aufzeichnung
DE69113917T2 (de) Verfahren und Einrichtung zur Steuerung der Bewegung eines Maschinenteiles.
DE59405116D1 (de) Verfahren und vorrichtung zur fernbedienung
DE69106468D1 (de) Verfahren und Vorrichtung zur Herstellung eines Kissens.
DE69326279D1 (de) Gerät und Verfahren zum Suchen des Zeitkodes auf einer Platte
DE463839T1 (de) Vorrichtung und verfahren zur pollutionskontrolle.
DE69008784T2 (de) Verfahren und Gerät zur Verhinderung des Anwachsens von Ablagerungen in einer Rohrleitung.
DE69106275T2 (de) Verfahren und Vorrichtung zur Abgrabung des Meeresbodens.
DE69107889D1 (de) Vorrichtung zur Abstandssanierung durch Degradation einer Oberfläche in einer belasteten Umgebung unter Wiedergewinnung und Weiterbehandlung der Abfälle.
DE69115664T2 (de) Verfahren und vorrichtung zur drucksteuerung
DE69010248D1 (de) Verfahren und Vorrichtung zur Steuerung eines Druckers.
DE69102678T2 (de) Verfahren und Vorrichtung zur Prüfung des Endes eines geschlossenen Rohres.
AT399495B (de) Verfahren und vorrichtung zur entsorgung von kohlendioxid
DE69100876D1 (de) Verfahren und Einrichtung zur Steuerung einer Bewegung.
DE59404465D1 (de) Verfahren und Vorrichtung zur Regelung eines Brenners
DE69102506D1 (de) Vorrichtung und Verfahren zum Prägen.
DE69228083T2 (de) Verfahren und Vorrichtung zur Steuerung von Pipelineoperationen

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8320 Willingness to grant licences declared (paragraph 23)
8328 Change in the person/name/address of the agent

Representative=s name: DUSCHER, R., DIPL.-PHYS. DR.RER.NAT., PAT.-ANW., 7