Secure management of keys using control vectors with multi-path

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, 380 43, 380 49, H04L 932, G06F 704

Patent

active

051034786

ABSTRACT:
A requested cryptographic function is validated for performance in conjunction with a cryptographic key, by inputting a first portion of an associated control vector into a first control vector checker, which outputs a first authorization signal if the requested cryptographic function has been authorized by the originator of the key. A second portion of the control vector is input to a second control vector checker, which outputs a second authorization signal if the requested cryptographic function has been authorized by the originator of the key. Both the first and the second authorization signals are applied to a cryptographic processor which initiates the execution of the requested cryptographic function.

REFERENCES:
patent: 4223403 (1980-09-01), Konheim et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4386233 (1983-05-01), Smid et al.
patent: 4500750 (1985-02-01), Elander et al.
patent: 4503287 (1985-03-01), Morris et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4683968 (1987-08-01), Appelbaum et al.
patent: 4723283 (1988-02-01), Nagasawa et al.
patent: 4723284 (1988-02-01), Munck et al.
R. W. Jones, "Some Techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies and W. L. Price, "Security for Computer Networks," John Wiley & Sons, New York, 1984, Sec. 6.5, pp. 168-172.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure management of keys using control vectors with multi-path does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure management of keys using control vectors with multi-path , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure management of keys using control vectors with multi-path will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1901387

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.