Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1996-10-11
1999-05-11
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 9, 380 10, 380 23, 380 49, H04L9/00
Patent
active
059036494
ABSTRACT:
To provide sufficient security, a method, based on the use of a code-controlled one-way function with a threshold scheme, is described. N shadows s.sub.i are derived from the personal code of each of n authorized persons in the central office, a code k is calculated in the central office from the n shadows s.sub.i, . . . s.sub.n using an (n, t) threshold scheme, and the data for establishing code k is transmitted though an unsecured channel. The data for establishing code k comprises data required for deriving shadows s.sub.i from the personal codes k.sub.i and n-1 other shadows of the (n,t) threshold scheme, which other shadows differ from the shadows of the authorized persons. The method can be used for a plurality of purposes; however, it is specifically designed for providing security in the transmission of a broadcast program subject to fees (pay-TV, pay-radio).
REFERENCES:
patent: 5124117 (1992-06-01), Tatebayashi et al.
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5208859 (1993-05-01), Bartucci et al.
patent: 5241597 (1993-08-01), Bright
patent: 5381479 (1995-01-01), Gardeck et al.
patent: 5412722 (1995-05-01), Sherly et al.
patent: 5471532 (1995-11-01), Gardeck et al.
patent: 5528691 (1996-06-01), Rosauer et al.
Using A Local Password For Two-Step Authentication. In: IBM Technical Disclosure Bulletin, vol. 35, No. 4A, Sep. 1992, 373-375.
Zu-hua, S.: Public-key cryptosystem and digital-signature schemes based on linear algebra over a local ring. In: IEE Proceedings, vol. 134, Pt. E, No. 5, Sep. 1987, 254-256.
IEEE Infocom '93. The Conference on Computer Communications Proceedings. Twelfth Annual Joint Conference of the IEE Computer and Communications Societies. Networking: Foundation for the Future (CAT. No. 93CH3264-9), San Francisco, CA, USA, 28 Mar.-, ISBN 0-8186-3580-0, 1993, Los Almitos, CA, USA, IEEE Comnput. Soc. Press, USA, 1406-1413 vol. 3, XP000419708 Laih C -S et al: "On the design of conference key distribution systems for the broadcasting networks".
Advances in Cryptology--Crypto '93. 13th Annual International Cryptology Conference Proceedings, Proceedings of Crypto '93. Santa Barbara, CA, USA, Aug. 22-26, 1993, ISBN 3-540-57766-1, 1994, Berlin, Germany, Springer-Verlag, Germany, 480-491, XP000502372 Fiat A et al: "Broadcast encryption".
Communications of the ACM, Nov. 1979, USA, 1-4 Bd. 22, Nr. 11, ISSN 0001-0782, 612-613, XP000565227 Shamir A: "How to share a secret".
Deutsche Telekom AG
Gregory Bernarr E.
LandOfFree
Method for establishing a common code for authorized persons thr does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for establishing a common code for authorized persons thr, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for establishing a common code for authorized persons thr will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-252099