Unified end-to-end security methods and systems for operating on

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, 380 49, 380 50, H04L 900, G09C 308

Patent

active

059600861

ABSTRACT:
Secure transmission of a message is achieved by using a one-time encryption key derived at the receiver and the sender from information present at both the sender and the receiver, but wherein the information from which the encryption key is derived is not transmitted between the sender and the receiver. A plurality of bytes, known as a master signature, is randomly generated and stored at the sender, wherein each byte is uniquely identified by an address. A first random subset of this plurality of bytes, called an access signature, and the addresses in the master signature of the bytes in this access signature, are stored at the receiver. To generate an encryption key, the receiver selects a second random subset of bytes, known as a session signature, from the access signature and sends the addresses in the master signature of the bytes in this session signature to the sender. The sender uses these addresses to identify the bytes in this session signature which bytes are used at both the sender and the receiver to derive the encryption key. If desired, these bytes can be used directly as the encryption key but preferably, these bytes are passed through a session signature-to-session key converter using an irreversible algorithm to generate a one-time encryption key to be used to encrypt the message to be sent between the sender and the receiver. The master signature can be also derived from the digitized video image of the user, which allows a card containing the master signature to be used as described above but also with a video monitor to visually identify the user.

REFERENCES:
patent: 4853962 (1989-08-01), Brockman
patent: 4878246 (1989-10-01), Pastor et al.
patent: 5081677 (1992-01-01), Green et al.
patent: 5115467 (1992-05-01), Esserman
patent: 5199073 (1993-03-01), Scott
patent: 5351293 (1994-09-01), Michener et al.
patent: 5602915 (1997-02-01), Campana et al.
IEEE in Houston, Globecom '93. IEEE Global Telecommunications Theory Mini-Conference. Technical Program Conference Record (CAT. No. 93CH3250-8), Proceeding of Globecom '93. IEEE Global Telecommunications Confere, ISBN 0-7803-0917-0, 1993, New York, NY, USA, IEEE, USA, pp. 164-170 vol. 1, XP000428048 Tsubakiyama H et al: "Security for Information Data Broadcasting System with Conditional-Access Control" see p. 165, right-hand col. paragraph 1; figure 3.
Article entitled "Cryptography in Cyberspace" written by Edward J. Radlo, partner Fenwick & West, Jul. 24, 1995 contained in New Matter, vol. 20, No. 3, pp. 44-48.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Unified end-to-end security methods and systems for operating on does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Unified end-to-end security methods and systems for operating on, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Unified end-to-end security methods and systems for operating on will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-712823

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.