Abuse-resistant object distribution system and method

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, 380 25, H04L 908

Patent

active

054004039

ABSTRACT:
Encrypted data objects are distributed via a broadcast communication channel or media. Relatively large access indicia may also be pre-distributed to any potential data object users and/or purchasers via an access communication channel or media. Subsequently, when a particular potential user or purchaser wishes to decrypt a given data object, he or she communicates to a data distribution point the identity of the desired data object and the identity of a valid access incidium. A relatively short decryption key is then furnished via a key distribution communication channel or media to permit decryption while at the same time permitting appropriate accounting operations to take place. The system is resistant to abuse in several ways but in part because such abuse would be approximately as difficult as would be re-distribution of the entire decrypted data object itself.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4433207 (1984-02-01), Best
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4683968 (1987-08-01), Appelbaum et al.
patent: 4731840 (1988-03-01), Mniszewski et al.
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4907273 (1990-03-01), Wiedemer
patent: 5010571 (1991-04-01), Katznelson
patent: 5050213 (1991-09-01), Shear
patent: 5058162 (1991-10-01), Santon et al.
patent: 5146498 (1992-09-01), Smith
patent: 5177791 (1993-01-01), Yeh et al.
patent: 5179591 (1993-01-01), Hardy et al.
patent: 5191611 (1993-03-01), Lang
patent: 5230020 (1993-07-01), Hardy et al.
patent: 5253294 (1993-10-01), Maurer
patent: 5293576 (1994-03-01), Mihm, Jr. et al.
patent: 5295188 (1994-03-01), Wilson et al.
Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptology-Crypto '89, pp. 239-251.
Brickell et al, "An Interactive Identification Scheme Based on Discrete Logarithms and Factoring", Journal of Cryptology, pp. 29-39.
Diffie et al, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology-Crypto '85, pp. 417-426, New York, 1986.
Agnew et al, "Arithmetic Operations in GF(2.sup.m)", Journal of Cryptology, pp. 3-13, 1993.
Rivest et al, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, 21(2), pp. 120-126.
Brickell et al, "Fast Exponentiation with Precomputation: Algorithms and Lower Bounds", Advances in Cryptology-Eurocrypt '92, pp. 1-24.
Odlyzko, "Discrete Logarithms in Finite Fields, and Their Cryptographic Significance", Advances in Cryptology-Eurocrypt '84, pp. 1-90, Berlin, 1984.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Abuse-resistant object distribution system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Abuse-resistant object distribution system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Abuse-resistant object distribution system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1155751

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.