Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1993-08-16
1995-03-21
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 4, 380 25, H04L 908
Patent
active
054004039
ABSTRACT:
Encrypted data objects are distributed via a broadcast communication channel or media. Relatively large access indicia may also be pre-distributed to any potential data object users and/or purchasers via an access communication channel or media. Subsequently, when a particular potential user or purchaser wishes to decrypt a given data object, he or she communicates to a data distribution point the identity of the desired data object and the identity of a valid access incidium. A relatively short decryption key is then furnished via a key distribution communication channel or media to permit decryption while at the same time permitting appropriate accounting operations to take place. The system is resistant to abuse in several ways but in part because such abuse would be approximately as difficult as would be re-distribution of the entire decrypted data object itself.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4433207 (1984-02-01), Best
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4683968 (1987-08-01), Appelbaum et al.
patent: 4731840 (1988-03-01), Mniszewski et al.
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4907273 (1990-03-01), Wiedemer
patent: 5010571 (1991-04-01), Katznelson
patent: 5050213 (1991-09-01), Shear
patent: 5058162 (1991-10-01), Santon et al.
patent: 5146498 (1992-09-01), Smith
patent: 5177791 (1993-01-01), Yeh et al.
patent: 5179591 (1993-01-01), Hardy et al.
patent: 5191611 (1993-03-01), Lang
patent: 5230020 (1993-07-01), Hardy et al.
patent: 5253294 (1993-10-01), Maurer
patent: 5293576 (1994-03-01), Mihm, Jr. et al.
patent: 5295188 (1994-03-01), Wilson et al.
Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptology-Crypto '89, pp. 239-251.
Brickell et al, "An Interactive Identification Scheme Based on Discrete Logarithms and Factoring", Journal of Cryptology, pp. 29-39.
Diffie et al, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology-Crypto '85, pp. 417-426, New York, 1986.
Agnew et al, "Arithmetic Operations in GF(2.sup.m)", Journal of Cryptology, pp. 3-13, 1993.
Rivest et al, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, 21(2), pp. 120-126.
Brickell et al, "Fast Exponentiation with Precomputation: Algorithms and Lower Bounds", Advances in Cryptology-Eurocrypt '92, pp. 1-24.
Odlyzko, "Discrete Logarithms in Finite Fields, and Their Cryptographic Significance", Advances in Cryptology-Eurocrypt '84, pp. 1-90, Berlin, 1984.
Fahn Paul N.
Kaliski, Jr. Burton S.
Robshaw Matthew J. B.
Cangialosi Salvatore
RSA Data Security, Inc.
LandOfFree
Abuse-resistant object distribution system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Abuse-resistant object distribution system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Abuse-resistant object distribution system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1155751