Data cryptography operations using control vectors

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 45, 380 49, H04L 900

Patent

active

049187287

ABSTRACT:
Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.

REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4223403 (1980-09-01), Konheim et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4386233 (1983-08-01), Smid et al.
patent: 4500750 (1985-02-01), Elander et al.
patent: 4503287 (1985-03-01), Morris et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4683968 (1987-08-01), Applebaum et al.
patent: 4723283 (1988-02-01), Nasagawa et al.
patent: 4723284 (1988-02-01), Munck et al.
patent: 4811393 (1989-04-01), Hazard
patent: 4850017 (1989-07-01), Brachtl et al.
R. W. Jones, "Some Techniques for Nandling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies, et al., "Security for Computer Networks," John Wiley & Sons, New York, 1984, Section 6.5, Key Management with Tagged Keys, pp. 168-172.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data cryptography operations using control vectors does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data cryptography operations using control vectors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data cryptography operations using control vectors will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1058420

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.