Internationally regulated system for one to one cryptographic co

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, 380 23, 380 25, 380 49, H04L 930, H04L 900

Patent

active

056640170

ABSTRACT:
An encryption method and apparatus for generating an encrypted message which is controllably decryptable, comprising providing at least one agency public key to at least one decrypting agency entity respectively and to each of a first plurality of subscriber entities and to each of a second plurality of regulator entities, providing an ID, a public key and a private key for each of the first plurality of subscribers and each of the second plurality of regulators, for each subscriber entity and for each regulator entity, employing at least one agency public key to encrypt the entity's private key and for each individual subscriber entity and for each individual regulator entity, generating a certificate attesting, for all other entities, to the individual entity's status, ID, public key and encrypted private key.

REFERENCES:
patent: Re34954 (1995-05-01), Haber et al.
patent: 5079733 (1992-01-01), Antoine
patent: 5136646 (1992-08-01), Haber et al.
patent: 5136647 (1992-08-01), Haber et al.
patent: 5163154 (1992-11-01), Bournas
patent: 5166978 (1992-11-01), Quisquater
patent: 5214701 (1993-05-01), Quisquater
patent: 5218536 (1993-06-01), McWherter
patent: 5285403 (1994-02-01), Quisquater
patent: 5343529 (1994-08-01), Goldfine et al.
patent: 5351300 (1994-09-01), Quisquater
patent: 5557346 (1996-09-01), Lipner
patent: 5557765 (1996-09-01), Lipner
Denning, D.E., and Dennis Bransted, A Taxonomy For Key Escrow Encryptions Systems, ACM, Mar. 1996.
Keep the Invaders (of Privacy) Socially Sane-Kiss, viewgraphs used at Eurocrypt 1994, IACR Annual Advances in Cryptology, in Perugia, Italy, May 9, 1994.
Walker, S. et al., Commercial Key Recovery, ACM, Mar. 1996.
Ganesan, R., The Yaksha Security System, ACM, Mar. 1996.
Maher, D., Crypto Backup and Key Escrow, ACM, Mar. 1996.
Denning, D.E., and Dennis Bransted, A Taxonomy For Key Escrow Encryptions Systems, Draft of Sep. 24, 1994, pp. 1-A-21.
Gressel, Carmi, Itai Dror and Ran Granot, International Cryptographic Communication without Key Escrow; Kiss: Keep the Invaders (of Privacy) Socially Sane, International Cryptography Institute, 1995, pp. 1-20.
Schneier, B., Applied cryptography, Data encryption standard (DES), Chapter 10, pp. 219-243.
S2COS(TM) Secured Smart Card Operating System T4 Series Reference Manual, Dec. 1994, pp. 1-39.
SCOS(TM) RSA Public Key Cryptography Enhancement, Apr. 1995, pp. 1-22.
S2COS(TM)-5 Multi-Application Secured Smart Card Operating System, Apr. 1995, pp. 1-13.
ST16.times.F74 CMOS crypto-computer family ST16.times.F74, SGS-Thomson Microelectronics, Agrate, Italy, Oct. 1993.
ST16CF54CMOS MCU based safeguarded smartcard IC with modular arithmetic processor, SGS-Thomson Microelectronics, Agrate, Italy, Sep. 1994.
MC68HC05SC29 8-bit microcomputer with EEPROM and N modulo M exponent coprocessor product preview, Motorola semiconductor technical data, Schaumberg, Illinois, 1993.
MC68HC05SC30 Enhanced 8-bit microcomputer with EEPROM and N modulo M exponent exponent coprocessor product preview, Motorola semiconductor technical data, Schaumberg, Illinois, 1993.
Rubenstein, R.H., Hardware accelerator is public's key to card security, New Electronics, pp. 13, 15-16, Apr. 1994.
Rivest, R.L., et al., A method for obtaining digital signatures and public-key cryptosystems, Communication of the ACM, vol. 21 No. 2, pp. 120-126, Feb. 1978.
Secured hash standard, Federal Information Processing Standards Publication (FIBS) 180-1, May 1994.
SLE44C200 Cryptocontroller with 8-bit Microprocessor, 140-bit Crypto Arithmetic Unit, 10 Kbyte ROM 256(+350) byte RAM, 2.5 Kbyte EEPROM and Sleep Mode, Siemens Semiconductor Group, 1993.
83C852 secured 8-bit microcontroller for conditional access applications, Philips Components, Aug. 1990.
Denning, D.E., et al., Key escrowing today, IEEE Communication Magazine, pp. 58-68,Sep. 1994.
Cryptography: the Key to secure communication, Challenge News and Views from SGS-Thomson Microelectronics, Agrate, Italy, pp. 1, 3, No. 2, Aug. 1994.
Micali, S., Fair cryptosystems, Proceedings at Eurocrypt '94, Perugia, Italy, May 10, 1994.
Denning, D.E., An international approach to key escrow encryption, Presentation for International Cryptographic Institute, Washington D.C., Sep. 1995.
Cryptoprocessor chip includes embedded cryptolibrary, SGS-Thomson Microelectronic, Agrate, Italy, press release K491M Oct. 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Internationally regulated system for one to one cryptographic co does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Internationally regulated system for one to one cryptographic co, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Internationally regulated system for one to one cryptographic co will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-314450

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.