Method and apparatus for controlling the use of a public key, ba

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 45, 380 49, H04L 930

Patent

active

050739344

ABSTRACT:
A method and apparatus in a public crypto system, control the use of a public key, based on the level of import integrity for the public key. The method and apparatus generate a control vector associated with the public key, having a history field. The public key and the control vector are transmitted from the location of generation over a communications link to a receiving location, using the selected one of a plurality of levels of import integrity for the transmission. At the receiving location, the public key and the control vector are tested to determine the actual level of import integrity for the transmission. Then, a value is written into the history field of the control vector which characterizes the actual level of import integrity. Thereafter, cryptographic applications for the public key are limited by control vector checking, to only those applications which have a required level of integrity which is not greater than the actual level of import integrity characterized by the history field in the control vector.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4850017 (1989-07-01), Matyas, Jr. et al.
patent: 4908861 (1990-03-01), Brachtl et al.
patent: 4918728 (1990-04-01), Matyas et al.
patent: 4924514 (1990-05-01), Matyas et al.
patent: 4924515 (1990-05-01), Matyas et al.
patent: 4941176 (1990-07-01), Matyas et al.
R. W. Jones, "Some Techniques for Handling Encipherment Keys", ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies & W. L. Price, "Security for Computer Networks", John Wiley & Sons, NY, 1984, Sec. 6.5, Key Management with Tagged Keys, pp. 168-172.
W. Diffie, et al., "Privacy and Authentication: An Introduction to Ctyptography", Proc. of IEEE, vol. 67, No. 3, 3/79, pp. 397-427.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for controlling the use of a public key, ba does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for controlling the use of a public key, ba, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for controlling the use of a public key, ba will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-839448

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.