Method and system for controlling unauthorized access to informa

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, 380 25, H04L 930

Patent

active

055861865

ABSTRACT:
A system for controlling unauthorized access to information distributed to users and, more particularly, for controlling unauthorized access to software distributed to users is provided. One method utilizing the system of the present invention enables the software to be encrypted using a single encryption key and to be decrypted using a multiplicity of "decryption" keys, each of which is unique to a particular user. The "decryption" keys are the products of numeric representations of identifying information relating to users and unique user keys generated using the numeric representations and a "true" decryption key. Since each user receives a unique user key and both the numeric representation and the user key are generated using the identifying information, if the user reveals the numeric representation and the user key (or the product of the numeric representation and the user key), the numeric representation and the user key can be traced to the user who revealed them. Another method utilizing the system of the present invention introduces randomness or pseudo-randomness into the decryption scheme to provide an additional level of security to the scheme.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4670857 (1987-06-01), Rackman
patent: 4944007 (1990-07-01), Austin
patent: 5222133 (1993-06-01), Chou et al.
patent: 5319705 (1994-06-01), Halter et al.
Desmedt, Yvo G. (ed.), Advances in Cryptology--Crypto '94, Proc. of the 14th Int'l Cryptology Conf., Santa Barbara, CA, Aug. 21-25, 1994, Springer-Verlag, Heidelberg, 1994, pp. 257-270.
Koyama et al., "New Public-Key Schemes Based on Elliptic Curves over the Ring Z.sub.n, "Advances in Cryptology--Crypto '91, Proc. of the 11th Int'l. Cryptology Conf., Springer-Verlag, Heidelberg, 1991, pp. 252-266.
Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, Boston, MA, 1993, pp. 1-128.
Rivest et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21(2):120-126, 1978.
Cormen et al., Introduction to Algorithms, MIT Press and McGraw-Hill, pp. 801-852, 1990.
Hamming, "Error Detecting and Error Correcting Codes," The Bell System Technical Journal 26(2):147-160, 1950.
Tanenbaum, Computer Networks, 2d ed., pp. 206-212.
Blahut, Theory and Practice of Error Control Codes, pp. 54-55.
Vanstone et al., An Introduction to Error Correcting Codes with Applications, Kluwer Academic Publishers, pp. 65-69.
Encyclopedia of Mathematics and Its Applications, pp. 142-143.
Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., pp. 281-288, 1994.
Lewis et al., Elements of the Theory of Computation, Prentice-Hall, Inc., Engelwood Cliffs, NJ, pp. 242-248, 1981.
"The Arcade Project: A Progress Report," Ciphertext, The RSA Newsletter 2(1):6-7, 1994.
"Apple Computer: Launches Software Dispatch," Newswire Mailing, from Microsoft, Oct. 11, 1993, 136 lines.
Flynn, Mary Kathleen, "Software Samplers Coming on CD-ROM," PC Magazine, Sep. 28, 1993, 53 lines.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for controlling unauthorized access to informa does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for controlling unauthorized access to informa, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for controlling unauthorized access to informa will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1998616

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.