摘要:
A computer system comprises a first computer entity arranged to encrypt data using an encryption key comprising a time value, and a second computer entity arranged to generate, at intervals, a decryption key using a current time value. The encryption and decryption processes are such that the decryption key generated using a current time value corresponding to that used for the encryption key, is apt to decrypt the encrypted s data.
摘要:
Data from an n-time pad is used in security-related tasks. To accommodate use of the pad with security-related tasks of different security ratings, the maximum number of times any particular data from the pad is used is determined by the security rating of the highest-security application using that data.
摘要:
A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.
摘要:
When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
摘要:
A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.
摘要:
A software system for installation on computing apparatus (and a method of installing such a software system on computing apparatus), wherein the software system is provided in the form of a software package including a plurality of software components, one or more of the software components being provided as a plurality of different implementations, the apparatus including an installation engine for installing the software system only a selected one implementation of the or each of the software components having multiple implementations, and a random selector module for selecting one of the plurality of implementations of a software component for installation. Thus, software package would still be distributed to its consumers as a single version but each installation of the package on a user's computing apparatus is potentially different, which reduce the risk of faults in and attacks against software components having one or more “bugs” therein because not all consumers will have the same implementation of any one software component.
摘要:
A browser with a sound input receives a sound passage associated with a content site. The browser sends a representation of the sound passage to a service system where it is compared with stored representations of sound passages that each have an associated URI. On finding a match, the service system sends back the URI associated with the matched stored sound-passage representation. The browser uses this URI to access the content site.
摘要:
A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
摘要:
A memory tag has a memory. Associated with the memory tag there is a readable structure. The readable structure can be read to generate an identifier. However, the readable structure cannot be provided so as to encode a predetermined identifier.