Method and system for multimedia access control enablement
    1.
    发明授权
    Method and system for multimedia access control enablement 失效
    多媒体访问控制功能的方法和系统

    公开(公告)号:US5319705A

    公开(公告)日:1994-06-07

    申请号:US964324

    申请日:1992-10-21

    摘要: A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a customer key which includes a clear customer number and a derived portion derived from the customer number. The customer key is transformed into a second customer key which serves as a key expression for encrypting a file encryption key specifically intended for a respective one of the plurality of files. A plurality of software files can be stored together, for example on a CD-ROM, with each file encrypted under a corresponding file encryption key. The CD-ROM can be distributed to many user processors. When a specific user processor needs to run one of the software files, a request will be transmitted from the user processor to the software distribution processor. In response to that request, an encrypted file encryption key specific for the requested file, will be transmitted to the user processor. This will enable the user processor to decrypt only the requested file from the CD-ROM. All other files on the CD-ROM remain in their encrypted form and cannot be decrypted and used by the file encryption key received from the software distribution processor.

    摘要翻译: 公开了一种用于将多个软件文件从软件分发处理器安全地分发到用户处理器的方法和系统,同时选择性地使得用户处理器仅使用较少多个软件文件的子集。 这是通过采用客户密钥来实现的,客户密钥包括清除客户号码和从客户号码导出的派生部分。 客户密钥被转换成第二客户密钥,其作为用于加密专门针对多个文件中的相应文件的文件加密密钥的关键表达。 可以将多个软件文件一起存储在例如CD-ROM上,每个文件在相应的文件加密密钥下被加密。 CD-ROM可以分发给许多用户处理器。 当特定用户处理器需要运行其中一个软件文件时,将从用户处理器向软件分发处理器发送请求。 响应于该请求,特定于所请求文件的加密文件加密密钥将被发送到用户处理器。 这将使用户处理器只能从CD-ROM解密所请求的文件。 CD-ROM上的所有其他文件保持加密形式,不能被从软件分发处理器接收的文件加密密钥解密和使用。

    Data cryptography operations using control vectors
    2.
    发明授权
    Data cryptography operations using control vectors 失效
    使用控制向量的数据加密操作

    公开(公告)号:US4918728A

    公开(公告)日:1990-04-17

    申请号:US401486

    申请日:1989-08-30

    IPC分类号: G06F9/30 H04L9/08

    摘要: Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.

    摘要翻译: 通过与数据密码密钥相关联的控制向量来提供数据加密,该控制向量为密钥的发起者使用的密钥的使用提供授权。 控制向量指定的用途是对加密,解密,认证码生成和验证,用户数据的翻译的限制。 根据本发明,使用控制向量可以实现数据操作功能的复杂组合。 系统管理员可以通过根据本发明选择适当的控制向量来灵活地改变其安全策略的实现。 复杂场景如加密邮箱,会话保护,文件保护,密文翻译中心,点对点密文翻译,消息认证,具有不可否认性的消息认证等等可以很容易地由系统设计者使用控制向量 ,根据本发明。

    Public key cryptosystem key management based on control vectors
    3.
    发明授权
    Public key cryptosystem key management based on control vectors 失效
    基于控制向量的公钥关键CRYPTOSYSTEM密钥管理

    公开(公告)号:US5200999A

    公开(公告)日:1993-04-06

    申请号:US766260

    申请日:1991-09-27

    IPC分类号: G09C1/00 G06F9/30 H04L9/08

    摘要: A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector. The method then forms a private key token which includes the private control vector and the private key record, and stores the private key token in the data processing system.At a later time, the method receives a first key use request in the data processing system, requiring the first public key algorithm. In response to this, the method continues by accessing the private key token in the data processing system and checking the private control vector to determine if the private key record contains a key having permitted uses which will satisfy the first request. The method then decrypts the private key record under the first master key expression in the data processing system and extracts the first private key from the private key record. The method selects the first public key algorithm in the data processing system for the first key use request and executes the first public key algorithm in the data processing system using the first private key to perform a cryptographic operation to satisfy the first key use request.

    Secure key management using programable control vector checking
    7.
    发明授权
    Secure key management using programable control vector checking 失效
    使用可编程控制向量检查实现安全密钥管理

    公开(公告)号:US5007089A

    公开(公告)日:1991-04-09

    申请号:US506319

    申请日:1990-04-09

    IPC分类号: G06F21/22 G09C1/00 H04L9/08

    CPC分类号: H04L9/088

    摘要: The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the cryptographic facility by one of several means. A first means for linking the repository to the cryptographic facility would include a physically secure data communications link. A second means for connecting the repository to the cryptographic facility would be by using an insecure channel with authentication, wherein either a modification detection code or alternately a message authentication code would be transmitted to the cryptographic facility and then the desired control vector checking code would be transmitted over the link. The cryptographic facility will include a code authorization mechanism to compare the transmitted MAC or MDC with a corresponding value computed from the received control vector checking code. If the two values of the MDC or the MAC compare, then the control vector checking code is authenticated and loaded into the control vector checking unit for carrying out the control vector checking operations desired. The control vector checking code repository can be located in a remote system connected by means of the communications link to the crypto facility, or alternately the repository can reside in the same system as the crypto facility. This provides for the dynamic updating of control vector checking code, where improvements or alterations are made to the control vector checking sequence. This also provides for a reduced memory size in the crypto facility, being sufficiently large to accommodate subsidiary control vector checking applications, with alternate control vector checking applications requiring the reloading of the control vector checking unit from the repository.

    Method for generating public and private key pairs without using a
passphrase
    9.
    发明授权
    Method for generating public and private key pairs without using a passphrase 失效
    没有使用PASSPHRASE产生公共和私人关键对的方法

    公开(公告)号:US5201000A

    公开(公告)日:1993-04-06

    申请号:US766533

    申请日:1991-09-27

    摘要: A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the first seed value being generated from a passphrase. A first random number is generated using the first seed value and applied to generating the first key pair. The method then generates a first control vector defining a first use of the first public key, private key pair.The method then continues with the step of generating a second public key, private key pair using a second seed value unknown to the user, the second seed value being a true random number. The second random number is generated using the second seed value in a pseudorandom number generator and applied to generating the second key pair. The method generates a second control vector defining a second use of the second public key, private key pair.The method then controls the use of the first public key, private key pair using the first control vector and controls the use of the second public key, private key pair with the second control vector.

    Hybrid public key algorithm/data encryption algorithm key distribution
method based on control vectors
    10.
    发明授权
    Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors 失效
    基于控制向量的混合公钥算法/数据加密算法密钥分配方法

    公开(公告)号:US5142578A

    公开(公告)日:1992-08-25

    申请号:US748407

    申请日:1991-08-22

    摘要: The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorithm and a public key belonging to the intended recipient of the key record. The patent further describes a method and apparatus for securely recovering the distributed key-encrypting key by the recipient by decrypting the received key record using the same public key algorithm and private key associated with the public key and re-encrypting the key-encrypting key under a key formed by arithmetically combining the recipient's master key with a control vector contained in the control information of the received key record. Thus the type and usage attributes assigned by the originator of the key-encrypting key in the form of a control vector are cryptographically coupled to the key-encrypting key such that the recipient may only use the received key-encrypting key in a manner defined by the key originator.The patent further describes a method and apparatus to improve the integrity of the key distribution process by applying a digital signature to the key record and by including identifying information (i.e., an originator identifier) in the control information of the key record. The integrity of the distribution process is enhanced by verifying the digital signature and originator identifier at the recipient node.