WO2001020836A2 - Ephemeral decryptability - Google Patents
Ephemeral decryptability Download PDFInfo
- Publication number
- WO2001020836A2 WO2001020836A2 PCT/US2000/023997 US0023997W WO0120836A2 WO 2001020836 A2 WO2001020836 A2 WO 2001020836A2 US 0023997 W US0023997 W US 0023997W WO 0120836 A2 WO0120836 A2 WO 0120836A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- encryption key
- key
- party
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU75746/00A AU7574600A (en) | 1999-09-14 | 2000-08-31 | Ephemeral decryptability |
EP00964936A EP1228462A4 (en) | 1999-09-14 | 2000-08-31 | Ephemeral decryptability |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/395,581 | 1999-09-14 | ||
US09/395,581 US6363480B1 (en) | 1999-09-14 | 1999-09-14 | Ephemeral decryptability |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001020836A2 true WO2001020836A2 (en) | 2001-03-22 |
WO2001020836A3 WO2001020836A3 (en) | 2002-01-31 |
Family
ID=23563634
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/023997 WO2001020836A2 (en) | 1999-09-14 | 2000-08-31 | Ephemeral decryptability |
Country Status (4)
Country | Link |
---|---|
US (1) | US6363480B1 (en) |
EP (1) | EP1228462A4 (en) |
AU (1) | AU7574600A (en) |
WO (1) | WO2001020836A2 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2365702A (en) * | 2000-03-31 | 2002-02-20 | Simoco Int Ltd | Mobile radio communication system |
GB2383238A (en) * | 2001-12-14 | 2003-06-18 | Hewlett Packard Co | Secure digital document storage system with progressively degraded decryption key |
FR2837055A1 (en) * | 2002-03-06 | 2003-09-12 | Viaccess Sa | PROTOCOL OF ACCESS CONTROL, BY RANGES OF SPECIFIC HOURS, TO ENRICHED INFORMATION |
US7363499B2 (en) | 2003-09-18 | 2008-04-22 | Sun Microsystems, Inc. | Blinded encryption and decryption |
US7409545B2 (en) | 2003-09-18 | 2008-08-05 | Sun Microsystems, Inc. | Ephemeral decryption utilizing binding functions |
US9338405B2 (en) | 2006-05-04 | 2016-05-10 | Cisco Technology, Inc. | Scrambled digital data item |
Families Citing this family (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4434465B2 (en) * | 1999-11-16 | 2010-03-17 | キヤノン株式会社 | Communication apparatus and method, and storage medium |
ATE547887T1 (en) * | 2000-03-03 | 2012-03-15 | Qualcomm Inc | METHOD, SYSTEM AND DEVICE FOR PARTICIPATING IN GROUP COMMUNICATION SERVICES IN AN EXISTING COMMUNICATIONS SYSTEM |
EP2276196B1 (en) | 2000-06-09 | 2014-09-03 | Certicom Corp. | Method for the Application of Implicit Signature Schemes |
JP4064101B2 (en) * | 2000-12-22 | 2008-03-19 | 株式会社リコー | Image forming apparatus, encrypted data processing method, and encrypted data processing system |
US6948065B2 (en) * | 2000-12-27 | 2005-09-20 | Intel Corporation | Platform and method for securely transmitting an authorization secret |
US6996234B2 (en) * | 2001-02-02 | 2006-02-07 | Asier Technology Corporation | Data decryption methodology |
US7194618B1 (en) * | 2001-03-05 | 2007-03-20 | Suominen Edwin A | Encryption and authentication systems and methods |
US9100457B2 (en) * | 2001-03-28 | 2015-08-04 | Qualcomm Incorporated | Method and apparatus for transmission framing in a wireless communication system |
US8077679B2 (en) * | 2001-03-28 | 2011-12-13 | Qualcomm Incorporated | Method and apparatus for providing protocol options in a wireless communication system |
US8121296B2 (en) * | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
RU2294596C2 (en) * | 2001-03-28 | 2007-02-27 | Квэлкомм Инкорпорейтед | Method for controlling power for communication services from one point to a set of points in communication systems |
FR2825209A1 (en) * | 2001-05-23 | 2002-11-29 | Thomson Licensing Sa | DEVICES AND METHOD FOR SECURING AND IDENTIFYING MESSAGES |
US20040120527A1 (en) * | 2001-08-20 | 2004-06-24 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US7185362B2 (en) * | 2001-08-20 | 2007-02-27 | Qualcomm, Incorporated | Method and apparatus for security in a data processing system |
US7697523B2 (en) * | 2001-10-03 | 2010-04-13 | Qualcomm Incorporated | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US7260555B2 (en) * | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
US7921288B1 (en) * | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
JP4386732B2 (en) | 2002-01-08 | 2009-12-16 | セブン ネットワークス, インコーポレイテッド | Mobile network connection architecture |
US7088823B2 (en) * | 2002-01-09 | 2006-08-08 | International Business Machines Corporation | System and method for secure distribution and evaluation of compressed digital information |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US20030217258A1 (en) * | 2002-05-16 | 2003-11-20 | International Business Machines Corporation | Apparatus and method of using ephemeral asymmetric keys to exchange security data between hardware security modules |
US7743257B2 (en) * | 2002-06-27 | 2010-06-22 | Nxp B.V. | Security processor with bus configuration |
US20050271246A1 (en) * | 2002-07-10 | 2005-12-08 | Sharma Ravi K | Watermark payload encryption methods and systems |
US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US7599655B2 (en) * | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US8098818B2 (en) * | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US8718279B2 (en) * | 2003-07-08 | 2014-05-06 | Qualcomm Incorporated | Apparatus and method for a secure broadcast system |
US7581100B2 (en) * | 2003-09-02 | 2009-08-25 | Authernative, Inc. | Key generation method for communication session encryption and authentication system |
US8724803B2 (en) * | 2003-09-02 | 2014-05-13 | Qualcomm Incorporated | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system |
US7703140B2 (en) * | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US8127366B2 (en) * | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7874010B1 (en) | 2003-10-24 | 2011-01-18 | Oracle America, Inc. | Method and apparatus for using secret keys to make data permanently unreadable |
US9240884B2 (en) * | 2003-10-28 | 2016-01-19 | Certicom Corp. | Method and apparatus for verifiable generation of public keys |
US7702909B2 (en) * | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
US8127137B2 (en) | 2004-03-18 | 2012-02-28 | Digimarc Corporation | Watermark payload encryption for media including multiple watermarks |
US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
GB2419787B (en) * | 2004-10-28 | 2007-07-04 | Hewlett Packard Development Co | Method and apparatus for providing short-term private keys in public-key cryptographic systems |
EP1748615A1 (en) * | 2005-07-27 | 2007-01-31 | Sun Microsystems France S.A. | Method and system for providing public key encryption security in insecure networks |
US7596696B1 (en) | 2005-08-29 | 2009-09-29 | Sun Microsystems, Inc. | Efficiently managing keys to make data permanently unreadable |
US7873166B2 (en) * | 2005-09-13 | 2011-01-18 | Avaya Inc. | Method for undetectably impeding key strength of encryption usage for products exported outside the U.S |
US7945070B2 (en) | 2006-02-24 | 2011-05-17 | Digimarc Corporation | Geographic-based watermarking keys |
US20080037775A1 (en) * | 2006-03-31 | 2008-02-14 | Avaya Technology Llc | Verifiable generation of weak symmetric keys for strong algorithms |
US8200964B2 (en) * | 2006-09-22 | 2012-06-12 | Oracle America, Inc. | Method and apparatus for accessing an encrypted file system using non-local keys |
US7916870B2 (en) * | 2006-11-03 | 2011-03-29 | Verizon Patent And Licensing Inc. | Systems and methods for document control using public key encryption |
US9189642B2 (en) * | 2007-03-14 | 2015-11-17 | Oracle America, Inc. | Safe processing of on-demand delete requests |
WO2009009869A1 (en) | 2007-07-17 | 2009-01-22 | Certicom Corp. | Method and system for generating implicit certificates and applications to identity-based encryption (ibe) |
US8150038B2 (en) * | 2007-11-01 | 2012-04-03 | Oracle America, Inc. | Revocation of a system administrator in an encrypted file system |
US20110302410A1 (en) * | 2010-06-07 | 2011-12-08 | Christopher Clarke | Secure document delivery |
US8700899B1 (en) * | 2012-06-27 | 2014-04-15 | Emc Corporation | Forward-secure key unlocking for cryptographic devices |
IN2013CH00917A (en) * | 2013-03-04 | 2015-08-07 | Infosys Ltd | |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
US10498705B2 (en) | 2017-11-15 | 2019-12-03 | Visa International Service Association | Dynamic offline encryption |
US11500988B2 (en) | 2019-03-08 | 2022-11-15 | International Business Machines Corporation | Binding secure keys of secure guests to a hardware security module |
US11475167B2 (en) | 2020-01-29 | 2022-10-18 | International Business Machines Corporation | Reserving one or more security modules for a secure guest |
US11595367B2 (en) * | 2020-09-30 | 2023-02-28 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Selectively disclosing content of data center interconnect encrypted links |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US6055314A (en) * | 1996-03-22 | 2000-04-25 | Microsoft Corporation | System and method for secure purchase and delivery of video content programs |
US6829356B1 (en) * | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
-
1999
- 1999-09-14 US US09/395,581 patent/US6363480B1/en not_active Expired - Lifetime
-
2000
- 2000-08-31 EP EP00964936A patent/EP1228462A4/en not_active Withdrawn
- 2000-08-31 AU AU75746/00A patent/AU7574600A/en not_active Abandoned
- 2000-08-31 WO PCT/US2000/023997 patent/WO2001020836A2/en not_active Application Discontinuation
Non-Patent Citations (2)
Title |
---|
MENEZES ET AL.: 'Handbook of applied cryptography', 1996 XP002937573 pages 544, 551-552, 578-580, sec. 13.7.2, 13.2.1 * |
See also references of EP1228462A2 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2365702A (en) * | 2000-03-31 | 2002-02-20 | Simoco Int Ltd | Mobile radio communication system |
GB2365702B (en) * | 2000-03-31 | 2002-10-09 | Simoco Int Ltd | Mobile radio communication system |
GB2383238A (en) * | 2001-12-14 | 2003-06-18 | Hewlett Packard Co | Secure digital document storage system with progressively degraded decryption key |
GB2383238B (en) * | 2001-12-14 | 2004-11-10 | Hewlett Packard Co | Digital document storage |
US7146495B2 (en) | 2001-12-14 | 2006-12-05 | Hewlett-Packard Development Company, L.P. | Digital document storage |
FR2837055A1 (en) * | 2002-03-06 | 2003-09-12 | Viaccess Sa | PROTOCOL OF ACCESS CONTROL, BY RANGES OF SPECIFIC HOURS, TO ENRICHED INFORMATION |
WO2003075571A1 (en) * | 2002-03-06 | 2003-09-12 | Viaccess | Protocol for controlling access, through specific time ranges, to scrambled data |
KR100813573B1 (en) * | 2002-03-06 | 2008-03-17 | 비아세스 | Protocol for controlling access, through specific time ranges, to scrambled data |
US7363499B2 (en) | 2003-09-18 | 2008-04-22 | Sun Microsystems, Inc. | Blinded encryption and decryption |
US7409545B2 (en) | 2003-09-18 | 2008-08-05 | Sun Microsystems, Inc. | Ephemeral decryption utilizing binding functions |
US9338405B2 (en) | 2006-05-04 | 2016-05-10 | Cisco Technology, Inc. | Scrambled digital data item |
Also Published As
Publication number | Publication date |
---|---|
AU7574600A (en) | 2001-04-17 |
WO2001020836A3 (en) | 2002-01-31 |
EP1228462A2 (en) | 2002-08-07 |
US6363480B1 (en) | 2002-03-26 |
EP1228462A4 (en) | 2003-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6363480B1 (en) | Ephemeral decryptability | |
US11290431B2 (en) | Secure end-to-end transport through intermediary nodes | |
US10313135B2 (en) | Secure instant messaging system | |
US7016499B2 (en) | Secure ephemeral decryptability | |
US6988199B2 (en) | Secure and reliable document delivery | |
US20020136410A1 (en) | Method and apparatus for extinguishing ephemeral keys | |
US7693285B2 (en) | Secure communication apparatus and method | |
US7725716B2 (en) | Methods and systems for encrypting, transmitting, and storing electronic information and files | |
US20030182559A1 (en) | Secure communication apparatus and method for facilitating recipient and sender activity delegation | |
US20080065878A1 (en) | Method and system for encrypted message transmission | |
US7031469B2 (en) | Optimized enveloping via key reuse | |
US20050160041A1 (en) | Smartcard-based root certificate methods and apparatuses | |
US20070076880A1 (en) | Secure digital transmission | |
WO2023043793A1 (en) | System and method of creating symmetric keys using elliptic curve cryptography | |
CN116684169A (en) | Application layer data security transmission method and system based on network identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000964936 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000964936 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000964936 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |