-
公开(公告)号:DE60025901T2
公开(公告)日:2006-08-24
申请号:DE60025901
申请日:2000-11-28
Applicant: IBM
Inventor: INCERTIS CARRO FERNANDO , MATYAS STEPHEN M
-
公开(公告)号:DE69521977D1
公开(公告)日:2001-09-06
申请号:DE69521977
申请日:1995-11-28
Applicant: IBM
Inventor: HERZBERG AMIR , KRAWCZYK HUGO M , KUTTEN SHAY , VAN LE AN , MATYAS STEPHEN M , YUNG MARCEL M
Abstract: A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
-
公开(公告)号:DE69130658T2
公开(公告)日:1999-07-22
申请号:DE69130658
申请日:1991-06-18
Applicant: IBM
Inventor: JOHNSON DONALD B , LE AN V , MATYAS STEPHEN M , PRYMAK ROSTISLAW , WILKINS JOHN D
-
公开(公告)号:CA2007409C
公开(公告)日:1998-10-06
申请号:CA2007409
申请日:1990-01-09
Applicant: IBM
Inventor: MATYAS STEPHEN M , ABRAHAM DENNIS G , JOHNSON DONALD B , KARNE RAMESH K , PRYMAK ROSTISLAW , WILKINS JOHN D , MCCORMACK PATRICK J , LE AN V
Abstract: An apparatus and method are disclosed for validating that a cryptographic function requested to be performed with a cryptographic key has been authorized by the originator of the key. The invention is used in a data processing system which processes cryptographic service requests for the performance of cryptographic functions with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The invention includes a cryptographic facility characterized by a secure boundary through which passes an I/O path for receiving a cryptographic key and its associated control vector, and for providing a response thereto, there being included within the boundary a cryptographic processing means coupled to the I/O path and a master key storage coupled to the processing means, for providing a secure location to execute a cryptographic function with the cryptographic key. In accordance with the invention, a first control vector checking means has an input to receive at least a first portion of the associated control vector and to receive a cryptographic service request to perform the cryptographic function with the cryptographic key, for performing a first check of the first portion of the associated control vector to determine if the cryptographic function is authorized to be performed by the cryptographic key. The first control vector checking means has a first authorization output coupled to the cryptographic processing means, for outputting a first authorization signal that the cryptographic function is authorized to be performed by the cryptographic key. Further in accordance with the invention, a second control vector checking means has an input to receive at least a second portion of the associated control vector and to receive a cryptographic service request to perform the cryptographic function with the cryptographic key, for performing a second check of the second portion of the associated control vector to determine if the cryptographic function is authorized to be performed by the cryptographic key. The second control vector checking means has a second authorization output coupled to the cryptographic processing means, for outputting a second authorization signal that the cryptographic function is authorized to be performed by the cryptographic key. The cryptographic processing means initiates the execution of the cryptographic function with the cryptographic key in response to receiving the first and second authorization signals. In this manner, distributed control vector checking operations are enabled for multiprocessing, remote terminal, smart card and multiprogramming applications.
-
公开(公告)号:DE69026034T2
公开(公告)日:1996-10-02
申请号:DE69026034
申请日:1990-10-15
Applicant: IBM
Inventor: MATYAS STEPHEN M , ABRAHAM DENNIS G , JOHNSON DONALD B , LE AN V , PRYMAK ROSTISLAW , WILKINS JOHN D , YEH PHIL C
-
公开(公告)号:DE69119290D1
公开(公告)日:1996-06-13
申请号:DE69119290
申请日:1991-02-26
Applicant: IBM
Inventor: MATYAS STEPHEN M , JOHNSON DONALD B , LE AN V , MARTIN WILLIAM CARL , PRYMAK ROSTISLAW , WILKINS JOHN D
-
公开(公告)号:CA2100234A1
公开(公告)日:1994-04-17
申请号:CA2100234
申请日:1993-07-09
Applicant: IBM
Inventor: ELANDER ROBERT C , HOLLOWAY CHRISTOPHER J , JOHNSON DONALD B , KELLY MICHAEL J , LE AN V , LUBOLD PAUL G , MATYAS STEPHEN M , RANDALL JAMES D , WILKINS JOHN D
Abstract: A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
-
28.
公开(公告)号:CA2071413A1
公开(公告)日:1993-05-01
申请号:CA2071413
申请日:1992-06-17
Applicant: IBM
Inventor: MATYAS STEPHEN M , JOHNSON DONALD B , LE AN V , PRYMAK ROSTISLAW , MARTIN WILLIAM C , ROHLAND WILLIAM S , WILKINS JOHN D
Abstract: Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration vector, for example by loading a new configuration vector, device A will be denied participation in the network. To accomplish this enforcement of the network security policy dictated by the certification center, it is necessary for the certification center to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector. Device A is required to transmit to the certification center a copy of device A's current configuration vector, in an audit record. The certification center then compares device A's copy of the configuration vector with the authorized configuration vector for device A stored at the certification center. If the comparison is satisfactory, then the certification center will issue the requested certificate and will produce a digital signature dSigPRC on a representation of device A's public key PUMa, using the certification center's private certification key PRC. Thereafter, if device A attempts to change its configuration vector, device A's privacy key PRMa corresponding to the certified public key PUMa, will automatically become unavailable for use in communicating in the network.
-
公开(公告)号:CA2036858A1
公开(公告)日:1991-10-10
申请号:CA2036858
申请日:1991-02-21
Applicant: IBM
Inventor: MATYAS STEPHEN M , JOHNSON DONALD B , LE AN V , MARTIN WILLIAM C , PRYMAK ROSTISLAW , WILKINS JOHN D
-
公开(公告)号:CA1124811A
公开(公告)日:1982-06-01
申请号:CA316967
申请日:1978-11-28
Applicant: IBM
Inventor: EHRSAM WILLIAM F , ELANDER ROBERT C , MATYAS STEPHEN M , MEYER CARL H W , SMITH JOHN L , TUCHMAN WALTER L
IPC: H04L9/06 , G06F1/00 , G06F21/00 , G06F21/22 , G09C1/00 , H04L9/08 , H04L9/14 , H04L9/18 , H04L9/02
Abstract: A file security system for data files associated with a host data processing system. The host system includes a data security device which contains a secure host master key and is capable of performing a variety of cryptographic operations. At initialization time, the host system generates a series of file keys for the associated storage media and protects them by enciphering the file keys under a variant of the host master key. When a data file is to be created, a random number is generated and defined as an operational key enciphered under the file key of a designated storage media. The host data security device, using the enciphered file key of the designated storage media, transforms the enciphered operational key under control of the host master key into a form which permits the operational key to be used for enciphering host data. The operational key enciphered under the file key of the designated storage media, as header information, together with the host data enciphered under the operational key is written on the storage media as an enciphered data file. When the data file is recovered, the host data security device, using the enciphered file key of the designated storage media, transforms the enciphered operational key header information under control of the host master key into a form which permits the operational key to be used for deciphering the enciphered data file to obtain the file data in clear form.
-
-
-
-
-
-
-
-
-