1.
    发明专利
    未知

    公开(公告)号:DE69706867T2

    公开(公告)日:2002-04-11

    申请号:DE69706867

    申请日:1997-07-23

    Applicant: IBM

    Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.

    2.
    发明专利
    未知

    公开(公告)号:DE60025326T2

    公开(公告)日:2006-08-31

    申请号:DE60025326

    申请日:2000-01-26

    Applicant: IBM

    Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.

    3.
    发明专利
    未知

    公开(公告)号:DE60025326D1

    公开(公告)日:2006-03-30

    申请号:DE60025326

    申请日:2000-01-26

    Applicant: IBM

    Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.

    4.
    发明专利
    未知

    公开(公告)号:DE69706867D1

    公开(公告)日:2001-10-25

    申请号:DE69706867

    申请日:1997-07-23

    Applicant: IBM

    Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.

Patent Agency Ranking