-
公开(公告)号:DE69706867T2
公开(公告)日:2002-04-11
申请号:DE69706867
申请日:1997-07-23
Applicant: IBM
Inventor: JOHNSON BYRON , KARGER ASHLEY , KAUFMAN WILLIAM , MATYAS MICHAEL , SAFFORD ROBERT , YUNG MORDECHAY , ZUNIC NEVENKO
Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.
-
公开(公告)号:DE60025326T2
公开(公告)日:2006-08-31
申请号:DE60025326
申请日:2000-01-26
Applicant: IBM
Inventor: MATYAS MICHAEL , PEYRAVIAN MOHAMMAD
Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.
-
公开(公告)号:DE60025326D1
公开(公告)日:2006-03-30
申请号:DE60025326
申请日:2000-01-26
Applicant: IBM
Inventor: MATYAS MICHAEL , PEYRAVIAN MOHAMMAD
Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.
-
公开(公告)号:DE69706867D1
公开(公告)日:2001-10-25
申请号:DE69706867
申请日:1997-07-23
Applicant: IBM
Inventor: JOHNSON BYRON , KARGER ASHLEY , KAUFMAN WILLIAM , MATYAS MICHAEL , SAFFORD ROBERT , YUNG MORDECHAY , ZUNIC NEVENKO
Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.
-
-
-