-
公开(公告)号:EP0725512A3
公开(公告)日:1998-07-15
申请号:EP96300340
申请日:1996-01-17
Applicant: IBM
CPC classification number: H04L9/0822
Abstract: A data communications system is described in which messages are processed using public key cryptography with a private key unique to one or more users (150) under the control of a portable security device (120), such as a smart card, held by each user, the system comprising: a server (130) for performing public key processing using the private key. The server (130) stores, or has access to, the private key for the, or each, user in encrypted form only. The private key is encrypted with a key encrypting key and each security device (120) comprises means for storing or generating the key encrypting key and providing the key encrypting key to the server (130). The server comprises secure means (360) to retrieve the encrypted private key for the user, decrypt the private key using the key encrypting key, perform the public key processing using the decrypted private key, and delete the decrypted private key after use.
-
公开(公告)号:ES2254131T3
公开(公告)日:2006-06-16
申请号:ES00901220
申请日:2000-01-26
Applicant: IBM
Inventor: MATYAS STEPHEN MICHAEL JR , PEYRAVIAN MOHAMMAD
Abstract: Un método para transmitir de manera segura muestras de datos biométricos desde un cliente (110) a un servidor (112), caracterizado por las operaciones de: realizar (320, 336) muestreo, dependiente de la clave, de una característica biométrica en el cliente para generar de ese modo muestras de datos biométricos dependientes de la clave; y transmitir (340) las muestras de datos biométricos dependientes de la clave desde el cliente al servidor; en el que la operación de realizar comprende los pasos de: muestrear la característica biométrica a una frecuencia de muestreo que es una función de una clave para obtener datos biométricos muestreados; y aplicar la clave a los datos biométricos muestreados para generar con ello las muestras de datos biométricos dependientes de la clave.
-
公开(公告)号:PL364730A1
公开(公告)日:2004-12-13
申请号:PL36473000
申请日:2000-01-26
Applicant: IBM
Inventor: MATYAS STEPHEN MICHAEL JR , PEYRAVIAN MOHAMMAD
Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.
-
公开(公告)号:DE69739887D1
公开(公告)日:2010-07-08
申请号:DE69739887
申请日:1997-02-06
Applicant: IBM
Inventor: JOHNSON DONALD BYRON , MATYAS STEPHEN MICHAEL JR
-
公开(公告)号:HU225077B1
公开(公告)日:2006-06-28
申请号:HU9902892
申请日:1997-07-23
Applicant: IBM
Inventor: JOHNSON DONALD BYRON , KARGER PAUL ASHLEY , KAUFMAN CHARLES WILLIAM JR , MATYAS STEPHEN MICHAEL JR , SAFFORD DAVID ROBERT , YUNG MARCEL MORDECHAY , ZUNIC NEVENKO
Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.
-
公开(公告)号:AT315293T
公开(公告)日:2006-02-15
申请号:AT00901220
申请日:2000-01-26
Applicant: IBM
Inventor: MATYAS STEPHEN MICHAEL JR , PEYRAVIAN MOHAMMAD
Abstract: Key-dependent sampling of a biometric characteristic is performed at a client, to thereby generate key-dependent biometric data samples. The key-dependent biometric data samples are then transmitted from the client to a server. By sampling the biometric characteristic at the client in a key-dependent manner, the key-dependent biometric data samples may be transmitted from the client to the server without the need for additional encryption and/or a signature. A key is preferably transmitted from the server to the client. The key is then used to perform the key-dependent sampling of the biometric characteristic at the client. The key-dependent sampling may be performed by sampling the biometric characteristic at a sampling frequency that is a function of the key. Alternatively, the key can be applied to the sampled biometric data, to thereby generate the key-dependent biometric data samples that are a function of the key. The key is preferably used to perform nonlinear key-dependent sampling of the biometric characteristic at the client, for example by using the key to determine the sampling frequency and also using the key to apply a nonlinear function to the sampled biometric data. Further encryption of the biometric data and/or the use of a signature with the biometric data need not be performed.
-
公开(公告)号:PL331313A1
公开(公告)日:1999-07-05
申请号:PL33131397
申请日:1997-07-23
Applicant: IBM
Inventor: JOHNSON DONALD BYRON , KARGER PAUL ASHLEY , KAUFMAN CHARLES WILLIAM JR , MATYAS STEPHEN MICHAEL JR , SAFFORD DAVID ROBERT , YUNG MARCEL MORDECHAY , ZUNIC NEVENKO
Abstract: The method for providing for recovery of a cryptographic key using a number of cooperating key recovery agents comprises generating a number of shared key recovery values such that the key may be regenerated from the shared key recovery values without requiring additional non-public information. The shared recovery values are made available to the key recovery agents to enable recovery of the key. A pair of communicating parties use the cryptographic key to communicate, and the key is set by one party and sent to the ther one. Alternatively the key may be set by both parties acting together.
-
-
-
-
-
-