**Patent Number** |
**Title Of Patent** |
**Date Issued** |

8233617 |
Resilient cryptographic scheme |
July 31, 2012 |

A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm |

8116451 |
Key validation scheme |
February 14, 2012 |

A system and method for validating digital information transmitted by one correspondent to another in a data communication system. The method comprising the steps of generating a public key in accordance with a predetermined, generating a public key in accordance with a predetermined |

7996676 |
Masked digital signatures |
August 9, 2011 |

The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a |

7930549 |
Accelerated signature verification on an elliptic curve |
April 19, 2011 |

A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to |

7797539 |
Resilient cryptographic scheme |
September 14, 2010 |

A method for communicating information between at least a pair of correspondents, the method comprising the steps of each of the correspondents selecting a plurality of cryptographic algorithms known to each of the correspondents. One of the correspondents applies the algorithms in a |

7567669 |
Strengthened public key protocol |
July 28, 2009 |

A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public |

7552329 |
Masked digital signatures |
June 23, 2009 |

The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a |

7415611 |
Accelerated signature verification on a elliptic curve |
August 19, 2008 |

A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to |

7260723 |
Masked digital signatures |
August 21, 2007 |

The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a |

7215773 |
Key validation scheme |
May 8, 2007 |

A method of providing improved security in a communication system used to transfer information between at least a pair of correspondents. The communication between the correspondents generally comprises steps of generating key pairs in accordance with the arithmetic properties of a c |

7036015 |
Verification protocol |
April 25, 2006 |

A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key.The long term key is applied to one of the signature components to reveal the short term |

6446207 |
Verification protocol |
September 3, 2002 |

A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key.The long term key is applied to one of the signature components to reveal the short term key. |

6424712 |
Accelerated signature verification on an elliptic curve |
July 23, 2002 |

A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to |

6337909 |
Generation of session keys for El Gamal-like protocols from low hamming weight integers |
January 8, 2002 |

The public key, either short term "session" key or long term key, is generated by combining a pair of components. A first component is obtained by utilizing an integer with a relatively low Hamming weight as an exponent to facilitate exponentiation. The second component is a precompu |

6301362 |
Method and apparatus for cryptographically transforming an input block into an output block |
October 9, 2001 |

A method and apparatus for cryptographically transforming an input block into an output block. The input block has a first block size and is partitionable into a plurality of input subblocks having a second block size that is a submultiple of the first block size. To encrypt or decrypt, |

6279110 |
Masked digital signatures |
August 21, 2001 |

The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a dig |

6195433 |
Private key validity and validation |
February 27, 2001 |

A method of generating a private key for use in a public key data communication system implemented between a pair of correspondents is disclosed. The method comprises the steps of generating a random number for use as a private key and testing the number against a predetermined set o |

6078667 |
Generating unique and unpredictable values |
June 20, 2000 |

An integer for a private key is generated utilising a pair of components that are combined in a fixed predictable manner. The first component is generated from a sequencer such as a counter that generates non-repeating distinct value and the second component is generated in a random mann |

5432849 |
Secure cryptographic operations using control vectors generated inside a cryptographic facility |
July 11, 1995 |

The invention described herein suggests methods of cryptographic key management based on control vectors in which the control vectors are generated or derived internal to a cryptographic facility implementing a set of cryptographic operations. The methods of alternate control vector |

5414833 |
Network security system and method using a parallel finite state machine adaptive active monitor |
May 9, 1995 |

A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administrat |

5323464 |
Commercial data masking |
June 21, 1994 |

A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electro |

5319705 |
Method and system for multimedia access control enablement |
June 7, 1994 |

A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employ |

5301231 |
User defined function facility |
April 5, 1994 |

In a cryptographic module, a User Defined Function (UDF) facility is provided which provides users with the capability of defining and creating custom functions to meet their cryptographic processing needs. The cryptographic module is contained within a physically and logically secure |

5265164 |
Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
November 23, 1993 |

A computer apparatus, program and method function in a data processing system to replicate a cryptographic facility. The system includes a first cryptographic facility containing a portable part which personalizes the first cryptographic facility. The system also includes a second cr |

5214698 |
Method and apparatus for validating entry of cryptographic keys |
May 25, 1993 |

A cryptographic facility implements a multiple key part import procedure. The installation manager can verify that a key part has been correctly entered and has not been compromised. The security requirement for the procedure is that no single party can subvert the system security by |

5201000 |
Method for generating public and private key pairs without using a passphrase |
April 6, 1993 |

A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the |

5200999 |
Public key cryptosystem key management based on control vectors |
April 6, 1993 |

A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and |

5177791 |
Secure translation of usage-control values for cryptographic keys |
January 5, 1993 |

A working key of a certain key type is to be transmitted from a first system (having a first usage-control value associated with keys of the certain type) and a second system (having a second usage-control value associated with keys of the certain type). A translation control value, |

5164988 |
Method to establish and enforce a network cryptographic security policy in a public key cryptosy |
November 17, 1992 |

Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in i |

5142578 |
Hybrid public key algorithm/data encryption algorithm key distribution method based on control v |
August 25, 1992 |

The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorit |

5103478 |
Secure management of keys using control vectors with multi-path checking |
April 7, 1992 |

A requested cryptographic function is validated for performance in conjunction with a cryptographic key, by inputting a first portion of an associated control vector into a first control vector checker, which outputs a first authorization signal if the requested cryptographic functio |

5073934 |
Method and apparatus for controlling the use of a public key, based on the level of import integ |
December 17, 1991 |

A method and apparatus in a public crypto system, control the use of a public key, based on the level of import integrity for the public key. The method and apparatus generate a control vector associated with the public key, having a history field. The public key and the control vector a |

5007089 |
Secure key management using programable control vector checking |
April 9, 1991 |

The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the crypto |

4993069 |
Secure key management using control vector translation |
February 12, 1991 |

A cryptographic system and method is provided which accepts a key K encrypted under a key formed by exclusive-ORing a key-encrypting key KK with a first control vector C5 and outputs the same key K encrypted under a key formed by exclusive-ORing KK with a second control vector C6. The |

4941176 |
Secure management of keys using control vectors |
July 10, 1990 |

The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which p |

4924515 |
Secure management of keys using extended control vectors |
May 8, 1990 |

A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originat |

4924514 |
Personal identification number processing using control vectors |
May 8, 1990 |

Cryptographic PIN processing is achieved in an improved manner by associating control vectors with the PIN generating (verification) keys and PIN encrypting keys which provide authorization for the uses of the keys intended by the originator of the keys. The originator may be the loc |

4918728 |
Data cryptography operations using control vectors |
April 17, 1990 |

Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption |