Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Johnson; Donald B.
Address:
Manassas, VA
No. of patents:
38
Patents:












Patent Number Title Of Patent Date Issued
8233617 Resilient cryptographic scheme July 31, 2012
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm
8116451 Key validation scheme February 14, 2012
A system and method for validating digital information transmitted by one correspondent to another in a data communication system. The method comprising the steps of generating a public key in accordance with a predetermined, generating a public key in accordance with a predetermined
7996676 Masked digital signatures August 9, 2011
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a
7930549 Accelerated signature verification on an elliptic curve April 19, 2011
A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to
7797539 Resilient cryptographic scheme September 14, 2010
A method for communicating information between at least a pair of correspondents, the method comprising the steps of each of the correspondents selecting a plurality of cryptographic algorithms known to each of the correspondents. One of the correspondents applies the algorithms in a
7567669 Strengthened public key protocol July 28, 2009
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public
7552329 Masked digital signatures June 23, 2009
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a
7415611 Accelerated signature verification on a elliptic curve August 19, 2008
A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to
7260723 Masked digital signatures August 21, 2007
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a
7215773 Key validation scheme May 8, 2007
A method of providing improved security in a communication system used to transfer information between at least a pair of correspondents. The communication between the correspondents generally comprises steps of generating key pairs in accordance with the arithmetic properties of a c
7036015 Verification protocol April 25, 2006
A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key.The long term key is applied to one of the signature components to reveal the short term
6446207 Verification protocol September 3, 2002
A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key.The long term key is applied to one of the signature components to reveal the short term key.
6424712 Accelerated signature verification on an elliptic curve July 23, 2002
A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to
6337909 Generation of session keys for El Gamal-like protocols from low hamming weight integers January 8, 2002
The public key, either short term "session" key or long term key, is generated by combining a pair of components. A first component is obtained by utilizing an integer with a relatively low Hamming weight as an exponent to facilitate exponentiation. The second component is a precompu
6301362 Method and apparatus for cryptographically transforming an input block into an output block October 9, 2001
A method and apparatus for cryptographically transforming an input block into an output block. The input block has a first block size and is partitionable into a plurality of input subblocks having a second block size that is a submultiple of the first block size. To encrypt or decrypt,
6279110 Masked digital signatures August 21, 2001
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as `smart cards`. This invention describes a method for creating and authenticating a dig
6195433 Private key validity and validation February 27, 2001
A method of generating a private key for use in a public key data communication system implemented between a pair of correspondents is disclosed. The method comprises the steps of generating a random number for use as a private key and testing the number against a predetermined set o
6078667 Generating unique and unpredictable values June 20, 2000
An integer for a private key is generated utilising a pair of components that are combined in a fixed predictable manner. The first component is generated from a sequencer such as a counter that generates non-repeating distinct value and the second component is generated in a random mann
5432849 Secure cryptographic operations using control vectors generated inside a cryptographic facility July 11, 1995
The invention described herein suggests methods of cryptographic key management based on control vectors in which the control vectors are generated or derived internal to a cryptographic facility implementing a set of cryptographic operations. The methods of alternate control vector
5414833 Network security system and method using a parallel finite state machine adaptive active monitor May 9, 1995
A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administrat
5323464 Commercial data masking June 21, 1994
A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electro
5319705 Method and system for multimedia access control enablement June 7, 1994
A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employ
5301231 User defined function facility April 5, 1994
In a cryptographic module, a User Defined Function (UDF) facility is provided which provides users with the capability of defining and creating custom functions to meet their cryptographic processing needs. The cryptographic module is contained within a physically and logically secure
5265164 Cryptographic facility environment backup/restore and replication in a public key cryptosystem November 23, 1993
A computer apparatus, program and method function in a data processing system to replicate a cryptographic facility. The system includes a first cryptographic facility containing a portable part which personalizes the first cryptographic facility. The system also includes a second cr
5214698 Method and apparatus for validating entry of cryptographic keys May 25, 1993
A cryptographic facility implements a multiple key part import procedure. The installation manager can verify that a key part has been correctly entered and has not been compromised. The security requirement for the procedure is that no single party can subvert the system security by
5201000 Method for generating public and private key pairs without using a passphrase April 6, 1993
A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the
5200999 Public key cryptosystem key management based on control vectors April 6, 1993
A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and
5177791 Secure translation of usage-control values for cryptographic keys January 5, 1993
A working key of a certain key type is to be transmitted from a first system (having a first usage-control value associated with keys of the certain type) and a second system (having a second usage-control value associated with keys of the certain type). A translation control value,
5164988 Method to establish and enforce a network cryptographic security policy in a public key cryptosy November 17, 1992
Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in i
5142578 Hybrid public key algorithm/data encryption algorithm key distribution method based on control v August 25, 1992
The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorit
5103478 Secure management of keys using control vectors with multi-path checking April 7, 1992
A requested cryptographic function is validated for performance in conjunction with a cryptographic key, by inputting a first portion of an associated control vector into a first control vector checker, which outputs a first authorization signal if the requested cryptographic functio
5073934 Method and apparatus for controlling the use of a public key, based on the level of import integ December 17, 1991
A method and apparatus in a public crypto system, control the use of a public key, based on the level of import integrity for the public key. The method and apparatus generate a control vector associated with the public key, having a history field. The public key and the control vector a
5007089 Secure key management using programable control vector checking April 9, 1991
The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the crypto
4993069 Secure key management using control vector translation February 12, 1991
A cryptographic system and method is provided which accepts a key K encrypted under a key formed by exclusive-ORing a key-encrypting key KK with a first control vector C5 and outputs the same key K encrypted under a key formed by exclusive-ORing KK with a second control vector C6. The
4941176 Secure management of keys using control vectors July 10, 1990
The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which p
4924515 Secure management of keys using extended control vectors May 8, 1990
A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originat
4924514 Personal identification number processing using control vectors May 8, 1990
Cryptographic PIN processing is achieved in an improved manner by associating control vectors with the PIN generating (verification) keys and PIN encrypting keys which provide authorization for the uses of the keys intended by the originator of the keys. The originator may be the loc
4918728 Data cryptography operations using control vectors April 17, 1990
Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption










 
 
  Recently Added Patents
Process for the enzymatic reduction of enoates
Feedback method and processing system for policy installation failures
Cartridge for conducting a chemical reaction
Automated dynamic differential data processing
Multi-bank queuing architecture for higher bandwidth on-chip memory buffer
Consistent retention and disposition of managed content and associated metadata
Method and device for reliable estimation of network traffic
  Randomly Featured Patents
Process and arrangement for the production of a signal that corresponds to the opening status of the vocal cords of the larynx
2-Phenoxypyrimidine derivative and herbidical composition
Baseplate for paper cutter
Method and circuit of high performance variable length coding and decoding for image compression
Isoxazoline and isoxazole fibrinogen receptor antagonists
Tire tread
Dry fractionation method for fat
Tertiary butyl acetate recovery
Photosensitive composition, method for forming pattern, and method for manufacturing semiconductor device
Tone recording method using ink jet recording head that records pixels using a plurality of liquid droplets