Public key cryptographic apparatus and method
    1.
    发明授权
    Public key cryptographic apparatus and method 失效
    公钥密码装置及方法

    公开(公告)号:US4218582A

    公开(公告)日:1980-08-19

    申请号:US839939

    申请日:1977-10-06

    CPC classification number: H04L9/30 H04L9/3247 H04L2209/08

    Abstract: A cryptographic system transmits a computationally secure cryptogram that is generated from a publicly known transformation of the message sent by the transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The authorized receiver's transformation is known only by the authorized receiver and is used to generate the transmitter's transformation that is made publicly known. The publicly known transformation uses operations that are easily performed but extremely difficult to invert. It is infeasible for an unauthorized receiver to invert the publicly known transformation or duplicate the authorized receiver's secret transformation to obtain the message sent.

    Abstract translation: 密码系统发送由发射机发送的消息的公知变换产生的计算安全密码; 该密码再次被授权的接收机使用秘密的相互变换来转换,以再现发送的消息。 授权的接收机的转换仅由授权的接收机知道,并用于生成公开的发射机的变换。 公开的转换使用易于执行但非常难以反转的操作。 未经授权的接收方反转公开的转换或复制授权接收方的秘密转换以获取发送的消息是不可行的。

    Software distribution system
    2.
    发明授权
    Software distribution system 失效
    软件分发系统

    公开(公告)号:US4658093A

    公开(公告)日:1987-04-14

    申请号:US512685

    申请日:1983-07-11

    Abstract: Software (programs, videogames, music, movies, etc.) can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit. Authorizations may be sent via telephone line, mail, or whatever form of communication is most suited to the application. Authorizations cannot be reused, for example by recording the telephone authorization signal and replaying it to the base unit. Similarly, authorizations can be made base unit specific, so that an authorization for one base unit cannot be transferred to another base unit. This invention also solves the "software piracy problem" and allows telephone sales of software as additional benefits.

    Abstract translation: 软件(程序,电子游戏,音乐,电影等)可以通过基本单元授权使用给定次数,之后基本单元(计算机,视频游戏基本单元,记录播放器,录像机或视频播放器)不能使用 直到制造商向用户的基本单元发送额外用途的授权。 授权可以通过电话线,邮件或任何形式的通信最适合应用程序发送。 授权不能重复使用,例如通过记录电话授权信号并将其重播到基本单元。 类似地,可以将授权设置为基本单元,使得一个基本单元的授权不能被转移到另一个基本单元。 本发明还解决了“软件盗版问题”,并允许电话销售软件作为额外的好处。

    Authentication using random challenges
    3.
    发明授权
    Authentication using random challenges 失效
    使用随机挑战进行认证

    公开(公告)号:US5872917A

    公开(公告)日:1999-02-16

    申请号:US947053

    申请日:1997-10-08

    CPC classification number: G06F21/31 G06F2211/007 G06F2221/2103

    Abstract: A method is disclosed for authenticating one or both of two parties, for example, a user and a host computer. The first party and second party each know the same password. The first party sends a challenge to the second party. The second party generates and sends to the first party a response based on a first function of the password, the first party's challenge, and an extra value unknown to the first party. The first party, which knows only the length of the extra value, then attempts to match the response by using the same function, password, and challenge by cycling through the possible values for the extra value of known format. A method of bi-directional authentication may be achieved by having the first party return to the second party a response using a different function of the password, a preferably different challenge, and the extra value. The second party already knows the input values, including the extra value, and therefore, does not incur the costs associated with learning the extra value. The identity of the first party is confirmed by matching the transmitted response with a value generated locally.

    Abstract translation: 公开了一种用于认证双方中的一方或两方的方法,例如用户和主计算机。 第一方和第二方都知道相同的密码。 第一方向第二方发出挑战。 第二方根据密码的第一功能,第一方的质询以及第一方未知的额外值生成并发送给第一方响应。 只知道额外值的长度的第一方然后尝试通过循环使用已知格式的额外值的可能值,通过使用相同的功能,密码和挑战来匹配响应。 双向认证的方法可以通过使第一方使用密码的不同功能(优选不同的挑战)和额外的值将响应返回给第二方来实现。 第二方已经知道输入值,包括额外的值,因此不会产生与学习额外值相关的成本。 通过将发送的响应与本地生成的值相匹配来确认第一方的身份。

    Tiered subscription broadcast system
    4.
    发明授权
    Tiered subscription broadcast system 有权
    分层订阅广播系统

    公开(公告)号:US09124375B1

    公开(公告)日:2015-09-01

    申请号:US14148551

    申请日:2014-01-06

    Abstract: A receiver operating in a broadcast system is disclosed that allows a broadcaster to provide multiple tiers of subscription services. By a receiver that can operating at different tiers, a subscriber has the option of listening to fewer (or no) commercials, e.g., by paying a higher fee, or listening to more commercials, e.g., by paying a lower or no fee. Commercials can be demographically targeted, cannot be skipped, and can be audited for billing purposes.

    Abstract translation: 公开了在广播系统中操作的接收机,其允许广播者提供多层订阅服务。 通过能够在不同层次上操作的接收者,用户可以选择收听较少的(或不)广告,例如通过支付更高的费用,或者通过支付较低的费用或不收取费用来收听更多的广告。 商业广告可以针对性地进行定位,不能被跳过,并且可以进行审计以用于计费。

    Cryptographic apparatus and method
    5.
    发明授权
    Cryptographic apparatus and method 失效
    加密设备和方法

    公开(公告)号:US4200770A

    公开(公告)日:1980-04-29

    申请号:US830754

    申请日:1977-09-06

    CPC classification number: H04L9/0844 H04L2209/60

    Abstract: A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal and exchange an initial transformation of the secret signal with the other converser. The received transformation of the other converser's secret signal is again transformed with the receiving converser's secret signal to generate a secure cipher key. The transformations use non-secret operations that are easily performed but extremely difficult to invert. It is infeasible for an eavesdropper to invert the initial transformation to obtain either conversers' secret signal, or duplicate the latter transformation to obtain the secure cipher key.

    Abstract translation: 加密系统通过不安全的通信信道发送计算安全密码,而不预先设置密码密钥。 由交换机从交换的变换信号的变换产生安全密码密钥。 会话者每个都拥有一个秘密信号,并与另一个会话者交换秘密信号的初始变换。 接收到的转接者的秘密信号的接收变换再次用接收转发者的秘密信号进行变换,生成安全密码密钥。 转换使用易于执行但非常难以反转的非秘密操作。 窃听者反转初始转换以获得会话者的秘密信号是不可行的,或者复制后一种转换以获得安全密码密钥。

    Method and apparatus for use in public-key data encryption system
    6.
    发明授权
    Method and apparatus for use in public-key data encryption system 失效
    用于公钥数据加密系统的方法和装置

    公开(公告)号:US4633036A

    公开(公告)日:1986-12-30

    申请号:US615634

    申请日:1984-05-31

    CPC classification number: H04L9/302 H04L9/3249 H04L2209/26

    Abstract: In an encryption scheme based on the use of a public key having secret factors p and q, additional requirements on p and q are invoked in order to ensure a high level of security. In particular, it is additionally required that a value p+1 have a large prime factor r and that the value r-1 also have a large prime factor r'.

    Abstract translation: 在基于使用具有秘密因素p和q的公钥的加密方案中,调用对p和q的附加要求以确保高水平的安全性。 特别地,另外要求值p + 1具有大的素数因子r,并且值r-1也具有大的素数因子r'。

    Exponentiation cryptographic apparatus and method
    7.
    发明授权
    Exponentiation cryptographic apparatus and method 失效
    指数加密装置和方法

    公开(公告)号:US4424414A

    公开(公告)日:1984-01-03

    申请号:US901770

    申请日:1978-05-01

    CPC classification number: H04L9/3013 H04L9/3066

    Abstract: A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

    Abstract translation: 加密系统发送由授权发射机发送的消息的秘密变换产生的计算安全密码; 该密码再次被授权的接收机使用秘密的相互变换来转换,以再现发送的消息。 秘密转换使用仅由授权的发射机和接收机已知的秘密密钥。 转换是通过非易失性操作,取幂进行的,这些操作很容易执行,但非常难以反转。 对于窃听者来说,计算上不可能解决秘密密钥的已知明文密文对,或者反转用于生成密码的非秘密操作。

Patent Agency Ranking