Encryption system with time-dependent decryption

a technology of encryption system and time-dependent decryption, which is applied in the field of encryption system with time-dependent decryption, can solve the problems that the general certificate cannot be added to the condition for limiting the time during which user a can decrypt data, and the technique does not teach a method for designing a time for enabling decryption of encrypted data

Inactive Publication Date: 2001-12-13
IBM CORP
View PDF0 Cites 79 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a condition for limiting the time during which user A can decrypt data can not be added to the general certificate.
However, this technique does not teach a method for designating a time for enabling decryption of encrypted data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system with time-dependent decryption
  • Encryption system with time-dependent decryption
  • Encryption system with time-dependent decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The preferred embodiment of the present invention will now be described while referring to the drawings. FIG. 5 is a schematic diagram illustrating an example hardware arrangement for a system according to the present invention. A system 100 includes a central processing unit (CPU) 1 and a memory 4. The CPU 1 and the memory 4 communicate across a bus 2 with a hard disk drive 13, which is an auxiliary storage device. A floppy disk drive (or a memory medium driver for an MO or a CD-ROM) 20 is connected to the bus 2 via a floppy disk controller 19.

[0036] A floppy disk (or a memory medium for an MO or a CD-ROM) is inserted into the floppy disk drive (or a memory medium driver for an MO or a CD-ROM) 20. Code for a computer program for accomplishing the present invention can be recorded on the floppy disk or the hard disk drive 13, or in a ROM 14. The computer program, which interacts with an operating system to issue commands to the CPU 1, is loaded into the memory 4 for execution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An object of the invention is to provide an encryption system and method for inhibiting the decryption of encrypted data unless a decryption condition is satisfied. Thus, according to the present invention, in order to provide the encryption system for inhibiting the decryption of encrypted data unless a decryption condition is satisfied, decryption enabled time is designated as a decryption condition, and an encryption system incorporating time-dependent decryption is constituted by a time-key certificate and a time-key certificate manager. A time-key certificate is employed when a third party proves that a public encryption key added to the certificate satisfies the decryption condition. The time-key certificate manager issues a time-key certificate and then manages a decryption key.

Description

[0001] The present invention is directed to the field of encryption. It is more specifically directed to an encryption system.Background Art[0002] An explanation will be given for a difference between the use of a general certificate and the use of a time-key certificate.[0003] The use of a general certificate is shown in FIG. 1. When user B desires to encrypt data (M) and to transmit the encrypted data to user A, user B requests that a certification authority issue a certificate for user A. This certificate includes the name of user A and a public encryption key (KEa) for user A, and also the digital signature of the certification authority for all the contents. User B obtains the certificate for user A and confirms that the certification authority has provided the digital signature for the public encryption key for user A. If the digital signature is correct, user B encrypts the target message M by using the public encryption key (KEa) for user A, and transmits the encrypted messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08G06Q10/00G06Q20/00G06Q20/02G06Q20/06G06Q20/30G06Q20/36G06Q30/06G06Q30/08G06Q40/00G06Q40/02G06Q50/00G06Q50/10G06Q50/34H04L9/32
CPCH04L9/321H04L9/3263H04L9/3297H04L9/3294
Inventor KUDO, MICHIHARUNUMAO, MASAYUKIKAWAZOE, HIROSHI
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products