최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0557428 (2014-12-01) |
등록번호 | US-9419951 (2016-08-16) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 3 인용 특허 : 755 |
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identif
A system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it.
1. A system for processing an encrypted message, comprising: a first memory location configured to store an encrypted message associated with a first asymmetric encryption key pair comprising a first public encryption key and a first private encryption key;a second memory location configured to stor
1. A system for processing an encrypted message, comprising: a first memory location configured to store an encrypted message associated with a first asymmetric encryption key pair comprising a first public encryption key and a first private encryption key;a second memory location configured to store a second public encryption key associated with a second asymmetric encryption key pair comprising the second public encryption key and a second private encryption key;at least one automated processor configured to: (a) establish an asymmetric cryptographic session key comprising a first session key and a second session key; and(b) process the encrypted message from a first encrypted form to a second encrypted form, in an integral process substantially without intermediate decryption of the encrypted message to a plaintext message, using a composite key derived at least in part from the first private encryption key, a second public encryption key, and the first session key; anda communication port configured to communicate information to define the at least one asymmetric cryptographic session key, and to communicate the encrypted message in the second encrypted form. 2. The system according to claim 1, wherein the second public encryption key is selected from the group consisting of a Diffie-Hellman type key, a Rivest-Shamir-Adler type key, an elliptic curve key, and an ElGamal key. 3. The system according to claim 1, wherein the first asymmetric encryption key pair and the second asymmetric key pair are each RSA-type key pairs having a common modulus. 4. A method for processing an encrypted message, comprising: storing an encrypted message associated with a first asymmetric encryption key pair comprising a first public encryption key and a first private encryption key;storing a second public encryption key associated with a second asymmetric encryption key pair comprising the second public encryption key and a second private encryption key;establishing an asymmetric cryptographic session key comprising a first session key and a second session key; andprocessing the encrypted message, to convert it from a first encrypted form to a second encrypted form, in an integral process substantially without intermediate decryption of the encrypted message to a plaintext message, using a composite key derived at least in part from the first private encryption key, the second public encryption key, and the first session key, wherein the encrypted message in the second encrypted form is decryptable based on at least the second private encryption key and the second session key. 5. The method according to claim 4, further comprising receiving the first form of the encrypted message. 6. The method according to claim 4, further comprising transmitting the second form of the encrypted message. 7. The method according to claim 6, further comprising processing the second form of the encrypted message to produce a plaintext message. 8. The method according to claim 4, wherein said processing comprises exponentiation of the encrypted message according to modulo arithmetic. 9. The method according to claim 4, wherein the encrypted message comprises an encrypted AES cryptographic key. 10. A method of processing an encrypted message, comprising: receiving an encrypted message in a first encrypted form associated with a first asymmetric encryption key pair comprising a first public encryption key and a first private encryption key by a privileged environment executing on an automated server;defining a second public encryption key associated with a second asymmetric encryption key pair comprising the second public encryption key and a second private encryption key;processing the encrypted message in the first encrypted form to produce an encrypted message in a second encrypted form within the privileged environment executing on the automated server, using information representing individually or in composite at least the second public encryption key, and the first private encryption key, and at least one cryptographic session key, substantially without intermediate availability of a plaintext message corresponding to the encrypted message or information sufficient to decrypt the second encrypted form outside the privileged environment within the automated server; andexternally communicating, from the privileged environment, the encrypted message in the second encrypted form. 11. The method according to claim 10, further comprising communicating the first private encryption key to the privileged environment in an encrypted form, which remains unavailable to the automated server outside of the privileged environment. 12. The method according to claim 10, wherein said processing comprises exponentiating a string with a large relative prime number according to a fixed modulus. 13. The method according to claim 10, wherein the cryptographic session key comprises an AES cryptographic key. 14. The method according to claim 10, wherein at least one of the first asymmetric encryption key pair, the second asymmetric encryption key pair, and the cryptographic session key is defined according to an asymmetric key exchange protocol. 15. The method according to claim 10, further comprising decrypting the second encrypted form to a plaintext message with at least one automated processor outside of the automated server. 16. The method according to claim 10, wherein the automated server is cryptographically shielded from access to plaintext representations of at least two of: the first private encryption key; the second public encryption key; the second private encryption key; and the cryptographic session key. 17. The method according to claim 10, wherein the second public encryption key is selected from the group consisting of a Diffie-Hellman type key, a Rivest-Shamir-Adler type key, an elliptic curve key, and an ElGamal key. 18. The method according to claim 10, wherein the first asymmetric encryption key pair and the second asymmetric key pair are each RSA-type key pairs having a common modulus. 19. The method according to claim 4, wherein the second public encryption key is selected from the group consisting of a Diffie-Hellman type key, a Rivest-Shamir-Adler type key, an elliptic curve key, and an ElGamal key. 20. The method according to claim 4, wherein the first asymmetric encryption key pair and the second asymmetric key pair are each RSA-type key pairs having a common modulus.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.