CA2135631A1 - A Method for Loading and Utilizing a Key in a Secure Transmission Device - Google Patents
A Method for Loading and Utilizing a Key in a Secure Transmission DeviceInfo
- Publication number
- CA2135631A1 CA2135631A1 CA2135631A CA2135631A CA2135631A1 CA 2135631 A1 CA2135631 A1 CA 2135631A1 CA 2135631 A CA2135631 A CA 2135631A CA 2135631 A CA2135631 A CA 2135631A CA 2135631 A1 CA2135631 A1 CA 2135631A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- transmission device
- secure transmission
- stored
- volatile memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
Abstract
An encryption code and at least one key ale provided to a secure transmission device, via an external keying device, and stored in a volatile memory. A user code, entered via a keypad by a user, is received by the secure transmission device. An representation of the at least one key, based on the encryption code and the at least one key, is generated and stored in a non-volatile memory. Also, an encrypted representation of the encryption code and the user code, based on the user code, are generated and stored in the non-volatile memory. Upon power down of the secure transmission device, the at least one key and encryption code stored in the volatile memory are erased.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US037,794 | 1993-03-26 | ||
US08/037,794 US5412721A (en) | 1993-03-26 | 1993-03-26 | Method for loading and utilizing a key in a secure transmission device |
PCT/US1994/002057 WO1994023512A1 (en) | 1993-03-26 | 1994-02-25 | A method for loading and utilizing a key in a secure transmission device |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2135631A1 true CA2135631A1 (en) | 1994-10-13 |
CA2135631C CA2135631C (en) | 1999-01-26 |
Family
ID=21896380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002135631A Expired - Fee Related CA2135631C (en) | 1993-03-26 | 1994-02-25 | A method for loading and utilizing a key in a secure transmission device |
Country Status (5)
Country | Link |
---|---|
US (1) | US5412721A (en) |
AU (1) | AU662685B2 (en) |
CA (1) | CA2135631C (en) |
GB (1) | GB2282036B (en) |
WO (1) | WO1994023512A1 (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5457748A (en) * | 1992-11-30 | 1995-10-10 | Motorola, Inc. | Method and apparatus for improved security within encrypted communication devices |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5559889A (en) * | 1995-03-31 | 1996-09-24 | International Business Machines Corporation | System and methods for data encryption using public key cryptography |
US6628786B1 (en) * | 1997-09-30 | 2003-09-30 | Sun Microsystems, Inc. | Distributed state random number generator and method for utilizing same |
US6496930B1 (en) * | 1997-12-18 | 2002-12-17 | Matsushita Electric Industrial Co., Ltd. | Message receiving apparatus and message transmitting apparatus |
US20010044901A1 (en) * | 1998-03-24 | 2001-11-22 | Symantec Corporation | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption |
US6480096B1 (en) * | 1998-07-08 | 2002-11-12 | Motorola, Inc. | Method and apparatus for theft deterrence and secure data retrieval in a communication device |
JP3414352B2 (en) * | 2000-02-03 | 2003-06-09 | 日本電気株式会社 | Wireless terminal, information processing system and external processing terminal |
EP1146685B1 (en) * | 2000-04-12 | 2004-01-14 | Matsushita Electric Industrial Co., Ltd. | Decryption device |
US7197638B1 (en) * | 2000-08-21 | 2007-03-27 | Symantec Corporation | Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection |
JP2002124960A (en) * | 2000-10-16 | 2002-04-26 | Link Evolution Corp | Communication device, communication system, and communication method |
US6941456B2 (en) * | 2001-05-02 | 2005-09-06 | Sun Microsystems, Inc. | Method, system, and program for encrypting files in a computer system |
US7925013B1 (en) | 2003-06-30 | 2011-04-12 | Conexant Systems, Inc. | System for data encryption and decryption of digital data entering and leaving memory |
US7577996B1 (en) * | 2004-02-06 | 2009-08-18 | Extreme Networks | Apparatus, method and system for improving network security |
US7823199B1 (en) | 2004-02-06 | 2010-10-26 | Extreme Networks | Method and system for detecting and preventing access intrusion in a network |
US20090249085A1 (en) * | 2004-06-29 | 2009-10-01 | Nagracard S.A. | Security module and personalization method for such a security module |
US7421589B2 (en) * | 2004-07-21 | 2008-09-02 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval |
JP4933946B2 (en) * | 2007-04-18 | 2012-05-16 | 株式会社日立製作所 | External storage device and information leakage prevention method |
US8583915B1 (en) * | 2007-05-31 | 2013-11-12 | Bby Solutions, Inc. | Security and authentication systems and methods for personalized portable devices and associated systems |
US20100005317A1 (en) * | 2007-07-11 | 2010-01-07 | Memory Experts International Inc. | Securing temporary data stored in non-volatile memory using volatile memory |
US9940484B2 (en) * | 2014-12-23 | 2018-04-10 | Intel Corporation | Techniques for detecting false positive return-oriented programming attacks |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4418275A (en) * | 1979-12-07 | 1983-11-29 | Ncr Corporation | Data hashing method and apparatus |
US4520232A (en) * | 1982-04-30 | 1985-05-28 | Wilson William J | Polygraphic encryption-decryption system |
US4972472A (en) * | 1985-03-15 | 1990-11-20 | Tandem Computers Incorporated | Method and apparatus for changing the master key in a cryptographic system |
US4797928A (en) * | 1987-01-07 | 1989-01-10 | Miu Automation | Encryption printed circuit board |
US5008938A (en) * | 1990-03-09 | 1991-04-16 | Motorola, Inc. | Encryption apparatus |
-
1993
- 1993-03-26 US US08/037,794 patent/US5412721A/en not_active Expired - Lifetime
-
1994
- 1994-02-25 WO PCT/US1994/002057 patent/WO1994023512A1/en active Application Filing
- 1994-02-25 AU AU64425/94A patent/AU662685B2/en not_active Ceased
- 1994-02-25 GB GB9422583A patent/GB2282036B/en not_active Expired - Fee Related
- 1994-02-25 CA CA002135631A patent/CA2135631C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
GB2282036B (en) | 1997-02-05 |
AU662685B2 (en) | 1995-09-07 |
GB2282036A (en) | 1995-03-22 |
CA2135631C (en) | 1999-01-26 |
WO1994023512A1 (en) | 1994-10-13 |
GB9422583D0 (en) | 1995-01-04 |
AU6442594A (en) | 1994-10-24 |
US5412721A (en) | 1995-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2134974A1 (en) | A Method for Loading Encryption Keys Into Secure Transmission Devices | |
CA2135631A1 (en) | A Method for Loading and Utilizing a Key in a Secure Transmission Device | |
CA2195406A1 (en) | Electronic combination lock security system | |
WO1998019493A3 (en) | Authentication key management for mobile stations | |
CA2291435A1 (en) | Encryption/decryption method and authentication method using multiple-affine key system and apparatuses using the same | |
AU1375999A (en) | Cryptographic key generation using biometric data | |
SG60121A1 (en) | Portable point-of-sale terminal with device for inputting security code access key | |
EP0657823A3 (en) | Memory access protection circuit with encryption key. | |
CA2253539A1 (en) | A method for providing a secure non-reusable one-time password | |
AU1898097A (en) | Enciphering method, deciphering method and certifying method | |
HUP0100651A2 (en) | Method for recording of encrypted digital data, recording device and decoder for the application in the advised method, further portable security module for the application in the recording device and decoder | |
EP1073200A3 (en) | Minimal function remote and control without digit keys and with a channel rotation program | |
CA2272921A1 (en) | Method of processing encrypted video data for generating decrypted program data | |
EP0576224A3 (en) | Cryptographic key management apparatus and method. | |
AU1732597A (en) | Communication method using common cryptographic key | |
NZ500201A (en) | Downloading data to an MPEG receiver/decoder | |
AU1680395A (en) | Cryptographic system and method with key escrow feature | |
EP0623427A3 (en) | Power tools and hammer mechanisms therefor. | |
CA2256632A1 (en) | An adaptive decoding system for processing encrypted and non-encrypted video data | |
CA2133743A1 (en) | Electronic Security System | |
AU8577898A (en) | Verification of authenticity of goods by use of random numbers | |
CA2133192A1 (en) | Authentication key entry in cellular radio system | |
AU6706794A (en) | Portable radio battery latch | |
AU7414796A (en) | Method of protecting cellular radio terminal against fraudulent use | |
GB9503738D0 (en) | Cryptographic key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |