Encrypting a digital object based on a key ID selected therefor
First Claim
Patent Images
1. A method of encrypting a digital object comprising:
- selecting a key ID for the digital object;
selecting a function ƒ
( ) having an input and an output;
employing the selected key ID as the input to the function ƒ
( );
employing the output of such function ƒ
( ) as the key (KD) for the digital object;
3 Assignments
0 Petitions
Accused Products
Abstract
To encrypt a digital object, a key ID is selected for the digital object, and a function ƒ( ) having an input and an output is selected. The selected key ID is then employed as the input to the function ƒ( ), and the output of such function ƒ( ) is employed as the key (KD) for the digital object: ƒ(key ID)→key (KD). The digital object is then encrypted according to such key (KD), and the encrypted digital object is distributed.
167 Citations
46 Claims
-
1. A method of encrypting a digital object comprising:
-
selecting a key ID for the digital object;
selecting a function ƒ
( ) having an input and an output;
employing the selected key ID as the input to the function ƒ
( );
employing the output of such function ƒ
( ) as the key (KD) for the digital object;
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of producing a key (KD) for decrypting a digital object, the digital object having been encrypted by:
-
selecting a key ID for the digital object;
selecting a function ƒ
( ) having an input and an output;
employing the selected key ID as the input to the function ƒ
( );
employing the output of such function ƒ
( ) as the key (KD) for the digital object;
- View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of requesting a key (KD) for decrypting a digital object, the digital object having been encrypted by:
-
selecting a key ID for the digital object;
selecting a function ƒ
( ) having an input and an output;
employing the selected key ID as the input to the function ƒ
( );
employing the output of such function ƒ
( ) as the key (KD) for the digital object;
- View Dependent Claims (31, 32, 33)
-
-
34. A method of producing a security key comprising:
-
selecting a key ID for the key;
selecting a function ƒ
( ) having an input and an output;
employing the selected key ID as the input to the function ƒ
( );
employing the output of such function ƒ
( ) as the key;
- View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification