Browse Prior Art Database

non-repudiation data distribution system

IP.com Disclosure Number: IPCOM000033935D
Original Publication Date: 2005-Jan-06
Included in the Prior Art Database: 2005-Jan-06
Document File: 1 page(s) / 39K

Publishing Venue

IBM

Abstract

This system enable non-repudition by users in data distribution system which distribute data using digital data media like a CD-ROM. This system is, 1. When a key is leaked, there is no risk to leak data on CD-ROM since original key is encrypted by User ID, PC ID and date. 2. There is no risk to leak data since data on CD-ROM are encrypted. 3. Data can not decrypted without user authentication which is requested when user request a key, then non-repudition is achieved.. 4. Decrypted data is traceable by digital watermarking since system does digital watermarking during decrypted data..

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 87% of the total text.

Page 1 of 1

non-repudiation data distribution system

The following figure shows the flow of this system Step1. CD-ROM data are encrypted by a key.The key itself is never distributed in original format. It is only distributed after encrypted using PC ID, User ID and date as a encryption key in step2.

Step 2. When user request a key and the user is authenticated by this system. The key is encrypted by PC ID, User ID, and date, and passed encrypted key to user. Then, user can not know original key. And, encrypted key can not use without user's credential who get the key.

Step3. When decrypting data, digital watermarking is performed using User ID, PC ID and date. Then, data are traceable when they are leaked.

non-repudiation data distribution system

Encrypt data.

Distribute CDROM s

In t e r n e t

Users

Authentication

PC IDUser ID

Issue key which encrypted by date/ID of PC)

Identify Users who will used the key. And, pass the encrypted key

1. Insert CDROM into CDROM drive 2. Input User ID.
3. Request key with date and PC ID.

Key

Local

1. Input PC ID and date for getting key.
2. Decryption

Decrypted data

CDROM

Input PC ID, User ID and date into decrypted data by using Digital W atermarking.

Encrypted data

Then, there are the following benefits by this system.

1. When a key is leaked, there is no risk to leak data on CD-ROM since original key is encrypted by User ID, PC ID and date.
2. There is no risk to leak data since data on CD-ROM are encrypted.
3. Data can no...