ReturnTo Theme-Group-Choice | Onelevelup |
(Not Translated)
5J104 | Ciphering device, decoding device and privacy communication | |
G09C1/00 -5/00;H04K1/00-3/00;H04L9/00-9/40 |
G09C1/00-5/00;H04K1/00-3/00;H04L9/00-9/04 | AA | AA00 PURPOSE OR EFFECT |
AA01 | AA02 | AA03 | AA04 | AA05 | AA06 | AA07 | AA08 | AA09 | AA10 |
. Secret communication or privacy communication | . Secret protection by means other than the ciphering | . . by changing communication paths | . . Detection of eavesdropping or prevention of eavesdropping | . . . by using quantum mechanics | . Proof | . . Entity authentication (user authentication or terminal authentication) | . . Message authentication (prevention of data alteration) | . . . Electronic signature | . . Delivery certificate | |||
AA11 | AA12 | AA13 | AA14 | AA15 | AA16 | AA17 | AA18 | AA19 | AA20 | |||
. . Time stamp | . Detection or prevention of unauthorised use of data | . . Prevention of copying or detection of copying | . . Electronic watermarking | . . Copyright notices | . Management of security information | . Secret computation | . Improvement of arithmetic operations e.g. speeding-up efficiency or simplification | . . by conforming the data length to CPUs | . . Parallelization or pipelining | |||
AA21 | AA22 | AA23 | AA24 | AA25 | AA26 | AA27 | AA28 | AA29 | AA30 | |||
. . relating to operations on integral residue class rings | . . . relating to modulo exponentiation operations | . . relating to prime number generation | . . relating to prime number decision | . . relating to operations on algebraic curves | . Censorship | . Measures against failures accidents or transmission errors | . . Transmission error detection | . . . Transmission error correction | . . Detection of cipher step-out | |||
AA31 | AA32 | AA33 | AA34 | AA35 | AA36 | AA37 | AA38 | AA39 | AA40 | |||
. . . Restoration from the cipher step-out | . Controls of ciphering devices | . . Switching controls between ciphering and non-ciphering | . . Changing of cipher keys | . . . Automatic selection of cipher keys | . Adjustments of cipher intensity | . . Adjustments according to secret levels | . . Adjustment of a length of cipher keys or passwords | . . Plain texts slightly understandable without cipher keys | . Cryptanalysis or cipher-breakings | |||
AA41 | AA42 | AA43 | AA44 | AA45 | AA46 | AA47 | AA48 | AA49 | ||||
. Measures against cipher-breakings | . . Cipher-breakings specially adapted for broadcast communications | . . Cipher-breakings using properties of cipher keys | . Measures against physical attacks for breaking secrecy | . . Measures against disassembly or destructive attacks on apparatuses | . . Measures against attacks without disassembling or destroying apparatuses | . . . Measures against attacks from connection terminals | . Jamming of communication | . Measures against jamming of communication | ||||
BA | BA00 COMMUNICATION CONFIGURATIONS |
BA01 | BA02 | BA03 | BA04 | BA05 | BA06 | BA07 | ||||
. Exchanges | . Relays | . Broadcasts or broadcast communications | . Multiplex communications | . . Frequency-division multiplexing | . . Time-division multiplexing | . . Code-division multiplexing | ||||||
CA | CA00 OBJECTS OF CIPHER TRANSFORMATIONS |
CA01 | CA02 | CA03 | CA04 | |||||||
. Transmission control information | . Only a part of information to be transmitted | . . Only specific frequency regions | . . Only specific bits | |||||||||
DA | DA00 SELECTION OF CIPHER ALGORITHMS OR CIPHER KEYS |
DA01 | DA02 | DA03 | DA04 | DA05 | ||||||
. based on position information of entities | . based on authority e.g. access levels | . based on communication partners | . based on data | . based on communication records | ||||||||
EA | EA00 MANAGEMENT OF SECURITY INFORMATION |
EA01 | EA02 | EA03 | EA04 | EA05 | EA06 | EA07 | EA08 | EA09 | EA10 | |
. Centralised management at centres | . Distributed management | . Password managements | . Cipher key managements | . . Authentic certification of public keys | . . Hierarchical key management | . . . having three or more levels | . Prevention of leakage or fraudulent use of security information | . . incapacitating erasing or use of security information | . . Alteration prevention of security information | |||
EA11 | EA12 | EA13 | EA14 | EA15 | EA16 | EA17 | EA18 | EA19 | EA20 | |||
. Measures against loss or oblivion of security information | . . Commission or deposition | . . Divided or distributed holdings | . . Use of the information which facilitates memorisation of users | . Delivery or production of security information | . . Delivery; transmission of shared information per se | . . . ciphering and delivering security information | . . . . using symmetric cipher systems for ciphering | . . . . using asymmetric cipher systems for ciphering | . . . using dedicated media | |||
EA21 | EA22 | EA23 | EA24 | EA25 | EA26 | EA27 | EA28 | EA29 | EA30 | |||
. . . . using secure communication paths | . . . . using recording media such as cards | . . Generation; shared information per se without transmission | . . . requiring preliminary communications | . . . without requiring preliminary communications | . . . utilising ID information | . . characterised by groups defining algebraic systems | . . . defined by integral residue class rings | . . . defined by algebraic curves on finite fields | . . . . defined by elliptic curves on the finite fields | |||
EA31 | EA32 | EA33 | ||||||||||
. . characterised by the basis of security | . . . Factorisation problems as the basis of security | . . . Discrete logarithm problems as the basis of security | ||||||||||
FA | FA00 GENERATION OF RANDOM NUMBER SEQUENCE |
FA01 | FA02 | FA03 | FA04 | FA05 | FA06 | FA07 | FA08 | FA09 | FA10 | |
. using a LFSR | . . changeable tap locations | . . changeable number of register steps | . . using a plurality of LFSRs | . . using nonlinear transformation | . using block ciphers | . using one-way functions | . using chaos sequences | . reading recorded random number sequences | . by natural random numbers | |||
GA | GA00 GENERATION OF UNREPRODUCIBLE INFORMATION |
GA01 | GA02 | GA03 | GA04 | GA05 | ||||||
. using natural fluctuations | . using fluctuations resulting from artificial manipulation | . using time information | . being used for seeding for pseudo-random number generation | . being used for authentication | ||||||||
HA | HA00 ANALOGUE PRIVATE COMMUNICATION METHOD |
HA01 | HA02 | HA03 | HA04 | HA05 | HA06 | HA07 | HA08 | HA09 | HA10 | |
. processing on time-axis | . . by polarity reversal | . . by analogue addition | . processing on frequency-axis | . . Spectrum-division processing | . . . by reversal of divided spectra | . . . by replacement of divided spectra | . . . changing dividing positions | . . . by frequency transformations and filtering | . . by reversal of entire spectra | |||
HA11 | HA12 | HA13 | HA14 | HA15 | HA16 | |||||||
. . . changing a spectrum position according to the length of time | . . . for controlling reversal or non-reversal | . . by shift of entire spectra | . . . changing spectrum positions according to the length of time | . . by a Fourier transform or an inverse Fourier transform | . . filtering after amplitude modulation | |||||||
JA | JA00 CIPHER SYSTEMS INCLUDING ONE-WAY FUNCTIONS |
JA01 | JA02 | JA03 | JA04 | JA05 | JA06 | JA07 | JA08 | JA09 | JA10 | |
. undecodable e.g. one-way functions | . cipher or decoding functions being one-to-many functions | . Symmetric cipher systems e.g. common key cipher systems | . . synthesising random number sequences and plain text sequences sequentially | . . . Synchronous stream cipher | . . . Self-synchronisation-type stream cipher | . . repeating substitution and transposition alternately | . . . variable in number of steps | . . . Feistel type ciphers | . . . . L-type | |||
JA11 | JA12 | JA13 | JA14 | JA15 | JA16 | JA17 | JA18 | JA19 | JA20 | |||
. . . . R-type | . . . . B-type | . . . . . DES | . . . . . FEAL | . . . . using table search for nonlinear functions | . . . . not using table search for nonlinear functions | . . . . characterised by composite operation of Feistel ciphers | . . . . . a composite operation being an exclusive OR | . . Affine ciphers | . . using chaos sequences | |||
JA21 | JA22 | JA23 | JA24 | JA25 | JA26 | JA27 | JA28 | JA29 | JA30 | |||
. Asymmetric cipher systems or public key cipher systems | . . characterised by groups which define algebraic systems of ciphers | . . . Cipher systems defined by integral residue class rings | . . . Cipher systems defined by algebraic curves on finite fields | . . . . defined by elliptic curves on finite fields | . . characterised by the basis of security | . . . Factorisation problems as the basis of security | . . . . RSA ciphers | . . . Discrete logarithm problems as the basis of security | . . . Knapsack problems as the basis of security | |||
JA31 | ||||||||||||
. Combination of a plurality of cipher systems | ||||||||||||
KA | KA00 ENTITY AUTHENTICATION |
KA01 | KA02 | KA03 | KA04 | KA05 | KA06 | KA07 | KA08 | KA09 | KA10 | |
. User authentication | . Terminal authentication | . Authentication by one-way functions | . Authentication by symmetric cipher systems | . Authentication by asymmetric cipher systems | . Interactive authentication | . Non-interactive authentication | . Zero knowledge interactive proof | . Timing for authentication | . . Before messaging | |||
KA11 | KA12 | KA13 | KA14 | KA15 | KA16 | KA17 | KA18 | KA19 | KA20 | |||
. . During messaging | . . After messaging | . . Unfixed timing | . Authentication by unmodifiable unique information | . . using physical features | . . using biological features | . . . Fingerprints | . . . Voiceprints | . . . Retinae | . . using location information of entities | |||
KA21 | ||||||||||||
. using one-time information for authentication | ||||||||||||
LA | LA00 MESSAGE AUTHENTICATION |
LA01 | LA02 | LA03 | LA04 | LA05 | LA06 | LA07 | LA08 | |||
. Authentication by one-way functions | . Authentication by symmetric cipher systems | . Authentication by asymmetric cipher systems | . Message recovery type | . using message digests | . usable as electronic signatures | . . Multiple signatures | . . Blind signatures | |||||
MA | MA00 STRUCTURES OF AUTHENTICATION OR KEY MANAGEMENT CENTRES |
MA01 | MA02 | MA03 | MA04 | MA05 | MA06 | MA07 | MA08 | |||
. Authentication centres | . . Unipolar concentration | . . involving a plurality of centres | . . . having hierarchical structures | . Key management centres | . . Unipolar concentration | . . A plurality of centres | . . . having hierarchical structures | |||||
NA | NA00 COMPONENTS |
NA01 | NA02 | NA03 | NA04 | NA05 | NA06 | NA07 | NA08 | NA09 | NA10 | |
. Security information | . . Cipher keys | . . . Working keys or session keys | . . Initial values of random number generators | . . Passwords | . Access control tables | . Redundant data or dummy data | . Components of operations or algorithms | . . Transposition processing | . . Substitution processing | |||
NA11 | NA12 | NA13 | NA14 | NA15 | NA16 | NA17 | NA18 | NA19 | NA20 | |||
. . One-way functions | . . Hash functions | . . Fourier transform | . . Wavelet transform | . . Discrete cosine transform | . . Operations on algebraic curves | . . Operations on integral residue class rings | . . . Modulo exponentiation operations | . . Chaos sequences | . . Lookup tables | |||
NA21 | NA22 | NA23 | NA24 | NA25 | NA26 | NA27 | NA28 | NA29 | NA30 | |||
. Physical components | . . Registers | . . . Shift registers | . . Secure communication lines | . . Multiplexers and demultiplexers | . . Physical keys | . . Recording media | . . . Tapes | . . . . Magnetic tapes | . . . Disks | |||
NA31 | NA32 | NA33 | NA34 | NA35 | NA36 | NA37 | NA38 | NA39 | NA40 | |||
. . . . Magnetic discs | . . . . Optical disks and magneto optic disks | . . . Cards | . . . . Magnetic cards | . . . . IC cards | . . . for ID recording | . . . for cipher key recording | . . . for authentication information recording | . . Calculation modules | . . . IC cards having calculation ability | |||
NA41 | NA42 | NA43 | ||||||||||
. . Removable modules | . . Tamper-proof modules | . . Box units or casings | ||||||||||
PA | PA00 APPLICATIONS |
PA01 | PA02 | PA03 | PA04 | PA05 | PA06 | PA07 | PA08 | PA09 | PA10 | |
. Mobile communications | . . Cellular phones or cordless telephones | . . Pagers | . Satellite communications | . Broadcasting | . . Cable television | . Computer networks or the Internet | . . WWW | . Commercial transactions | ||||
PA11 | PA12 | PA13 | PA14 | PA15 | PA16 | PA17 | ||||||
. . Charging | . . Electronic money | . Electronic document settlement systems | . Information recording | . Electronic locks | . . Keyless entry systems | . Voting |