F-Term-List

(Not Translated)
5J104 Ciphering device, decoding device and privacy communication
G09C1/00 -5/00;H04K1/00-3/00;H04L9/00-9/40
G09C1/00-5/00;H04K1/00-3/00;H04L9/00-9/04 AA AA00
PURPOSE OR EFFECT
AA01 AA02 AA03 AA04 AA05 AA06 AA07 AA08 AA09 AA10
. Secret communication or privacy communication . Secret protection by means other than the ciphering . . by changing communication paths . . Detection of eavesdropping or prevention of eavesdropping . . . by using quantum mechanics . Proof . . Entity authentication (user authentication or terminal authentication) . . Message authentication (prevention of data alteration) . . . Electronic signature . . Delivery certificate
AA11 AA12 AA13 AA14 AA15 AA16 AA17 AA18 AA19 AA20
. . Time stamp . Detection or prevention of unauthorised use of data . . Prevention of copying or detection of copying . . Electronic watermarking . . Copyright notices . Management of security information . Secret computation . Improvement of arithmetic operations e.g. speeding-up efficiency or simplification . . by conforming the data length to CPUs . . Parallelization or pipelining
AA21 AA22 AA23 AA24 AA25 AA26 AA27 AA28 AA29 AA30
. . relating to operations on integral residue class rings . . . relating to modulo exponentiation operations . . relating to prime number generation . . relating to prime number decision . . relating to operations on algebraic curves . Censorship . Measures against failures accidents or transmission errors . . Transmission error detection . . . Transmission error correction . . Detection of cipher step-out
AA31 AA32 AA33 AA34 AA35 AA36 AA37 AA38 AA39 AA40
. . . Restoration from the cipher step-out . Controls of ciphering devices . . Switching controls between ciphering and non-ciphering . . Changing of cipher keys . . . Automatic selection of cipher keys . Adjustments of cipher intensity . . Adjustments according to secret levels . . Adjustment of a length of cipher keys or passwords . . Plain texts slightly understandable without cipher keys . Cryptanalysis or cipher-breakings
AA41 AA42 AA43 AA44 AA45 AA46 AA47 AA48 AA49
. Measures against cipher-breakings . . Cipher-breakings specially adapted for broadcast communications . . Cipher-breakings using properties of cipher keys . Measures against physical attacks for breaking secrecy . . Measures against disassembly or destructive attacks on apparatuses . . Measures against attacks without disassembling or destroying apparatuses . . . Measures against attacks from connection terminals . Jamming of communication . Measures against jamming of communication
BA BA00
COMMUNICATION CONFIGURATIONS
BA01 BA02 BA03 BA04 BA05 BA06 BA07
. Exchanges . Relays . Broadcasts or broadcast communications . Multiplex communications . . Frequency-division multiplexing . . Time-division multiplexing . . Code-division multiplexing
CA CA00
OBJECTS OF CIPHER TRANSFORMATIONS
CA01 CA02 CA03 CA04
. Transmission control information . Only a part of information to be transmitted . . Only specific frequency regions . . Only specific bits
DA DA00
SELECTION OF CIPHER ALGORITHMS OR CIPHER KEYS
DA01 DA02 DA03 DA04 DA05
. based on position information of entities . based on authority e.g. access levels . based on communication partners . based on data . based on communication records
EA EA00
MANAGEMENT OF SECURITY INFORMATION
EA01 EA02 EA03 EA04 EA05 EA06 EA07 EA08 EA09 EA10
. Centralised management at centres . Distributed management . Password managements . Cipher key managements . . Authentic certification of public keys . . Hierarchical key management . . . having three or more levels . Prevention of leakage or fraudulent use of security information . . incapacitating erasing or use of security information . . Alteration prevention of security information
EA11 EA12 EA13 EA14 EA15 EA16 EA17 EA18 EA19 EA20
. Measures against loss or oblivion of security information . . Commission or deposition . . Divided or distributed holdings . . Use of the information which facilitates memorisation of users . Delivery or production of security information . . Delivery; transmission of shared information per se . . . ciphering and delivering security information . . . . using symmetric cipher systems for ciphering . . . . using asymmetric cipher systems for ciphering . . . using dedicated media
EA21 EA22 EA23 EA24 EA25 EA26 EA27 EA28 EA29 EA30
. . . . using secure communication paths . . . . using recording media such as cards . . Generation; shared information per se without transmission . . . requiring preliminary communications . . . without requiring preliminary communications . . . utilising ID information . . characterised by groups defining algebraic systems . . . defined by integral residue class rings . . . defined by algebraic curves on finite fields . . . . defined by elliptic curves on the finite fields
EA31 EA32 EA33
. . characterised by the basis of security . . . Factorisation problems as the basis of security . . . Discrete logarithm problems as the basis of security
FA FA00
GENERATION OF RANDOM NUMBER SEQUENCE
FA01 FA02 FA03 FA04 FA05 FA06 FA07 FA08 FA09 FA10
. using a LFSR . . changeable tap locations . . changeable number of register steps . . using a plurality of LFSRs . . using nonlinear transformation . using block ciphers . using one-way functions . using chaos sequences . reading recorded random number sequences . by natural random numbers
GA GA00
GENERATION OF UNREPRODUCIBLE INFORMATION
GA01 GA02 GA03 GA04 GA05
. using natural fluctuations . using fluctuations resulting from artificial manipulation . using time information . being used for seeding for pseudo-random number generation . being used for authentication
HA HA00
ANALOGUE PRIVATE COMMUNICATION METHOD
HA01 HA02 HA03 HA04 HA05 HA06 HA07 HA08 HA09 HA10
. processing on time-axis . . by polarity reversal . . by analogue addition . processing on frequency-axis . . Spectrum-division processing . . . by reversal of divided spectra . . . by replacement of divided spectra . . . changing dividing positions . . . by frequency transformations and filtering . . by reversal of entire spectra
HA11 HA12 HA13 HA14 HA15 HA16
. . . changing a spectrum position according to the length of time . . . for controlling reversal or non-reversal . . by shift of entire spectra . . . changing spectrum positions according to the length of time . . by a Fourier transform or an inverse Fourier transform . . filtering after amplitude modulation
JA JA00
CIPHER SYSTEMS INCLUDING ONE-WAY FUNCTIONS
JA01 JA02 JA03 JA04 JA05 JA06 JA07 JA08 JA09 JA10
. undecodable e.g. one-way functions . cipher or decoding functions being one-to-many functions . Symmetric cipher systems e.g. common key cipher systems . . synthesising random number sequences and plain text sequences sequentially . . . Synchronous stream cipher . . . Self-synchronisation-type stream cipher . . repeating substitution and transposition alternately . . . variable in number of steps . . . Feistel type ciphers . . . . L-type
JA11 JA12 JA13 JA14 JA15 JA16 JA17 JA18 JA19 JA20
. . . . R-type . . . . B-type . . . . . DES . . . . . FEAL . . . . using table search for nonlinear functions . . . . not using table search for nonlinear functions . . . . characterised by composite operation of Feistel ciphers . . . . . a composite operation being an exclusive OR . . Affine ciphers . . using chaos sequences
JA21 JA22 JA23 JA24 JA25 JA26 JA27 JA28 JA29 JA30
. Asymmetric cipher systems or public key cipher systems . . characterised by groups which define algebraic systems of ciphers . . . Cipher systems defined by integral residue class rings . . . Cipher systems defined by algebraic curves on finite fields . . . . defined by elliptic curves on finite fields . . characterised by the basis of security . . . Factorisation problems as the basis of security . . . . RSA ciphers . . . Discrete logarithm problems as the basis of security . . . Knapsack problems as the basis of security
JA31
. Combination of a plurality of cipher systems
KA KA00
ENTITY AUTHENTICATION
KA01 KA02 KA03 KA04 KA05 KA06 KA07 KA08 KA09 KA10
. User authentication . Terminal authentication . Authentication by one-way functions . Authentication by symmetric cipher systems . Authentication by asymmetric cipher systems . Interactive authentication . Non-interactive authentication . Zero knowledge interactive proof . Timing for authentication . . Before messaging
KA11 KA12 KA13 KA14 KA15 KA16 KA17 KA18 KA19 KA20
. . During messaging . . After messaging . . Unfixed timing . Authentication by unmodifiable unique information . . using physical features . . using biological features . . . Fingerprints . . . Voiceprints . . . Retinae . . using location information of entities
KA21
. using one-time information for authentication
LA LA00
MESSAGE AUTHENTICATION
LA01 LA02 LA03 LA04 LA05 LA06 LA07 LA08
. Authentication by one-way functions . Authentication by symmetric cipher systems . Authentication by asymmetric cipher systems . Message recovery type . using message digests . usable as electronic signatures . . Multiple signatures . . Blind signatures
MA MA00
STRUCTURES OF AUTHENTICATION OR KEY MANAGEMENT CENTRES
MA01 MA02 MA03 MA04 MA05 MA06 MA07 MA08
. Authentication centres . . Unipolar concentration . . involving a plurality of centres . . . having hierarchical structures . Key management centres . . Unipolar concentration . . A plurality of centres . . . having hierarchical structures
NA NA00
COMPONENTS
NA01 NA02 NA03 NA04 NA05 NA06 NA07 NA08 NA09 NA10
. Security information . . Cipher keys . . . Working keys or session keys . . Initial values of random number generators . . Passwords . Access control tables . Redundant data or dummy data . Components of operations or algorithms . . Transposition processing . . Substitution processing
NA11 NA12 NA13 NA14 NA15 NA16 NA17 NA18 NA19 NA20
. . One-way functions . . Hash functions . . Fourier transform . . Wavelet transform . . Discrete cosine transform . . Operations on algebraic curves . . Operations on integral residue class rings . . . Modulo exponentiation operations . . Chaos sequences . . Lookup tables
NA21 NA22 NA23 NA24 NA25 NA26 NA27 NA28 NA29 NA30
. Physical components . . Registers . . . Shift registers . . Secure communication lines . . Multiplexers and demultiplexers . . Physical keys . . Recording media . . . Tapes . . . . Magnetic tapes . . . Disks
NA31 NA32 NA33 NA34 NA35 NA36 NA37 NA38 NA39 NA40
. . . . Magnetic discs . . . . Optical disks and magneto optic disks . . . Cards . . . . Magnetic cards . . . . IC cards . . . for ID recording . . . for cipher key recording . . . for authentication information recording . . Calculation modules . . . IC cards having calculation ability
NA41 NA42 NA43
. . Removable modules . . Tamper-proof modules . . Box units or casings
PA PA00
APPLICATIONS
PA01 PA02 PA03 PA04 PA05 PA06 PA07 PA08 PA09 PA10
. Mobile communications . . Cellular phones or cordless telephones . . Pagers . Satellite communications . Broadcasting . . Cable television . Computer networks or the Internet . . E-mail . . WWW . Commercial transactions
PA11 PA12 PA13 PA14 PA15 PA16 PA17
. . Charging . . Electronic money . Electronic document settlement systems . Information recording . Electronic locks . . Keyless entry systems . Voting
TOP