访问码

D. Baranov
{"title":"访问码","authors":"D. Baranov","doi":"10.1109/SIBCOM.2001.977529","DOIUrl":null,"url":null,"abstract":"With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is \"mobile\", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The access codes\",\"authors\":\"D. Baranov\",\"doi\":\"10.1109/SIBCOM.2001.977529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is \\\"mobile\\\", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications.\",\"PeriodicalId\":424812,\"journal\":{\"name\":\"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCOM.2001.977529\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCOM.2001.977529","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着互联网的日益普及及其渗透到生活的方方面面,信息交流的强度增加了。有两种信息:(1)有用的(对其接收者或所有者来说是紧急的);(2)无用的(例如,每日的电子邮件,收件人没有签名)。因此,存在一个过滤问题,即按信息的组成部分划分信息。为此目的,可以提供一个访问码系统,用于通过电子邮件、电话等发送信息。访问码是一个加密的信息单元(包括诸如优先级、日期等数据),能够唯一地识别所有者(在解码时)。所有者或用户可以将AC发送给他希望从中接收消息的人员。可以为一条或多条消息创建AC,并且可以保持其有效性,直到特别取消,或者直到有效日期到期。对于使用空调系统的企业和组织来说,可以通过空调的销售和转售以及提高生产力来获得利润。讨论了交流购买方案的形成和检查。从信息保护的角度来看,交流接收的算法是“移动的”,即不依赖于算法和加密密钥(交流接收可以使用任何算法和密钥)。交流系统可以实际应用于所有通信中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The access codes
With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is "mobile", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信