View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
March 1, 1987


By CBR Staff Writer

US government attempts to extend its hegemony beyond its borders have reared their ugly heads again, this time with regard to an Israeli patent. Associated Press reports from Tel Aviv that an Israeli cryptologist claims to have developed a low-cost method of protecting computers, credit cards, passports and drivers’ licences from forgery, and is seeking a US patent on it. The system involves software programs combined with an embedded microprocessor Smart Card. Adi Shamir, 34, and two students, Amos Fiat and Uriel Feige, developed the system at the Weizmann Institute, Israel’s largest independent research centre, and last July, the institute applied for a US patent, saying the system had potential applications in a wide variety of commercial and milidary uses. In January, Shamir says, he received a remarkable and disconcerting letter from the US Commerce Department telling him he faced prosecution if he disclosed information about his findings. Shamir was to deliver a scientific paper on the project in May to a conference on theoretical computer science in New York City. After receiving the letter, he wrote to the programme committee about the order, which required the committee to retrieve and destroy all advance copies of his paper. Kenneth Cage, an attorney with the US Patent and Trademark Office in Washington, said he could not comment on the specifics of a pending patent application, adding that his office had the power to issue secrecy orders to US citizens if release of information in a proposed patent was deemed harmful to national security. Of 125,000 patent applications last year, about 6,000 were relayed to the Defense Department for review, and secrecy orders eventually were issued on about 150, Cage said. Shamir’s work is an outgrowth of a mathematical discovery called zero-knowledge proof, which allows one mathematician to convince another of a proposition’s truth without revealing details of the proof. In the case of credit cards, such a technique can be used to prove a credit card is valid without giving the number to someone who might misuse it. The same technique could be used to protect computer systems from invasion by hackers.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.