1994-05-26 - Re: Graph isomorphism based PK cryptosystems?

Header Data

From: norm@netcom.com (Norman Hardy)
To: hughes@ah.com (Eric Hughes)
Message Hash: e3890d1272ff87304941a396f8b7758f28aee3de225a504bc7a9e3066ec9694c
Message ID: <199405260253.TAA15237@netcom.netcom.com>
Reply To: N/A
UTC Datetime: 1994-05-26 02:53:59 UTC
Raw Date: Wed, 25 May 94 19:53:59 PDT

Raw message

From: norm@netcom.com (Norman Hardy)
Date: Wed, 25 May 94 19:53:59 PDT
To: hughes@ah.com (Eric Hughes)
Subject: Re: Graph isomorphism based PK cryptosystems?
Message-ID: <199405260253.TAA15237@netcom.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 15:42 5/25/94 -0400, smb@research.att.com wrote:
>	 This is one of the main
>	 reasons behind such publications as the IBM Technical Journal--the
>	 publication of results not worth patenting themselves, but definitely
>	 worth preventing others from patenting.
>
>Actually, no.  IBM has a separate publication for just that purpose.
>The Technicnal Journal (and others like it) are intended as PR vehicles
>and as gold stars for researchers -- that's an important part of our
>salary, as it were.

I think that you are refering to IBM's "Technical Disclosures" publication.
Its entries are in the form of patents, presumably in less finished form.
They carry thru the process of writing up the patent, at least in rough form,
and then decide whether to go to the greater expense of patenting it.
If they decide not to patent it they publish it in Technical Disclosures.







Thread