Method for establishing secure communications among processing d

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, 380 24, 380 25, 380 46, 380 49, H04L 900, H04L 914, H04L 916

Patent

active

057039496

ABSTRACT:
A system for open electronic commerce having a customer trusted agent securely communicating with a first money module, and a merchant trusted agent securely communicating with a second money module. Both trusted agents are capable of establishing a first cryptographically secure session, and both money modules are capable of establishing a second cryptographically secure session. The merchant trusted agent transfers electronic merchandise to the customer trusted agent, and the first money module transfers electronic money to the second money module. The money modules inform their trusted agents of the successful completion of payment, and the customer may use the purchased electronic merchandise. A first processing device generates an encryption key. A third processing device receives information from a second processing device by way of a fourth processing device, which information allows the third processing device to generate the encryption key. Thus, the first and third processing devices can securely communicate using the generated encryption key.

REFERENCES:
patent: 4443027 (1984-04-01), McNeely et al.
patent: 4454414 (1984-06-01), Benton
patent: 4529870 (1985-07-01), Chum
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4644493 (1987-02-01), Chandra et al.
patent: 4794644 (1988-12-01), Philip et al.
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4864615 (1989-09-01), Bennett et al.
patent: 4876716 (1989-10-01), Okamoto
patent: 4888800 (1989-12-01), Marshall et al.
patent: 4916738 (1990-04-01), Chandra et al.
patent: 4926480 (1990-05-01), Chaum
patent: 4933971 (1990-06-01), Bestock et al.
patent: 4941173 (1990-07-01), Boule et al.
patent: 4956863 (1990-09-01), Goss
patent: 4972175 (1990-11-01), MacPherson
patent: 4993069 (1991-02-01), Matyas et al.
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5081678 (1992-01-01), Kaufman et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5117457 (1992-05-01), Comerford et al.
patent: 5131039 (1992-07-01), Chaum
patent: 5144663 (1992-09-01), Kudelski et al.
patent: 5148534 (1992-09-01), Comerford
patent: 5162989 (1992-11-01), Matsuda
patent: 5177791 (1993-01-01), Yeh et al.
patent: 5185717 (1993-02-01), Mori
patent: 5221838 (1993-06-01), Gutman et al.
patent: 5247576 (1993-09-01), Bright
patent: 5247578 (1993-09-01), Pailles et al.
patent: 5276311 (1994-01-01), Hennige
patent: 5276736 (1994-01-01), Chaum
patent: 5301247 (1994-04-01), Rasmussen et al.
patent: 5305200 (1994-04-01), Hartheimer et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5440634 (1995-08-01), Jones et al.
patent: 5448638 (1995-09-01), Johnson et al.
patent: 5453601 (1995-09-01), Rosen
patent: 5473692 (1995-12-01), Davis
patent: 5539828 (1996-07-01), Davis
"Information Technology--Open Systems Interconnection--The Directory: Authentication Framework," ITU-T Recommendation X.509 (Nov. 1993).
"Data Networks and Open System Communications Directory/Information Technology--Open Systems Interconnection--The Diretory: Authentication Framework", ITU-T Recommendation X.509, Nov. 1993.
"Online Cash Checks", Chaum, D.; Advances in Cryptology EUROCRYPT '89, Qiusquarter & J. Vandewalle (Eds.) Springer-Verlag, pp. 288-293.
"Achieving Electronic Privacy", Chaum, D.; Scientific American, Aug. 1992, pp. 96-101.
"Value Exchange Systems Enabling Security and Unobservability", Burk, H., et al., Computers & Security, 9 (1990), pp. 715-721.
"Proxy-Based Authorization and Accounting for Distributed Systems", Neuman, B. Clifford; Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, May 1993.
"Le paiement electronique", P. Remery, J.C. Pailles and F. Lay, L'Echo des Recherches, No. 134 4 trimester 1988 (with English-Language translation).
"Padlock", D. Everett, Computer Bulletin, Mar. 1985, pp. 16-17.
"ABYSS: A Trusted Archiecture for Software Protection", S.R. White and L. Comeford, IEEE, 1987.
"Public Protection of Software", A. Herzberg and S.S. Pinter, AMC Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393.
"Security Without Identification: Card Computers To Make Big Brother Obsolete", D. Chaum, 1987.
"Internet Billing Service Design and Prototype Implementation", Marvin A Sirbu, IMA Intellectual Property Project Proceedings, vol. 1, Issue 1, Jan. 1994.
"Dyad: A System for Using Physically Secure Coprocessors", J.D. Tygar and B. Yee, School of Computer Science, Carnegie Mellon Univ., Puttsburgh, PA.
"Trusted Devices as applied to Corporate Key Escrow", F. Sudia, Jan. 14, 1994, Bankers Trust Co.
"Wavemeter Chip Provides Digital Money", M. Slater, Microprocessor Report, vol. 8, No. 5, Apr. 18, 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for establishing secure communications among processing d does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for establishing secure communications among processing d, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for establishing secure communications among processing d will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-210445

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.