System and method for n-way authentication in a network

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07370199

ABSTRACT:
A method of controlling information exposure in a multiparty transaction includes an originating transaction participant cryptographically encoding all information for each of the transaction participants such that a unique data content and encryption are used for each of the messages destined to the other transaction participants. The cryptographically encoded messages are transmitted to the transaction participants such that each may decrypt their message and respond to a primary transaction participant with status concerning their portion of the transaction. After reception of affirmative status messages from the transaction participants, the primary transaction participant may transmit messages to the responding transaction participants to execute the multiparty transaction. The originating transaction participant may also be provided an indication that the multiparty transaction is executed.

REFERENCES:
patent: 6609200 (2003-08-01), Anderson et al.
patent: 6904418 (2005-06-01), Walker et al.
patent: 7003480 (2006-02-01), Fox et al.
patent: 7146500 (2006-12-01), Hawkins et al.
patent: 7167844 (2007-01-01), Leong et al.
Canetti, R. et al., “Adaptively Secure Multi-party Computation”,Annual ACM Symposium Theory of Computing, Proceedings of the 28thannual Symposium on Theory of Computing, 1996, 639-648.
Friedman, B. et al., “Trust Online”,Communications of the ACM, Dec. 2000, 43(12), 34-40.
Canetti, R. et al., “Universally Composable Two-Party and Multi-party Secure Computation”,Annual ACM Symposium on Theory of Computing, Proceedings of the 34thannual ACM Symposium on Theory of Computing, 2002, 494-503.
Lindell, Y. et al., “On the Composition of Authenticated Byzantine Agreement”,Annual ACM Symposium on Theory of Computing, Proceedings of the 34thAnnual ACM Symposium on Theory of Computing, 2002, 514-523.
Rabin, T. et al., Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract),Annual ACM Symposium on Theory of Computing, Proceedings of the 21stAnnual ACM Symposium on Theory of Computing, 1989, 73-85.
Siau, K. et al., “Building Customer Trust in Mobil Commerce”,Communications of the ACM, 2003, 46(4), 91-94.
Zadeh, J, Ph.D., “Cryptography on the Internet”,Proceedings of the 37thAnnual Southeast Regional Conference, 1999, 6 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for n-way authentication in a network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for n-way authentication in a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for n-way authentication in a network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2797100

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.