Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2006-06-27
2006-06-27
Sheikh, Ayaz (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S168000, C713S176000, C713S180000, C713S181000, C726S003000, C726S004000, C726S005000, C726S027000, C726S028000, C726S029000, C726S030000, C380S030000, C380S044000, C380S045000, C380S279000, C380S282000
Reexamination Certificate
active
07069435
ABSTRACT:
A system for authentication of a crypto-system user by the use of both symmetric and asymmetric crypto-keys is provided. A first network station, representing the user, transmits a first request for authentication to a second network station. The second station generates a shared symmetric crypto-key, encrypts it and forwards it to both the first station and a third network station. The third station encrypts the received shared symmetric crypto-key and forwards it to the first network station. The first network station combines the two instances of the received and encrypted shared symmetric crypto-key, decrypts the combined symmetric crypto-key to recover shared symmetric crypto-key, encrypts a second authentication request with the recovered shared symmetric crypto-key, and transmits the encrypted authentication request to authenticate the first station. Each transmission of the shared symmetric crypto-key is encrypted with different portion of different ones of multiple asymmetric crypto-keys, each associated with a network station.
REFERENCES:
patent: 5557676 (1996-09-01), Naslund et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 6026163 (2000-02-01), Micali
patent: 6263447 (2001-07-01), French et al.
Denning, D., “A Taxonomy for Key Escrow Encryption Systems ”, ACM Inc., Mar. 1996, vol. 39, No. 3, entire document, www.cosc.georgetown.edu/˜denning/crypto/Taxonomy.html.
Denning, D., “Descriptions of Key Escrow Systems”, ACM Inc., Feb. 26, 1997, entire document, www.cosc.georgetown.edu/˜denning/crypto/Appendix.html.
Abelson, H., et al, “The Risks Of ‘Key Recovery,’ ‘Key Escrow,’ And ‘Trusted Third Party Encryption’”, CDT.org, 1998, entire document, www.cdt.org/crypto/risks98/.
Schneier, B. “Applied Cryptography”, p. 52, sec.3.2, p. 56, sec. 3.3, p. 178, sec.8.4.
deSa Colin
Ganesan Karuna
Sandhu Ravi
Antonelli Terry Stout & Kraus LLP
Baum Ronald
Sheikh Ayaz
TriCipher Inc.
LandOfFree
System and method for authentication in a crypto-system... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for authentication in a crypto-system..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authentication in a crypto-system... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3688566