System and method for authentication in a crypto-system...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S176000, C713S180000, C713S181000, C726S003000, C726S004000, C726S005000, C726S027000, C726S028000, C726S029000, C726S030000, C380S030000, C380S044000, C380S045000, C380S279000, C380S282000

Reexamination Certificate

active

07069435

ABSTRACT:
A system for authentication of a crypto-system user by the use of both symmetric and asymmetric crypto-keys is provided. A first network station, representing the user, transmits a first request for authentication to a second network station. The second station generates a shared symmetric crypto-key, encrypts it and forwards it to both the first station and a third network station. The third station encrypts the received shared symmetric crypto-key and forwards it to the first network station. The first network station combines the two instances of the received and encrypted shared symmetric crypto-key, decrypts the combined symmetric crypto-key to recover shared symmetric crypto-key, encrypts a second authentication request with the recovered shared symmetric crypto-key, and transmits the encrypted authentication request to authenticate the first station. Each transmission of the shared symmetric crypto-key is encrypted with different portion of different ones of multiple asymmetric crypto-keys, each associated with a network station.

REFERENCES:
patent: 5557676 (1996-09-01), Naslund et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 6026163 (2000-02-01), Micali
patent: 6263447 (2001-07-01), French et al.
Denning, D., “A Taxonomy for Key Escrow Encryption Systems ”, ACM Inc., Mar. 1996, vol. 39, No. 3, entire document, www.cosc.georgetown.edu/˜denning/crypto/Taxonomy.html.
Denning, D., “Descriptions of Key Escrow Systems”, ACM Inc., Feb. 26, 1997, entire document, www.cosc.georgetown.edu/˜denning/crypto/Appendix.html.
Abelson, H., et al, “The Risks Of ‘Key Recovery,’ ‘Key Escrow,’ And ‘Trusted Third Party Encryption’”, CDT.org, 1998, entire document, www.cdt.org/crypto/risks98/.
Schneier, B. “Applied Cryptography”, p. 52, sec.3.2, p. 56, sec. 3.3, p. 178, sec.8.4.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for authentication in a crypto-system... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for authentication in a crypto-system..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authentication in a crypto-system... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3688566

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.