Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-06-19
2007-06-19
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S030000, C380S283000, C380S285000, C709S230000, C709S232000, C709S238000, C713S168000, C713S180000, C713S181000
Reexamination Certificate
active
10072018
ABSTRACT:
A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.
REFERENCES:
patent: 5453601 (1995-09-01), Rosen
patent: 6301660 (2001-10-01), Benson
patent: 6327652 (2001-12-01), England et al.
patent: 6560339 (2003-05-01), Iwamura
patent: 6615350 (2003-09-01), Schell et al.
patent: 6950948 (2005-09-01), Neff
patent: 2001/0054155 (2001-12-01), Hagan et al.
patent: 2002/0004900 (2002-01-01), Patel
Yolkowski, James, ‘Randomness’, Math Lair, Jun. 16, 2001, entire document, http://www.stormloader.com/ajy/random.html.
Hu, Z., et al, ‘Anonymous Micropayments Authentication (AMA) in Mobile Data Network’, IEEE INFOCOM 2004, entire document, http:// www.ieee-infocom.org/2004/Papers/02—1.PDF.
C. Beaver, et al., “A Design for Anonymous, Authenticated Information Sharing”, Proceedings of the IEEE Man, System and Cybernetics Information Assurance Workshop (Jun. 2001).
D. Boneh, et al.,Anonymous Authentication with Subset Queries,Proceedings of the 6th ACM conference on Computer and Communications Security, pp. 113-119 (1999).
D. Chaum,Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms,Communications of the ACM, vol. 24, No. 2, pp. 84-88 (1981).
A. De Santis, et al.,Communication-efficient anonymous group identification,Proceedings of the ACM Conference on Computer and Communications Security, pp. 73-82 (1998).
B. Gavish, et al.,Anonymous Mechanisms in Group Decision Support Systems Communications,Decision Support Systems, v. 23, No. 4, pp. 297-328 (1998).
S. Hayne, et al.,Attribution accuracy when using anonymity in group support system,International Journal of Human Computer Studies, v.47, No. 3, pp. 429-452 (1997).
K. Oishi, et al.,Anonymous public-key certificates and their applications,IEICE Transactions, vol. E81-A, No. 1, pp. 65-71 (1998).
S. Schechter, et al.,Anonymous Authentication of Membership in Dynamic Groups,Proceedings of Financial Cryptography '99, vol. 1648 LNCS, pp. 184-195 (1999).
P. Syverson, et al., “Anonymous connections and onion routing”,IEEE Journal on Selected Areas in Communication,v. 16, No. 4, pp. 482-494 (1998).
Beaver Cheryl L.
Schroeppel Richard C.
Snyder Lillian A.
Baum Ronald
Moazzami Nasser
Sandia Corporation
Watson Robert D.
LandOfFree
Anonymous authenticated communications does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Anonymous authenticated communications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Anonymous authenticated communications will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3858384