Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2005-05-31
2005-05-31
Hua, Ly V. (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S175000, C713S156000, C713S176000
Reexamination Certificate
active
06901509
ABSTRACT:
Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list. According to one computer-implemented method, the items on the list are sorted and ranges are derived from adjacent pairs of data items on the list. Next, cryptographically manipulated data is generated from the plurality of ranges. At least parts of the cryptographically manipulated data is transmitted onto a network for use in cryptographically demonstrating whether any given data item is on the list. According to another computer-implemented method, a request message is received requesting whether a given data item is on a list of data items. In response, a range is selected that is derived from the pair of data items on the list that define the smallest range that includes the given data item. A response message is transmitted that cryptographically demonstrates whether the first data item is on the list using cryptographically manipulated data derived from the range. According to another computer-implemented method, a request message requesting an indication as to whether a first data item is on a list of data items is transmitted. In response, a message is received that cryptographically demonstrates whether the first data item is on the list, where the response message identifies a range that is derived from the pair of data items on the list that defines the smallest range that includes the first data item.
REFERENCES:
patent: 4309569 (1982-01-01), Merkle
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4661658 (1987-04-01), Matyas
patent: 4868877 (1989-09-01), Fischer
patent: 4879747 (1989-11-01), Leighton et al.
patent: 4881264 (1989-11-01), Merkle
patent: 4944009 (1990-07-01), Micali et al.
patent: 4995081 (1991-02-01), Leighton et al.
patent: 5016274 (1991-05-01), Micali et al.
patent: 5136289 (1992-08-01), Yoshida et al.
patent: 5136647 (1992-08-01), Haber et al.
patent: 5202986 (1993-04-01), Nickel
patent: 5231666 (1993-07-01), Matyas
patent: 5261002 (1993-11-01), Perlman et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5351302 (1994-09-01), Leighton et al.
patent: 5380047 (1995-01-01), Molee et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: RE34954 (1995-05-01), Haber et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5420927 (1995-05-01), Micali
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5434919 (1995-07-01), Chaum
patent: 5475763 (1995-12-01), Kaufman et al.
patent: 5499296 (1996-03-01), Micali
patent: 5519778 (1996-05-01), Leighton et al.
patent: 5537475 (1996-07-01), Micali
patent: 5588060 (1996-12-01), Aziz
patent: 5594921 (1997-01-01), Pettus
patent: 5604804 (1997-02-01), Micali
patent: 5615269 (1997-03-01), Micali
patent: 5625693 (1997-04-01), Rohatgi et al.
patent: 5629982 (1997-05-01), Micali
patent: 5638446 (1997-06-01), Rubin
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5664184 (1997-09-01), Ferguson et al.
patent: 5666414 (1997-09-01), Micali
patent: 5666416 (1997-09-01), Micali
patent: 5668877 (1997-09-01), Aziz
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5687319 (1997-11-01), Cook et al.
patent: 5699431 (1997-12-01), Van Oorschot et al.
patent: 5701469 (1997-12-01), Brandli et al.
patent: 5712914 (1998-01-01), Aucsmith et al.
patent: 5717758 (1998-02-01), Micali
patent: 5748738 (1998-05-01), Bisbee et al.
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5768526 (1998-06-01), Fawcett
patent: 5774552 (1998-06-01), Grimmer
patent: 5781629 (1998-07-01), Haber et al.
patent: 5787175 (1998-07-01), Carter
patent: 5903651 (1999-05-01), Kocher
patent: 6065008 (2000-05-01), Simon et al.
patent: 6085320 (2000-07-01), Kaliski, Jr.
patent: 6097811 (2000-08-01), Micali
patent: 6189098 (2001-02-01), Kaliski, Jr.
patent: 6226743 (2001-05-01), Naor et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6320966 (2001-11-01), Brands
patent: 6442689 (2002-08-01), Kocher
patent: 6457130 (2002-09-01), Hitz et al.
patent: 6532540 (2003-03-01), Kocher
patent: 6701434 (2004-03-01), Rohatgi
patent: 9716905 (1997-05-01), None
patent: 9726728 (1997-07-01), None
ISO/IEC 9594-8: 1998 Information Technology—Open Systems Interconnection—The Authentication Framework, International Standard (41 pages).
FIPS PUB 180-1, U.S. Department of Commerce Technology Administration, National Institute of Standards and Technology (Supersedes FIPS PUB 180—May 11, 1993), Secure Hash Standard, Category: Computer Security, Apr. 17, 1995.
FIPS PUB 186, Federal Information Processing Standards Publication 186, May 19, 1994, Digital Signature Standard (DSS).
FIPS PUB 190, Federal Information Processing Standards Publication 190, Sep. 28, 1994, Announcing the Standard for Guideline for the Use of Advanced Authentication Technology Alternatives (50 pages).
SPX Guide—A Prototype Public Key Authentication Service, Kannan Alagappan, Joseph Tardo, Digital Equipment Corporation—Draft; May 1991 (28 pages).
SPX: Global Authentication Using Public Key Certificates, Joseph J. Tardo, Kannan Alagappan, Digital Equipment Corporation (13 pages).
DASS, Distributed Authentication Security Service, Network Working Group, Internet Draft, Charles Kaufman, Digital Equipment Corporation, Dec. 10, 1992, (101 pages).
RFC2560—X.509 Internet Public Key Infrastructure Online Certi; Internet RFC/STD/FYI/BCP Archives; M. Myers, VeriSign; R. Ankney, CertCo; A. Malpani, ValiCert; S. Galperin, My CFO; C. Adams, Entrust Technologies; dated Jun. 1999 (15 pages).
The Digital Distributed System Security Architecture, Morrie Gasser, Andy Goldstein, Charlie Kaufman, Butler Lampson, Digital Equipment Corp., Reprint from Proceedings of 1989 National Computer Security Conference (13 pages).
Moni Naor and Kobbi Nissim, “Certificate Revocation and Certificate Update”, Dept. of Applied Mathematics and Computer Science, Weizmann Institute of Science, Rehovot 76100 Israel, 12 Pages.
William Aiello, Sachin Lodha, Rafail Ostrovsky, “Fast Digital Identity Revocation (Extended Abstract)”, pp. 137-152.
Dave Bayer, Stewart Haber, W Scott Stornetta, “Improving the Efficiency and Reliability of Digital Time-Stamping”, Dated Mar. 1992, pp. 329-334.
Mihir Bellare, Oded Goldreich, Shafi Goldwasser, “Incremental Cryptography and Application to Virus Protection”, STOC '95, Las Vegas, Nevada, U.S.A 1995 ACM 0-89791-718-9/95/0005, pp. 45-56.
M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor, Checking the Correctness of Memories, Algorithmica (1994) 12:225-244.
Schneier, B., “Applied Cryptography, Second Edition,” Published by John Wiley & Sons, Inc. 1996, Chapters 2, 5, 8 and 24.
Linn, J., Network Working Group,Request for Comments: 1421, “Privacy Enhancement for Internet Electronic Mail: Part 1: Message Encryption and Authentication Procedures,” (Feb 1993) 30 pgs.
Kent, S., Network Working Group,Request for Comments: 1422, “Privacy Enhancement for Internet Electronic Mail: Part 2: Certificate-Based Key Management,” (Feb 1993) 24 pgs.
Balenson, D., Network Working Group,Request for Comments: 1423, “Privacy Enhancement for Internet Electronic Mail: Part 3: Algorithms, Modes, and Identifiers,” (Feb 1993) 11 pgs.
Kaliski, B., Network Working Group, Request for Comments: 1424, “Privacy Enhancement for Internet Electronic Mail: Part 4: Key Certificate and Related Services,” (Feb 1993) 7 pgs.
PCT International Preliminary Examining Authority Written Opinion dated Dec 18, 1998.
Silvio Micali, “Enhanced Certificate Revocation System,” Written report prepared for the Nov. 2, 1995, Federal PKI meeting, pp. 1-4, 7-10.
Santosh Chokhani, “Toward a National Public Key Infrastructure,” IEEE Communications Magazine, vol. 32, No. 9, Sep. 1, 1994, pp. 70-74.
Silvio Micali, “Alternative Approaches to Certificate Revocation,” Written report prepared for the Sep. 5-6, 1996 X9F1 working group, 28 pages.
Ralph C. Merkle,
Hua Ly V.
Skadden, Arps Slate Meagher & Flom LLP
Tumbleweed Communications Corp.
LandOfFree
Apparatus and method for demonstrating and confirming the... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Apparatus and method for demonstrating and confirming the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus and method for demonstrating and confirming the... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3435091