Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2011-06-14
2011-06-14
Chai, Longbit (Department: 2431)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S187000, C713S188000, C726S027000, C726S028000, C726S029000, C726S030000
Reexamination Certificate
active
07962761
ABSTRACT:
The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym.
REFERENCES:
patent: 2005/0157880 (2005-07-01), Kurn et al.
patent: 2006/0106805 (2006-05-01), Aaron
patent: 2008/0154782 (2008-06-01), Kang et al.
patent: WO9933222 (1999-07-01), None
Yang Zhang: “An Efficient Anonymous Authentication Protocol with Pseudonym Revocability”, Inc, IMS and IDC, 2009 Fifth International Joint Conference On, IEEE, Piscataway, NJ, USA, Aug. 25, 2009, pp. 1929-1934, XP031564722, ISBN: 978-0-7695-3769-6.
Lenhardt Jan
Spalka Adrian
Chai Longbit
CompuGroup Medical AG
Hulsey III William N.
Hulsey P.C.
Smith Loren T.
LandOfFree
Computer implemented method for generating a pseudonym,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer implemented method for generating a pseudonym,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer implemented method for generating a pseudonym,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2736387