Cryptographic authentication with ephemeral modules

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C713S170000, C713S171000, C380S277000, C380S278000, C380S279000, C380S282000, C380S285000

Reexamination Certificate

active

07415614

ABSTRACT:
A method for enabling a personal computer to be authenticated by a server is provided. The method comprises the step, which includes for the user in launching the execution of a log-on procedure software, introducing personal identifiers providing access to a signature private key for long-term use relative to the duration of the session. The log-on procedure software produces: identification data of the session Id, a public ephemeral module, a public exponent and at least a pair of ephemeral pubic numbers and ephemeral private numbers related by a generic equation of the type: Gi≡Qiv(mod n) or Gi·Qiv≡1 (mod n), an ephemeral certificate linking, by means of said signature private key, Id and public ephemeral module. The public ephemeral module is of reduced size relative to the signature private key.

REFERENCES:
patent: 4932056 (1990-06-01), Shamir
patent: 5502764 (1996-03-01), Naccache
patent: 5581615 (1996-12-01), Stern
patent: 6081893 (2000-06-01), Grawrock et al.
patent: 6393563 (2002-05-01), Maruyama et al.
patent: 6490682 (2002-12-01), Vanstone et al.
patent: 6516414 (2003-02-01), Zhang et al.
patent: 7266197 (2007-09-01), Guillou et al.
patent: 2 788 912 (2000-07-01), None
Shaohu A Tang, Directed user authentication scheme based on discrete logarithm, 1999, Journal of Circuits, Systems, and Computers, vol. 9, Nos. 5 & 6, pp. 299-306.
R. A. Nelson, Authentication techniques for smart cards, Hanford Operations and Engineering Contractor for the U.S. Department of energy under contract DE-AC06-87RL10930, Presented at the cardTech SecurTech 94, WHC-SA-2307-FP.
Jan et al, “Paramita wisdom” password authentication scheme without verification tables, The journal of systems and software 42, 1999 pp. 45-57.
Guillou et al, A“Paradoxical” Indentity-based signature scheme resulting from zero-knowledge, SGoldwasser advance in cryptology crypto 88, LNCS 403, pp. 216-231, 1990.
Menezes et al (Handbook of Applied Cryptography, ISBN 0-8493-8523-7 1997.
“An Implementation of a Zero-Knowledge Protocol for a Secure Networklogin Procedure”, Energy and Information Technologies in the Southeast, Columbia, Apr. 9-12, 1989, pp. 197-201.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic authentication with ephemeral modules does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic authentication with ephemeral modules, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic authentication with ephemeral modules will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4019289

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.