Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2002-03-12
2008-08-19
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S156000, C713S170000, C713S171000, C380S277000, C380S278000, C380S279000, C380S282000, C380S285000
Reexamination Certificate
active
07415614
ABSTRACT:
A method for enabling a personal computer to be authenticated by a server is provided. The method comprises the step, which includes for the user in launching the execution of a log-on procedure software, introducing personal identifiers providing access to a signature private key for long-term use relative to the duration of the session. The log-on procedure software produces: identification data of the session Id, a public ephemeral module, a public exponent and at least a pair of ephemeral pubic numbers and ephemeral private numbers related by a generic equation of the type: Gi≡Qiv(mod n) or Gi·Qiv≡1 (mod n), an ephemeral certificate linking, by means of said signature private key, Id and public ephemeral module. The public ephemeral module is of reduced size relative to the signature private key.
REFERENCES:
patent: 4932056 (1990-06-01), Shamir
patent: 5502764 (1996-03-01), Naccache
patent: 5581615 (1996-12-01), Stern
patent: 6081893 (2000-06-01), Grawrock et al.
patent: 6393563 (2002-05-01), Maruyama et al.
patent: 6490682 (2002-12-01), Vanstone et al.
patent: 6516414 (2003-02-01), Zhang et al.
patent: 7266197 (2007-09-01), Guillou et al.
patent: 2 788 912 (2000-07-01), None
Shaohu A Tang, Directed user authentication scheme based on discrete logarithm, 1999, Journal of Circuits, Systems, and Computers, vol. 9, Nos. 5 & 6, pp. 299-306.
R. A. Nelson, Authentication techniques for smart cards, Hanford Operations and Engineering Contractor for the U.S. Department of energy under contract DE-AC06-87RL10930, Presented at the cardTech SecurTech 94, WHC-SA-2307-FP.
Jan et al, “Paramita wisdom” password authentication scheme without verification tables, The journal of systems and software 42, 1999 pp. 45-57.
Guillou et al, A“Paradoxical” Indentity-based signature scheme resulting from zero-knowledge, SGoldwasser advance in cryptology crypto 88, LNCS 403, pp. 216-231, 1990.
Menezes et al (Handbook of Applied Cryptography, ISBN 0-8493-8523-7 1997.
“An Implementation of a Zero-Knowledge Protocol for a Secure Networklogin Procedure”, Energy and Information Technologies in the Southeast, Columbia, Apr. 9-12, 1989, pp. 197-201.
France Telecom
Moazzami Nasser
Telediffusion de France
Traore Fatoumata
Westman Champlin & Kelly P.A.
LandOfFree
Cryptographic authentication with ephemeral modules does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic authentication with ephemeral modules, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic authentication with ephemeral modules will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4019289