Cryptography – Key management
Reexamination Certificate
2006-11-21
2006-11-21
Song, Hosuk (Department: 2135)
Cryptography
Key management
C380S282000, C380S286000
Reexamination Certificate
active
07139399
ABSTRACT:
A cryptosystem is described which automatically provides an extra “message recovery” recipient(s) when an encrypted message is generated in the system. The system is typically configured such that the extra recipient or “message recovery agent” (MRA)—an entity which itself has a public key (i.e., a MRA public key)—is automatically added, under appropriate circumstances, as a valid recipient for an encrypted message created by a user. In a corporate setting, for example, the message recovery agent is the “corporate” message recovery agent designated for that company (firm, organization, or other group) and the user is an employee (or member) of that company (or group). In operation, the system embeds a pointer (or other reference mechanism) to the MRA public key into the public key of the user or employee, so that encrypted messages sent to the company's employees from outside users (e.g., those individuals who are not employees of the company) can nevertheless still be recovered by the company. Alternatively, the MRA public key itself can be embedded within the public key of the employee or user (i.e., a key within a key), but typically at the cost of increasing the storage requirement of the user's key. By including in the user's key (e.g., an employee) a pointer to a message recovery agent's key (or the MRA key itself), the system provides a mechanism for assisting a user outside a group (e.g., a user who is outside a particular company) with the task of including in an automatic and non-intrusive manner the key of an additional recipient, such as one intended for message recovery.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5436972 (1995-07-01), Fischer
patent: 5481613 (1996-01-01), Ford et al.
patent: 5497422 (1996-03-01), Tysen et al.
patent: 5553145 (1996-09-01), Micali
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5625695 (1997-04-01), M'Raihi et al.
patent: 5629982 (1997-05-01), Micali
patent: 5647000 (1997-07-01), Leighton
patent: 5668877 (1997-09-01), Aziz
patent: 5768388 (1998-06-01), Goldwasser et al.
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5841865 (1998-11-01), Sudia
patent: 5872849 (1999-02-01), Sudia
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 6314190 (2001-11-01), Zimmermann
Bruce Schneier, Applied Cryptography, Oct. 1996, Wiley & Sons, second edition, pp. 193-196, 513-520.
Cooley & Godward LLP
PGP Corporation
Song Hosuk
LandOfFree
Cryptographic system with methods for user-controlled... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic system with methods for user-controlled..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic system with methods for user-controlled... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3630696