Data card verification system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S171000, C713S176000, C380S030000, C380S282000, C380S285000

Reexamination Certificate

active

07472276

ABSTRACT:
A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.

REFERENCES:
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4890323 (1989-12-01), Beker et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5146500 (1992-09-01), Maurer
patent: 5159632 (1992-10-01), Crandall
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5400403 (1995-03-01), Fahn et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: 5442707 (1995-08-01), Miyaji et al.
patent: 5627893 (1997-05-01), Demytko
patent: 5661805 (1997-08-01), Miyauchi
patent: 5721781 (1998-02-01), Deo et al.
patent: 5748740 (1998-05-01), Curry et al.
patent: 5793866 (1998-08-01), Brown et al.
patent: 5805702 (1998-09-01), Curry et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5870470 (1999-02-01), Johnson et al.
patent: 5881038 (1999-03-01), Oshima et al.
patent: 5907618 (1999-05-01), Gennaro et al.
patent: 5917913 (1999-06-01), Wang
patent: 5955717 (1999-09-01), Vanstone
patent: 5960084 (1999-09-01), Angelo
patent: 6038549 (2000-03-01), Davis et al.
patent: 6041314 (2000-03-01), Davis
patent: 6178507 (2001-01-01), Vanstone
patent: 6341349 (2002-01-01), Takaragi et al.
patent: 6424712 (2002-07-01), Vanstone et al.
patent: 0588339 (1994-03-01), None
patent: 2536928 (1984-06-01), None
patent: 2309890 (1997-08-01), None
patent: 06-295154 (1994-10-01), None
patent: 08-101868 (1996-04-01), None
patent: 08-507619 (1996-08-01), None
patent: WO 91/16691 (1991-10-01), None
Bassham, Johnson, and Polk Internet Draft: IETF: Internet X.509 Public Key Infrastructure, Nov. 21, 1997.
Bruce Schneier, Applied Cryptography 2nd Edition, p. 574-578, Oct. 1995.
L. Bassham et al: IETF PKIX Working Group, Internet Draft: “Internet x.509 Public Key Infrastructure Representation of Elliptic Curve Signature Algorithm (ECSDA) Keys and Signatures in Internet X.509 Public Key Infrastructure Certificates,” Nov. 21, 1997.
S. Kent et al.: IETF Network Working Group, Request For COmments: 1422: “Privacy Enhancements for Internet Electronic Mail: Part II: Certificate-Based Key Management,” Feb. 1993.
Blake-Wilson et al., Networking Group Request for Comments: 3278, Apr. 2002, “Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)”, Sec. 4.1.3(6): “Certificates using ECC”.
Polk et al., Network Working Group Request for Comments: 3279, Apr. 2002, “Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, Sec. 2.2: “Signature Algorithms”.
Housley et al., Network Working Group Request for Comments: 3280, Apr. 2002, “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile”.
Ferreira, R.C.; “The Smart Card: A high security tool in EDP”; Philips Telecommunication Review; Sep. 1989; pp. 1-19; vol. 47, No. 3; Philips Telecommunicatie Industrie N.V. Hilversum; NL.
Miyaji A.; “Elliptic Curves Suitable for Cryptosystems”; IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences; Jan. 1, 1994; pp. 98-104; vol. E77-A, No. 1.
Schnorr C.P.; “Efficient Signature Generation by Smart Cards”; Journal of Cryptology; Jan. 1, 1991; pp. 161-174; vol. 4, No. 3.
Koblitz, N.; “Elliptic Curve Cryptosystems”; Mathematics of Computation; Jan. 1987; pp. 203-209; vol. 48, No. 177.
Kenji, Koyama et al.; “Elliptic Curve Cryptosystems And Their Applications”; IEICE Transactions on Information and Systems; Jan. 1, 1992; pp. 50-57; vol. E75-D, No. 1.
Waleffe, D. De et al.; “Corsair: A Smart Card for Public Key Cryptosystems”; Advances in Cryptology—Proceedings of Crypto, Santa Barbara; Aug. 11-15, 1990; pp. 502-513, No. CONF. 10.
Schneier, Bruce; Applied Cryptography; 1996, pp. 35-36.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data card verification system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data card verification system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data card verification system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4024462

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.