Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-11-26
2010-10-26
Pyzocha, Michael (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S171000, C713S175000, C380S283000, C380S285000
Reexamination Certificate
active
07822987
ABSTRACT:
A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.
REFERENCES:
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4890323 (1989-12-01), Beker et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5159632 (1992-10-01), Crandall
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5396558 (1995-03-01), Ishiguro et al.
patent: 5400403 (1995-03-01), Fahn et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: 5442707 (1995-08-01), Miyaji et al.
patent: 5627893 (1997-05-01), Demytko
patent: 5661805 (1997-08-01), Miyauchi
patent: 5721781 (1998-02-01), Deo et al.
patent: 5748740 (1998-05-01), Curry et al.
patent: 5793866 (1998-08-01), Brown et al.
patent: 5805702 (1998-09-01), Curry et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5870470 (1999-02-01), Johnson et al.
patent: 5881038 (1999-03-01), Oshima et al.
patent: 5907618 (1999-05-01), Gennaro et al.
patent: 5917913 (1999-06-01), Wang
patent: 5955717 (1999-09-01), Vanstone
patent: 5960084 (1999-09-01), Angelo
patent: 6038549 (2000-03-01), Davis et al.
patent: 6041314 (2000-03-01), Davis
patent: 6178507 (2001-01-01), Vanstone
patent: 0440800 (1991-08-01), None
patent: 0588339 (1994-03-01), None
patent: 2536928 (1984-06-01), None
patent: 2309890 (1997-06-01), None
patent: 06-295154 (1994-10-01), None
patent: 08-101868 (1996-04-01), None
patent: 08-507619 (1996-08-01), None
patent: WO 91/16691 (1991-10-01), None
Ferreira, R.C.; “The Smart Card: A high security tool in EDP”; Philips Telecommunication Review; Sep. 1989; pp. 1-19; vol. 47, No. 3; Philips Telecommunicatie Industrie N.V. Hilversum; NL.
Miyaji A.; “Elliptic Curves Suitable for Cryptosystems”; IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences; Jan. 1, 1994; pp. 98-104; vol. E77-A, No. 1.
Schnorr C.P.; “Efficient Signature Generation by Smart Cards”; Journal of Cryptology: Jan. 1, 1991; pp. 161-174; vol. 4, No. 3.
Koblitz, N.; “Elliptic Curve Cryptosystems”; Mathematics of Computation; Jan. 1987; pp. 203-209; vol. 48, No. 177.
Kenji, Koyama et al.; “Elliptic Curve Cryptosystems and Their Applications”; IEICE Transactions on Information and Systems; Jan. 1, 1992; pp. 50-57; vol. E75-D, No. 1.
Waleffe, D. De et al.; “Corsair: A Smart Card for Public Key Cryptosystems”; Advances in Cryptology—Proceedings of Crypto, Santa Barbara; Aug. 11-15, 1990; pp. 502-513, No. CONF. 10.
Schneier, B.; Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C; 1996, pp. 35-36; John Wiley & Sons, Inc.
Blake-Wilson, S. et al.; “Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)”; RFC 3278; Apr. 2002; The Internet Society.
Polk, W. et al.; “Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”; Sec. 2.2.: Signature Algorithms; RFC 3279; Apr. 2002; The Internet Society.
Housley, R. et al.; “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”; RFC 3280; Apr. 2002; The Internet Society.
Kent, S.; “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Management”; RFC 1422; Feb. 1993.
Blake Cassels & Graydon LLP
Callahan Paul
Certicom Corp.
Orange John R. S.
Pyzocha Michael
LandOfFree
Data card verification system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data card verification system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data card verification system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4201523