Generation and use of digital signatures

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S180000

Reexamination Certificate

active

09614487

ABSTRACT:
A digital signature is generated in association with target data. The computer generating the digital data encrypts the digital signature using a public key encryption system. The private key is stored in dynamic memory in a secure manner. The public key associated with the private key is stored in an accessible database. The public key is accessed from the database and used by recipient computers to authenticate the target data by decrypting the encrypted digital signature. When the computer generating the digital signature is restarted, the private key stored in dynamic memory is lost. The computer obtains a new private and public key pair from the public key encryption system. The previously used public key is maintained in the database until a predefined time has elapsed, after which it is removed from the database.

REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 1198134 (1999-04-01), None
Bruce Schneier, 1996, Katherine Schowalter, “Applied Cryptography”.
Bruce Schneier, 1996, John Wiley & Sons, Inc., “Applied Cryptography”, pp. 178-187.
Novel applications of cryptography in digital communications; Omura, J.K.; Communications Magazine, IEEE vol. 28, Issue 5, May 1990 pp. 21-29.
Key management for large scale end-to-end encryption; Witzke et al.; Security Technology, Proceedings. IEEE 28th Annual 1994 International Camahan Conference on Oct. 12-14, 1994 pp. 76-79.
Certificate path generating protocol (CPGP) for authenticated signaling in ATM networks; Jun Xu; Singhal, M.; Network Protocols, 1998. Proceedings. Sixth International Conference on Oct. 13-16, 1998, pp. 282-289.
Park, J. S., and Sandhu, R.: “Secure cookies on the Web,” IEEE Internet Computing, Jul.-Aug. 2000, pp. 36-44, XP002190888 pp. 39-41, “Providing Integrity,” Figures 3.4.
Park, J. S., “Secure Attribute Services on the Web,” Jun. 1999, Dissertation, George Mason University, Fairfax, VA., XP002190891.
Antonomasia (ant@notatla.demon.co.uk) Internet Newsgroup: “Volatile Shared Memory (For Linux 2.2)” ‘Online!’ Jan. 4, 2000, XP002190889, Newsgroups:jyu.ohjelmointi.coderpunks. Retrieved from the Internet: URL: http://groups.google.com/>.
Gutmann, Peter: “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, ‘Online!’Jul. 22-23. 1996, XP002190890, San Jose, CA.
Stallings, W.: “Cryptography and Network Security: Principles and Practice—2nd,” 1998. Prentice Hall. XP002190892, Chapter 6.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Generation and use of digital signatures does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Generation and use of digital signatures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Generation and use of digital signatures will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3882439

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.