Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-06-19
2007-06-19
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C713S180000
Reexamination Certificate
active
09614487
ABSTRACT:
A digital signature is generated in association with target data. The computer generating the digital data encrypts the digital signature using a public key encryption system. The private key is stored in dynamic memory in a secure manner. The public key associated with the private key is stored in an accessible database. The public key is accessed from the database and used by recipient computers to authenticate the target data by decrypting the encrypted digital signature. When the computer generating the digital signature is restarted, the private key stored in dynamic memory is lost. The computer obtains a new private and public key pair from the public key encryption system. The previously used public key is maintained in the database until a predefined time has elapsed, after which it is removed from the database.
REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 1198134 (1999-04-01), None
Bruce Schneier, 1996, Katherine Schowalter, “Applied Cryptography”.
Bruce Schneier, 1996, John Wiley & Sons, Inc., “Applied Cryptography”, pp. 178-187.
Novel applications of cryptography in digital communications; Omura, J.K.; Communications Magazine, IEEE vol. 28, Issue 5, May 1990 pp. 21-29.
Key management for large scale end-to-end encryption; Witzke et al.; Security Technology, Proceedings. IEEE 28th Annual 1994 International Camahan Conference on Oct. 12-14, 1994 pp. 76-79.
Certificate path generating protocol (CPGP) for authenticated signaling in ATM networks; Jun Xu; Singhal, M.; Network Protocols, 1998. Proceedings. Sixth International Conference on Oct. 13-16, 1998, pp. 282-289.
Park, J. S., and Sandhu, R.: “Secure cookies on the Web,” IEEE Internet Computing, Jul.-Aug. 2000, pp. 36-44, XP002190888 pp. 39-41, “Providing Integrity,” Figures 3.4.
Park, J. S., “Secure Attribute Services on the Web,” Jun. 1999, Dissertation, George Mason University, Fairfax, VA., XP002190891.
Antonomasia (ant@notatla.demon.co.uk) Internet Newsgroup: “Volatile Shared Memory (For Linux 2.2)” ‘Online!’ Jan. 4, 2000, XP002190889, Newsgroups:jyu.ohjelmointi.coderpunks. Retrieved from the Internet: URL: http://groups.google.com/>.
Gutmann, Peter: “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, ‘Online!’Jul. 22-23. 1996, XP002190890, San Jose, CA.
Stallings, W.: “Cryptography and Network Security: Principles and Practice—2nd,” 1998. Prentice Hall. XP002190892, Chapter 6.
Amdur Eugene
Koch C. Harald
Lamb Steven
Reid Irving
LandOfFree
Generation and use of digital signatures does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Generation and use of digital signatures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Generation and use of digital signatures will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3882439