Cryptography – Key management – Key distribution
Reexamination Certificate
2005-06-28
2005-06-28
Peeso, Thomas R. (Department: 2132)
Cryptography
Key management
Key distribution
C380S283000, C380S045000
Reexamination Certificate
active
06912285
ABSTRACT:
Secure bulk messaging mechanism in which, roughly described, a sender first encrypts a message once. The message can be decrypted with a message decryption key. These can be symmetric or asymmetric keys. For each recipient, the sender then encrypts the message decryption key with the recipient's public key. The sender then sends the encrypted message and the encrypted message decryption keys to a store-and-forward server. Subsequently, one or more recipients connect to the server and retrieve the encrypted message and the message encryption key that has been encrypted with the recipient's public key. Alternatively, the server can forward these items to each individual recipient. The recipient then decrypts the encrypted message decryption key with the recipient's private key, resulting in an un-encrypted message decryption key. The recipient then decrypts the message using the un-encrypted message decryption key.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4868877 (1989-09-01), Fischer
patent: 5005200 (1991-04-01), Fischer
patent: 5016274 (1991-05-01), Micali et al.
patent: 5081678 (1992-01-01), Kaufman et al.
patent: 5497422 (1996-03-01), Tysen et al.
patent: 5564106 (1996-10-01), Puhl et al.
patent: 5633932 (1997-05-01), Davis et al.
patent: 5646992 (1997-07-01), Subler et al.
patent: 5673316 (1997-09-01), Auerbach et al.
patent: 5719938 (1998-02-01), Haas et al.
patent: 5739512 (1998-04-01), Tognazzini
patent: 5794207 (1998-08-01), Walker et al.
patent: 5812671 (1998-09-01), Ross, Jr.
patent: 5953419 (1999-09-01), Lohstroh et al.
patent: 5956406 (1999-09-01), Maldy
patent: 6118873 (2000-09-01), Lotspiech et al.
Schneier, “Applied Cryptography,” 2nd Edition,Section 3.1, 1996, pp. 47-52.
Schneier, “Applied Cryptography,” 2nd Edition, Section 6.3, 1996, pp. 137-139.
Schneier, “Applied Cryptography,” 2nd Edition, Section 22.7, 1996, pp. 523-525.
Rivest, R., “The MD5 Message-Digest Algorithm”,Internet Engineering Task Force RFC No. 1321(Apr. 1992).
Peeso Thomas R.
Skadden, Arps Slate Meagher & Flom LLP
Tumbleweed Communications Corp.
LandOfFree
Mechanism for efficient private bulk messaging does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Mechanism for efficient private bulk messaging, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mechanism for efficient private bulk messaging will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3520865