Method and apparatus for securely transferring data

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

10623008

ABSTRACT:
A method and apparatus is provided for securely transferring first and second data from a user to first and second parties respectively. More particularly, the user encrypts the first data using a first encryption key associated with the first party, and then encrypts the second data using, as encryption parameters, both public data of the first party and third data comprising the encrypted first data. The third data is then provided, preferably via the second party, to the first party, and the encrypted second data is provided to the second party. The first party uses a first decryption key to decrypt the encrypted first data, as provided to the first party in the third data, whereby to recover the first data. The first party also uses the third data, along with private data related to the aforesaid public data, to generate a second decryption key which is then provided to the second party to enable it to decrypt the encrypted second data.

REFERENCES:
patent: 4688250 (1987-08-01), Corrington et al.
patent: 7142676 (2006-11-01), Hillier et al.
patent: 2001/0039535 (2001-11-01), Tsiounis et al.
patent: 2002/0174075 (2002-11-01), Mirlas et al.
patent: 2003/0084001 (2003-05-01), Chang
patent: 2004/0010700 (2004-01-01), Mont
patent: 2004/0240666 (2004-12-01), Cocks
patent: 0 343 805 (1989-11-01), None
patent: 0 673 154 (1995-09-01), None
patent: 1 050 992 (2000-11-01), None
Levy, I., “An Overview of Identifier-Based Public Key Cryptography,”Internet and Wireless Security, IEE Publishing, pp. 121-131 (Apr. 22, 2002).
Levy, I., “Identifier Based PKC-Potential Applications,”1st Annual PKI Research Workshop, Communications-Electronics Security Group(CESG)Presentation, Gaithersburg, Maryland, pp. 1-42 (Apr. 25, 2002).
Menezes, A., et al.,Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and its Applications, Boca Raton, Florida, pp. 497-498, 507-508 (1997).
Boneh, Dan, et al., “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology, CRYPTO 2001, 2001, pp. 213-229.
Boneh, Dan, et al., “Identity-Based Mediated RSA,”3rd Workshop on Information Security Application, Aug. 2002.
Cocks, Clifford, “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptography and Coding, 2001, pp. 360-363.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securely transferring data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securely transferring data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely transferring data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3874436

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.