Cryptography – Key management – Key distribution
Reexamination Certificate
2006-12-12
2006-12-12
Revak, Christopher (Department: 2136)
Cryptography
Key management
Key distribution
C380S279000, C380S282000, C713S171000, C713S193000, C726S017000, C726S018000, C726S019000
Reexamination Certificate
active
07149310
ABSTRACT:
A method and system for generating asymmetric crypto-keys usable by network users to transform messages is provided. The system includes a first network station associated with a user, a second network station associated with a trusted entity, and a third network station associated with a sponsor. The trusted entity authorizes the sponsor to generate the asymmetric crypto-key. The sponsor generates a symmetric crypto-key and associated user identification. The sponsor both stores the generated symmetric crypto-key and the associated user identification and transmits the symmetric crypto-key and the associated user identification to the trusted entity. The trusted entity then distributes the symmetric crypto-key and user identification to the user. The user then presents the user identification to the sponsor. The sponsor then generates a challenge and transforms the challenge with the stored symmetric crypto-key. The sponsor transmits the transformed challenge to the user. The user then further transforms the challenge and transmits the further transformed challenge back to the sponsor. In response to receipt of the further transformed challenge, the sponsor then generates the asymmetric crypto-key.
REFERENCES:
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5440635 (1995-08-01), Bellovin et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5737419 (1998-04-01), Ganesan
patent: 5748735 (1998-05-01), Ganesan
patent: 5799086 (1998-08-01), Sudia
patent: 5923756 (1999-07-01), Shambroom
patent: 5982898 (1999-11-01), Hsu et al.
patent: 6009177 (1999-12-01), Sudia
patent: 6073237 (2000-06-01), Ellison
patent: 6185685 (2001-02-01), Morgan et al.
patent: 6212634 (2001-04-01), Geer et al.
patent: 6275941 (2001-08-01), Saito et al.
patent: 6370249 (2002-04-01), Van Oorschot
patent: 6553493 (2003-04-01), Okumura et al.
patent: 6704867 (2004-03-01), Cordery
R. Ganesan, “Yaksha: Augmenting Kerberos With Public Key Cryptography”, Proceedings of the Symposium on Network and Distributed System Security, Feb. 16, 1995, pp. 132-143.
deSa Colin
Ganesan Karuna
Sandhu Ravi
Antonelli Terry Stout & Kraus LLP
Parthasarathy Pramila
Revak Christopher
TriCipher Inc.
LandOfFree
Method and system for authorizing generation of asymmetric... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for authorizing generation of asymmetric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for authorizing generation of asymmetric... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3660393