Method and system for authorizing generation of asymmetric...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S279000, C380S282000, C713S171000, C713S193000, C726S017000, C726S018000, C726S019000

Reexamination Certificate

active

07149310

ABSTRACT:
A method and system for generating asymmetric crypto-keys usable by network users to transform messages is provided. The system includes a first network station associated with a user, a second network station associated with a trusted entity, and a third network station associated with a sponsor. The trusted entity authorizes the sponsor to generate the asymmetric crypto-key. The sponsor generates a symmetric crypto-key and associated user identification. The sponsor both stores the generated symmetric crypto-key and the associated user identification and transmits the symmetric crypto-key and the associated user identification to the trusted entity. The trusted entity then distributes the symmetric crypto-key and user identification to the user. The user then presents the user identification to the sponsor. The sponsor then generates a challenge and transforms the challenge with the stored symmetric crypto-key. The sponsor transmits the transformed challenge to the user. The user then further transforms the challenge and transmits the further transformed challenge back to the sponsor. In response to receipt of the further transformed challenge, the sponsor then generates the asymmetric crypto-key.

REFERENCES:
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5440635 (1995-08-01), Bellovin et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5737419 (1998-04-01), Ganesan
patent: 5748735 (1998-05-01), Ganesan
patent: 5799086 (1998-08-01), Sudia
patent: 5923756 (1999-07-01), Shambroom
patent: 5982898 (1999-11-01), Hsu et al.
patent: 6009177 (1999-12-01), Sudia
patent: 6073237 (2000-06-01), Ellison
patent: 6185685 (2001-02-01), Morgan et al.
patent: 6212634 (2001-04-01), Geer et al.
patent: 6275941 (2001-08-01), Saito et al.
patent: 6370249 (2002-04-01), Van Oorschot
patent: 6553493 (2003-04-01), Okumura et al.
patent: 6704867 (2004-03-01), Cordery
R. Ganesan, “Yaksha: Augmenting Kerberos With Public Key Cryptography”, Proceedings of the Symposium on Network and Distributed System Security, Feb. 16, 1995, pp. 132-143.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for authorizing generation of asymmetric... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for authorizing generation of asymmetric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for authorizing generation of asymmetric... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3660393

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.