Method and system for identity recognition

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S175000, C713S177000

Reexamination Certificate

active

07822988

ABSTRACT:
In accordance with various aspects, the present invention relates to methods and systems for sending an identity information document comprising selecting identity information from a self-identity information store for inclusion in the identity information document. The selected identity information is read from a self-identity information store. The identity information document is generated to include the selected identity information and one or more keys, and signed using a key associated with one of the keys included in the identity information document. The identity information document is then sent to a recipient. Receiving an identity information document comprises receiving a signed identity information document from an originator. A determination is made as to whether identity information in the identity information document is reliable. The identity information is saved in a recognized identity information store if the identity information is determined to be reliable. If the identity information is determined to be unreliable, an identity recognition number retrieved from the sender is compared to an identity recognition number generated by the recipient based on information in the received identity information document. If the identity recognition number is verified, the identity information is saved in the recognized identity information store.

REFERENCES:
patent: 5872847 (1999-02-01), Boyle et al.
patent: 6216229 (2001-04-01), Fischer
patent: 6266420 (2001-07-01), Langford et al.
patent: 6434399 (2002-08-01), Kamperschroer
patent: 6801998 (2004-10-01), Hanna et al.
patent: 7068789 (2006-06-01), Huitema et al.
patent: 2002/0016777 (2002-02-01), Seamons et al.
patent: 2002/0044650 (2002-04-01), Shen
patent: 2003/0056093 (2003-03-01), Huitema et al.
patent: 2003/0115342 (2003-06-01), Lortz
patent: 2004/0010696 (2004-01-01), Cannon et al.
patent: 2004/0204087 (2004-10-01), Carlsson
patent: WO 02/073341 (2002-09-01), None
patent: WO 03/038557 (2003-05-01), None
Login-Less Simplified Transaction Process. IBM Tech, dis. bull., Feb. 2002, Issue 454, p. 362.
Login-Less Simplified Transaction Process. IBM Tech, dis. bull., Feb. 2002, Issue 454, p. 362.
Login-Less Simplified Transaction Process. IBM Tech, dis. bull., Feb. 2002, Issue 454, p. 362.
“Self-certified signatures,” by Byoungcheon Lee; Kwangjo Kim, Process in Cryptology—INDOCRYPT 2002. Third International Conference on Cryptology in India. Proceedings (Lecture Notes in Computer Sci. Col. 2551), p. 119-214.
“Attribute authority functions that enable certifying personal attributes,” by Murat, Yuichi; Odahara, Hideyuki, NTT Review v 14 n 6 Nov. 2002, p. 59-62.
“Digital signature/multisignature schemes giving public key verification and message recovery simultaneously,” by Tzong-Chen Wu, Computer Systems Science and Engineering, vol. 16, No. 6, p. 329-37.
“Self-certified identity information using the minimum knowledge,” by H.
Login-less Simplified Transaction Process. IBM Technical Disclosure Bulletin, Feb. 2002, Issue 454, p. 362.
Hoang, Daniel L., U.S. Appl. No. 10/692,530. Office Communication dated Mar. 16, 2007.
“Self-certified identity information using the minimum knowledge,” by Hyung-Kyu Yang; John-Ho Choi; Youhng-Hwa Ann, 1996 IEEE TENCON Digital Signal Processing Applications Proceedings (Cat No. 96CH36007), Part vol. 2, p. 641-7.
“Microsoft to Acquire Groove Networks,” http://www.groove.net/home/index.cfm.
“Microsoft Office Groove,” http://en.wikipedia.org/wiki/Microsoft—Office—Groove, printed Jun. 28, 2007, pp. 1-2.
“vCard,” http://en.wikipedia.org/wiki/VCard, printed Jun. 28, 2007, pp. 1-3.
“X.509,” http://en.wikipedia.org/wiki/X.509, printed Jun. 28, 2007, pp. 1-6.
Callas et al., “OpenPGP Message Format,” NWG Apr. 2007, pp. 1-80.
“Pretty Good Privacy,” http://en.wikipedia.org/wiki/Pretty—Good—Privacy, printed Jun. 28, 2007, pp. 1-8.
Garfinkel, Simson L., “Pgp: pretty good privacy” Google Book Search, printed Jun. 28, 2007, pp. 1-4.
Dawson et al., “vCard MIME Directory Profile,” NWG RFC 2426, Sep. 1998 http://tools.ietf.org/html/rfc2426, pp. 1-42.
Udell, Jon, “Groove supports diverse group formation in a fluid and highly secure way,” InfoWorld, printed Jun. 27, 2007, pp. 1-2.
“Security Services,” Goove Brief, 2002 Groove Networks, Inc., pp. 1-4.
“Groove Security Bulletin,” Groove Brief, 2002 Groove Networks, Inc., pp. 1-6.
“vCard,” Version 2.1, A versit Consortium Specification, Sep. 18, 1996 http://www.imc.org/pdi/vcard-21.txt, printed Jun. 27, 2007, pp. 1-26.
Housley et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” RFC 3280, NWG Apr. 2002, http://tools.ietf.org/html/rfc3280, printed Jun. 27, 2007, pp. 1-127.
“Commerce-An Introduction,” by A. Meyer; P. Taylor; Computing & Control Engineering Journal, vol. 11, No. 3, p. 107-8; IEE; Jun. 2000, UK.
“Attribute Authority Functions That Enable Certifying Personal Attributes,” by Y. Murata; H. Odahara; NTT Review, v. 14 n.6, Nov. 2002; p. 59-62.
“Threshold Signature Scheme Using Self-Certified Public Keys,” by Tzong-Sun Wu; Chien-Lung Hsu; Journal of Systems and Software, vol. 67, No. 2; p. 89-97.
“A Study of the Key Distribution in Secure Multicast,” by Zhu Wen-Tao; Xiong Ji-Ping; Li Jin-Sheng; Hone Pei-Lin; Journal of Software, vol. 14, No. 12; p. 2052-9.
“Security Analysis of the Improved Group Signature,” by Z. Jiamhong; C. Ziaofeng; W. Yumin; Proceedings 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), p. 171-4.
“Co-operatively Formed Group Signatures,” by G. Maitland; C. Boyd; Topics in Cryptology—CT-RSA 2002. Cryptographers' Track at the RSA Conference 2002. Proceedings (Lecture Notes in Computer Science vol. 2271), p. 218-35.
“A Look at Some More PKI Design Efforts,” by A. Mione; Digital Systems Report, 1998, vol. 20, No. 4; pp. 15-21.
“Authenticated Secure Communications in Mobile Ad Hoc Networks,” by M. Bohio; A. Miri; Proceedings of the 2004 IEEE Canadian Conference on Electrical and Computer Engineering, Niagara Falls, Canada, May 2004, vol. 3; p. 1689-1692.
“An Identity-Based Signature From Gap Diffie-Hellman Groups,” by J.C. Cha; J.H. Cheon; 6thInt'l Workshop on Practice and Theory in Public Key Cryptology—PKC'2003, Lecture Notes on Computer Science 2567, Springer-Verlag 2003, p. 18-30.
“On the Security of Homage Group Authentication Protocol,” by E. Jaulmes; G. Poupard; IEE, published 2002; Proceedings Financial Cryptology 2000, Lecture Notes in Computer Science; p. 106-116.
“Delegation Chains Secure Up to Constant Length,” by M. Abe; T. Okamoto; Int'l Conference on Information and Communications Security; 2ndInt'l Conference, ICICS'99, Sydney, Australia, 1999, p. 144-156.
“An Improvement of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers,” by S.F. Tzeng; M.S. Hwang; C.Y. Yang; Computers & Security, vol. 23, pp. 174-178, 2004.
“Authorization Models—PKI Versus the Real World,” by S. Matthews; Information Security Technical Report, vol. 5, No. 4 (2000), pp. 66-71.
“Integrated Security Services for Dynamic Coalitions,” by H. Khurana; S.Gavrila; R. Bobba; R. Koleva; A. Sonalker; E. Dinu; V. Gligor; J. Baras; Proceedings of the 3rdDARPA Information Survivability Conference and Exposition, Washington, D.C., Apr. 2003, p. 38-40.
Office Action dated Sep. 6, 2007 in U.S. Appl. No. 10/692,530.
Non-final Office Action dated Apr. 2, 2008 in U.S. Appl. No. 10/692,530, filed Oct. 24, 2003.
Final Office Action dated Sep. 30, 2008 in U.S. Appl. No. 10/692,530, filed Oct. 24, 2003.
Non-Final Office Action dated Mar. 16, 2007 in U.S. Appl. No. 10/692,530.
Non-Final Office

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for identity recognition does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for identity recognition, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for identity recognition will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4208457

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.