Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
1999-07-02
2002-04-02
Hayes, Gail (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S165000, C380S262000
Reexamination Certificate
active
06367010
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to the field of security and privacy on the Internet, and more particularly, to a method for generating secure symmetric encryption/decryption. The present invention encrypts the electronic document/message with a unique key in combination with a recipient's password. The electronic document/message is likewise decrypted using the unique key, which is store on the recipient's computer device, in combination with the recipient's password.
BACKGROUND OF THE INVENTION
Recently, the technological advances associated with the electronic data exchange, Internet, World Wide Web (WWW), and electronic commerce are providing many people an alternative to the traditional method of communicating and conducting business. For example, many people are now using the Internet as a preferred method for sending mail, documents and messages, purchasing goods and services, trading stocks, applying for loans and credit cards, and the like. As a result, sensitive and private information is constantly being transmitted over the Internet in exorbitant numbers.
As is well known, most data and information transmitted over the Internet are unsecured. Thus, in most instances, access to sensitive and private information on the Internet can only be accessed when the user provides the appropriate user identification (id) number and/or the corresponding personal id number (PIN) or password. This is also true when the user first logs on to his/her personal computer, portable digital assistant (PDA), and the like in order to access/run files, documents, programs, applications, etc.
As technology becomes more advanced and sophisticated, unauthorized people or “hackers” are developing techniques for accessing sensitive and private information that should be secure and private. Also, as more people use the Internet for various reasons, more and more sensitive and private information is transmitted over the Internet.
Fortunately, software engineers have developed ways to transmit sensitive and private information over the Internet in a secure manner. The sender encrypts the information, that is, alters the information so that it will look like meaningless garble of data to anyone other than the intended recipient. This information is then decrypted by the recipient so that the information is turned back into its original form. The general concept behind the traditional encryption-decryption method is that when a sender encrypts the message with a key, then only someone else with a matching key will be able to decrypt the message. Thus, it is important to use keys that provide the ability to have greater security. Accordingly, the present invention is directed to a method for providing a more advanced and sophisticated manner of preventing hackers from accessing sensitive and private information.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a method for generating secure symmetric encryption/decryption.
It is another object of the present invention to provide a secure method for transmitting sensitive and private information via the Internet.
It is yet another object of the present invention to provide a secure method for transmitting sensitive and private information in a cost efficient and timely manner via the Internet.
It is a further object of the present invention to provide a method for encrypting and decrypting information using unique keys in combination with the recipient's PIN numbers.
It is another object of the present invention to provide a method for encrypting and decrypting information using a unique key having a least 256 bits.
It is yet another object of the present invention to provide a method for encrypting and decrypting keys that are used to encrypt and decrypt the sensitive and private information.
These and other objects of the present invention are obtained by providing a method for generating secure symmetric encryption/decryption. The encryption process uses a unique key in combination with a recipient's password for encrypting information that is to be transmitted to the recipient. The decryption process likewise uses the unique key, which is stored on the recipient's computer device, in combination with the recipient's password to decrypt the information. The unique key according to the present invention includes, preferably, at least 256 bits. In addition, the present invention encrypts both the document/message and a session salt key to provide greater security.
REFERENCES:
patent: 5150407 (1992-09-01), Chan
patent: 5153919 (1992-10-01), Reeds, III et al.
patent: 5214698 (1993-05-01), Smith, Sr. et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5485519 (1996-01-01), Weiss
patent: 5588056 (1996-12-01), Ganesan
patent: 5619571 (1997-04-01), Sandstrom et al.
patent: 5623546 (1997-04-01), Hardy et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5677952 (1997-10-01), Blakley, III et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5694471 (1997-12-01), Chen et al.
patent: 5721780 (1998-02-01), Ensor et al.
patent: 5764766 (1998-06-01), Spratte
patent: 5768373 (1998-06-01), Lohstroh et al.
patent: 5771291 (1998-06-01), Newton et al.
patent: 5787169 (1998-07-01), Eldridge et al.
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5870473 (1999-02-01), Boesch et al.
patent: 5907618 (1999-05-01), Gennaro et al.
patent: 196 39 354 (1998-01-01), None
patent: 0 334 503 (1989-09-01), None
patent: 3-239032 (1991-10-01), None
patent: WO 98 34374 (1998-08-01), None
B. Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Oct. 18, 1995, pp. 170-175.*
Translation into English, Hoshino et al., Japanese Patent No. 3-239032, Oct. 24, 1991.
Khandkar Rahul
Sahasrabuddhe Unmesh
Venkatram Rajamadam C.
Viswanath Ravi
Warty Ashish
Darrow Jurtin T.
Hayes Gail
PostX Corporation
LandOfFree
Method for generating secure symmetric encryption and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for generating secure symmetric encryption and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for generating secure symmetric encryption and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2931626