Method for securely using digital signatures in a commercial cry

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 30, H04K 100

Patent

active

056596162

ABSTRACT:
A system for securely using digital signatures in a commercial cryptographic system that allows industry-wide security policy and authorization information to be encoded into the signatures and certificates by employing attribute certificates to enforce policy and authorization requirements. In addition to value limits, cosignature requirements and document type restrictions that can be placed on transactions, an organization can enforce with respect to any transaction geographical and temporal controls, age-of-signature limitations, preapproved counterparty limitations and confirm-to requirements by using attribute certificates for the transacting user. Restrictions on distribution of certificates can be set using attribute certificates. Certificates can be used also to ensure key confinement and non-decryption requirements of smartcards in this system.

REFERENCES:
patent: 4625076 (1986-11-01), Okamoto et al.
patent: 4981370 (1991-01-01), Dziewit et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5031214 (1991-07-01), Dziewit et al.
patent: 5157726 (1992-10-01), Merkle et al.
patent: 5163091 (1992-11-01), Graziano et al.
patent: 5191613 (1993-03-01), Graziano et al.
patent: 5214702 (1993-05-01), Fischer
ANSI X9.30-199x (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA, Jun. 1, 1994, pp. i-86.
Secure Data Network System, Access Control Specification, Access Control Information Specification (ACIS) Addendum 1 (SDN.802/1), Jul. 25, 198 pp. ii-85.
Secure Data Network System, Access Control Specification, SDN,802, Rev. 1.0 Jul. 25, 1989, pp. 1.43.
Secure Data Network System; Access Control Concept Document (Revision 1.3), SDN.801, Jul. 26, 1989, pp. 1-18.
European Computer Manufacturers Association, Standard ECMA-138 Security in Open Systems --Data Elements and Service Definitions, Dec. 1989, pp. i-81.
Addison Fischer, Workflow. 2000-Electronic Document Authorization in Practice, Fischer International Systems Corporation, Copyright 1992, 7 pages.
Richard Ankney, Certificate Management for the Financial Services Industry, Aba/Scitech/Notaization and Nonrepudiation WG. Mtg. of Jul. 1, 1993.
ANSI X9.30 (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA, Mar. 29, 1993, pp. i-71.
ANSI X9.30-199x (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management of DSA, Sep. 27, 1993, p. i-87.
Rich Ankney, et al. Enhanced Management Controls Using Attribute Certificates, ASC X9 Project Proposal No. X9F-1-3, Nov. 10, 1993, 13 pages.
ANSI X9.30-199x (Draft), Executive Summary, Public Key Cryptography Using Irreversibl Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA Nov. 18, 1993, pp. 1-6.
ANSI X9.xx-19x (Working Draft) Enhanced Management Controls Using Attribute Certificates, Jan. 3, 1994, pp. 1-18.
ANSI X9.30-199X (Working Draft) Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry: Part 3.
PKCS #7: Cryptographic Message Syntax Standard, Version 1.4, Jun. 3, 1991, pp. 1-24.
Recommendation X 500: The Directory-Overview of Concepts, Models and Services, Melbourne, 1988, pp. 1-13.
Robert Jueneman, Limiting The Liability of CAs and Individuals Regarding the Use of Digital Signatures, Jun. 30, 1993, pp. 1-8.
John Linn, Practical Authentication for Distributed Computing, IEEE, 1990, pp. 32-40.
Morrie Gasser et al, An Architecture for Practical Delegation in a Distributed System, IEEE, 1990, pp. 20-30.
Denis Pinkas et al. Sesame: Secure European System for Applications in a Multivendor Environment, Issue 1, Feb. 1993.
J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I, Feb. 1993, pp. 1-42.
S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II, Feb. 1993, pp. 1-32.
X1258 Version 2, ASC X-12 Draft Standard . . . Managing Electronic Data Interchange, pp. 1-40.
Financial Institution Sign-On Authentication for Wholesale Financial Transactions X926, Approved:Feb. 28,1990, pp. 1-25.
Draft ANSI X9 30-199x, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3, Nov. 18, 1993, pp. 1-6.
PKCS #7: Cryptographic Message Syntax Standard Version 15, Revised Nov. 1, 1993.
Information Technology --Open Systems Interconnection-The Directory: Authentication Framework --Recommendation X 509 ISO/IEC 9594-8 (1993), pp. i-35.
Accredited Standards Committee X9, X9-Financial Services, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3, Oct. 7, 1995, pp. i-81.
Frank Sudia and Richard Ankney, Commercialization of Digital Signatures, July 20 Boston, pp. 1-16.
Addison M. Fischer, Electronic Document Authorization, National Computer Security Conference, 1992, pp. 1-23.
ECMA --Standard ECMA-138 --Security In Open Systems --Data Elements and Service Definitions, Dec. 1989, pp. i-81.
ECMA --Security in Open Systems A Security Framework, ECMA TR/46, Jul. 1988, pp. i-71.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for securely using digital signatures in a commercial cry does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for securely using digital signatures in a commercial cry, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for securely using digital signatures in a commercial cry will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1110839

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.