Cryptography – Key management – Key distribution
Reexamination Certificate
2003-07-15
2008-03-11
Zand, Kambiz (Department: 2134)
Cryptography
Key management
Key distribution
C380S279000, C380S045000
Reexamination Certificate
active
07343014
ABSTRACT:
The invention relates to a method for sharing the authorization to use specific resources among multiple devices, which resources are accessible via messages on which a secret key operation was applied with a predetermined secret master key d available at a master device11. In order to provide an optimized sharing of authorization, it is proposed that the master device11splits the secret master key d into two parts d1, d2. A piece of information relating to the first part d1of the secret master key d is forwarded to the slave device13for enabling this slave device to perform a partial secret key operation on a message m. The second part d2of the secret master key d is forwarded to a server12for enabling the server12to perform partial secret key operations on a message m received from the slave device13.
REFERENCES:
patent: 7095852 (2006-08-01), Wack et al.
patent: 2005/0114666 (2005-05-01), Sudia
Pfleeger (Charles P. Pfleeger, “Security in computing”, 2nd edition, 1996, ISBN: 0133374866), p. 271-276.
Stallings (William Stallings, “Cryptography and network security”, 2th edition, 1998, ISBN: 0138690170), p. 22-23 and 184-185.
Philip MacKenzie and Michael Reiter, “Two-Party Generation of DSA Signatures”, Lecture Notes in Computer Science, “Springer Berlin/Heidelberg, ISSN: 0302-9743”, 2001.
MacKenzie (MacKenzie and Reiter “Delegation of Cryptographic Servers for Capture-Resilient Devices”, Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 10-19, ISBN: 1-58113-385-5, 2001).
Menezes et al. (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of applied cryptography”, 1997, ISBN: 0849385237), p. 584-586.
A. Arsenault and S. Farrell, “Securely Available Credentials—Requirements,” Network Working Group RFC 3157, Baltimore Technologies, Aug. 2001, 20pp.
D. Boneh et al., “A Method for Fast Revocation of Public Key Certificates and Security Capabilities,” 12pp.
C. Gehrmann and Kaisa Nyberg, “Enhancements to Bluetooth Baseband Security,” 15pp.
“Call for Propossals for Content Protection&Copy Management Technologies,” Digital Video Broadcasting, DVB CPT rev. 1.2, Jul. 5, 2001, 23pp.
C. Gehrmann, Kaisa Nyberg and C. Mitchell, “The Personal CA—PKI for a Personal Area Network,” 5pp.
P. MacKenzie and M. Reiter, “Delegation of Cryptographic Servers for Capture-Resilient Devices,” DIMACS Technical Report 2001-37, Nov. 2001, 38pp.
P. MacKenzie and M. Reiter, “Networked Cryptographic Devices Resilient to Capture,” DIMACS Technical Report 2001-19, May 2001, 38pp.
“Securely Available Credentials(Sacred),” last modified Mar. 4, 2003, 3pp.
Asokan Nadarajah
Niemi Valtteri
Nyberg Kaisa
Sovio Sampo
Fressola Alfred A.
Nokia Corporation
Poltorak Peter
Ware Fressola Van Der Sluys & Adolphson LLP
Zand Kambiz
LandOfFree
Method for sharing the authorization to use specific resources does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for sharing the authorization to use specific resources, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for sharing the authorization to use specific resources will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3969304