Method for sharing the authorization to use specific resources

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S279000, C380S045000

Reexamination Certificate

active

07343014

ABSTRACT:
The invention relates to a method for sharing the authorization to use specific resources among multiple devices, which resources are accessible via messages on which a secret key operation was applied with a predetermined secret master key d available at a master device11. In order to provide an optimized sharing of authorization, it is proposed that the master device11splits the secret master key d into two parts d1, d2. A piece of information relating to the first part d1of the secret master key d is forwarded to the slave device13for enabling this slave device to perform a partial secret key operation on a message m. The second part d2of the secret master key d is forwarded to a server12for enabling the server12to perform partial secret key operations on a message m received from the slave device13.

REFERENCES:
patent: 7095852 (2006-08-01), Wack et al.
patent: 2005/0114666 (2005-05-01), Sudia
Pfleeger (Charles P. Pfleeger, “Security in computing”, 2nd edition, 1996, ISBN: 0133374866), p. 271-276.
Stallings (William Stallings, “Cryptography and network security”, 2th edition, 1998, ISBN: 0138690170), p. 22-23 and 184-185.
Philip MacKenzie and Michael Reiter, “Two-Party Generation of DSA Signatures”, Lecture Notes in Computer Science, “Springer Berlin/Heidelberg, ISSN: 0302-9743”, 2001.
MacKenzie (MacKenzie and Reiter “Delegation of Cryptographic Servers for Capture-Resilient Devices”, Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 10-19, ISBN: 1-58113-385-5, 2001).
Menezes et al. (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of applied cryptography”, 1997, ISBN: 0849385237), p. 584-586.
A. Arsenault and S. Farrell, “Securely Available Credentials—Requirements,” Network Working Group RFC 3157, Baltimore Technologies, Aug. 2001, 20pp.
D. Boneh et al., “A Method for Fast Revocation of Public Key Certificates and Security Capabilities,” 12pp.
C. Gehrmann and Kaisa Nyberg, “Enhancements to Bluetooth Baseband Security,” 15pp.
“Call for Propossals for Content Protection&Copy Management Technologies,” Digital Video Broadcasting, DVB CPT rev. 1.2, Jul. 5, 2001, 23pp.
C. Gehrmann, Kaisa Nyberg and C. Mitchell, “The Personal CA—PKI for a Personal Area Network,” 5pp.
P. MacKenzie and M. Reiter, “Delegation of Cryptographic Servers for Capture-Resilient Devices,” DIMACS Technical Report 2001-37, Nov. 2001, 38pp.
P. MacKenzie and M. Reiter, “Networked Cryptographic Devices Resilient to Capture,” DIMACS Technical Report 2001-19, May 2001, 38pp.
“Securely Available Credentials(Sacred),” last modified Mar. 4, 2003, 3pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for sharing the authorization to use specific resources does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for sharing the authorization to use specific resources, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for sharing the authorization to use specific resources will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3969304

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.