Cryptography – Key management
Reexamination Certificate
2005-11-22
2005-11-22
Barron, Gilberto (Department: 2132)
Cryptography
Key management
C380S044000, C380S279000, C380S280000, C713S176000, C713S192000
Reexamination Certificate
active
06968060
ABSTRACT:
For a set (Lk) of embedded systems, an authorized operator with identifier (OPj) creates a mother public key (KpM) and a mother private key (KsM). The identifier (OPj), the range of identifiers referenced (Lk) and the mother public key (KpM) are published. For each embedded system (SNi), a diversified key (KsMi) is created from the identifier (SNi) and stored. For every public key (Kp) generated by an embedded system, a cryptographic control value (Sci) is calculated on the public key (Kp), an algorithm identifier (CA1) and the utilization parameters (U) of this key, using a zero knowledge signature algorithm, and a certification request message (MRCA) that includes control value (Sci), the identifier of the operator (Opj), and identifier (SNi) is transmitted to a certification authority, which retrieves the identifier (Opj) and the value of the mother public key (KpM).
REFERENCES:
patent: 4944007 (1990-07-01), Austin
patent: 5164988 (1992-11-01), Matyas et al.
patent: 5586186 (1996-12-01), Yuval et al.
patent: 6041704 (2000-03-01), Pauschinger
patent: 6134658 (2000-10-01), Multerer et al.
patent: 0 576 224 (1993-12-01), None
Holloway C: “Controlling the Use of Cryptographic Keys” Proceedings Of Compsec International 1995, 12th World Conference on Computer Security, Audit and Control, London UK, 25-27 Oct. 1995, pp. 587-598; XP000584311, Oxford, UK, Elsevier, UK ISBN: 1-85617-294-5; p. 590, col. 1, last par. p. 597.
Matyas S M: “Key Handling with Control Vectors” IBM Systems Journal, 1991, USA, vol. 30, No. 2, pp. 151-174, XP000234622 ISSN: 0018-8670 p. 162 - p. 163, p. 169.
Bull S.A.
Dinh Minh
Kondracki Edward J.
Miles & Stockbridge P.C.
LandOfFree
Method for verifying the use of public keys generated by an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for verifying the use of public keys generated by an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for verifying the use of public keys generated by an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3496015