Method for verifying the use of public keys generated by an...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000, C380S279000, C380S280000, C713S176000, C713S192000

Reexamination Certificate

active

06968060

ABSTRACT:
For a set (Lk) of embedded systems, an authorized operator with identifier (OPj) creates a mother public key (KpM) and a mother private key (KsM). The identifier (OPj), the range of identifiers referenced (Lk) and the mother public key (KpM) are published. For each embedded system (SNi), a diversified key (KsMi) is created from the identifier (SNi) and stored. For every public key (Kp) generated by an embedded system, a cryptographic control value (Sci) is calculated on the public key (Kp), an algorithm identifier (CA1) and the utilization parameters (U) of this key, using a zero knowledge signature algorithm, and a certification request message (MRCA) that includes control value (Sci), the identifier of the operator (Opj), and identifier (SNi) is transmitted to a certification authority, which retrieves the identifier (Opj) and the value of the mother public key (KpM).

REFERENCES:
patent: 4944007 (1990-07-01), Austin
patent: 5164988 (1992-11-01), Matyas et al.
patent: 5586186 (1996-12-01), Yuval et al.
patent: 6041704 (2000-03-01), Pauschinger
patent: 6134658 (2000-10-01), Multerer et al.
patent: 0 576 224 (1993-12-01), None
Holloway C: “Controlling the Use of Cryptographic Keys” Proceedings Of Compsec International 1995, 12th World Conference on Computer Security, Audit and Control, London UK, 25-27 Oct. 1995, pp. 587-598; XP000584311, Oxford, UK, Elsevier, UK ISBN: 1-85617-294-5; p. 590, col. 1, last par. p. 597.
Matyas S M: “Key Handling with Control Vectors” IBM Systems Journal, 1991, USA, vol. 30, No. 2, pp. 151-174, XP000234622 ISSN: 0018-8670 p. 162 - p. 163, p. 169.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for verifying the use of public keys generated by an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for verifying the use of public keys generated by an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for verifying the use of public keys generated by an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3496015

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.