Cryptography – Key management – Key escrow or recovery
Reexamination Certificate
2006-12-12
2006-12-12
Sheikh, Ayaz (Department: 2136)
Cryptography
Key management
Key escrow or recovery
C380S277000, C713S168000, C713S171000, C713S180000, C726S018000, C726S019000, C726S026000, C726S030000
Reexamination Certificate
active
07149311
ABSTRACT:
Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i.e., its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.
REFERENCES:
patent: 5535276 (1996-07-01), Ganesan
patent: 5557678 (1996-09-01), Ganesan
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5737419 (1998-04-01), Ganesan
patent: 5748735 (1998-05-01), Ganesan
patent: 5838792 (1998-11-01), Ganesan
patent: 5905799 (1999-05-01), Ganesan
patent: 6151676 (2000-11-01), Cuccia et al.
patent: 6173400 (2001-01-01), Perlman et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6317729 (2001-11-01), Camp et al.
patent: 6490680 (2002-12-01), Scheidt et al.
Ivan, Anca, et al, ‘Proxy Cryptography Revisited’, Dept. of CS, Courant Inst. of Mathematical Sciences, NY Univ., 2003, entire document, www.isoc.org/isoc/conferences
dss/03/proceedings/papers/14.pdf.
MacKenzie Philip D.
Reiter Michael Kendrick
Baum Ronald
Lucent Technologies - Inc.
Sheikh Ayaz
LandOfFree
Methods and apparatus for providing networked cryptographic... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for providing networked cryptographic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for providing networked cryptographic... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3680741