Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-03-20
2007-03-20
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S171000, C713S175000
Reexamination Certificate
active
10426256
ABSTRACT:
A method for group authentication using a public key cryptosystem that includes a public key and a private key, comprising the steps of providing a Private Key Share to a Tool of each Entity of each Group encompassed by a Boolean Expression of a prescribed Rule based upon the private key, encrypting a random number using the public key of the public key cryptosystem to generate a ciphertext challenge at a Verification Device, conveying the ciphertext challenge to the Tool of each Entity in communication with the Verification Device, generating a response to the ciphertext challenge using the Private Key Share of the Tool of each Entity in communication with the Verification Device, transmitting the response generated by each Entity in communication with the Verification Device to the Verification Device, combining the responses received from the Entities in communication with the Verification Device, determining whether any combination of the responses equals the random number wherein any combination that equals the random number identifies an Authenticated Group and any combination that does not equal the random number identifies a non-authenticated Group, and effecting an apposite course of action with respect to an Operation governed by the prescribed Rule based upon the outcome of the determining step.
REFERENCES:
patent: 5910989 (1999-06-01), Naccache
patent: 5946397 (1999-08-01), M'Raihi et al.
An Improved Anonymous ID-Based Key Issuing Protocol Yongquan Cai; Xiang Yan; Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on vol. 1, 30-01 Aug. 2006 pp. 472-475.
Research directions for automated software verification: using trusted hardware Devanbu, P.; Stubblebine, S.; Automated Software Engineering, 1997. Proceedings., 12th IEEE International Conference Nov. 1-5, 1997 pp. 274-279.
Cryptographically secure identity certificates Kirovski, D.; Jojic, N.; Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on vol. 5, May 17-21, 2004 pp. V-413-V-416 vol. 5.
Benaloh et al., Generalized Secret Sharing and Monotone Functions, Advances in Cryptology, Spring-Verlag, 1990, pp. 27-35.
Guthery, Group Authentication Using the Naccache Stern Public-Key Cryptosystem, 2003.
Naccache et al., A New Public-Key Cryptosystem, Advances in Cryptology—EUROCRYPT '97, Lecture Notes in Computer Science, 1997, Berlin, Germany.
Shamir, How to Share a Secret, Communications for the ACM, Nov. 1979, pp. 612-613.
Jacobs David A.
Jacobs & Kim LLP
Jung David
Mobile-Mind, Inc.
LandOfFree
Methods and systems for group authentication using the... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for group authentication using the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for group authentication using the... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3774093