Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-05-23
2006-05-23
Zand, Kambiz (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S282000, C380S285000, C705S067000
Reexamination Certificate
active
07051206
ABSTRACT:
An encryption-free technique for enabling the self-authentication of value documents (including personal and commercial checks) presented at a point of purchase or financial institution. Certain data contained on the value document may be signed with a first digital signature and authenticated with a public key certificate issued from a trusted certificate authority. The signed data and public key certificate are stored on the value document, preferably in a two-dimensional bar code data format. In the case of certain personal value documents (such as checks, credit cards, passports, birth certificates, Social Security cards, etc.), a unique personal identification number (PIN) also may be included in the document data that is signed by a second digital signature. At a point of purchase, a merchant or teller can scan and read the data stored in the two-dimensional bar code and other magnetically recorded information, and together with the PIN the customer provides, can authenticate the value document thus presented using the second digital signature. Alternatively, if the customer is not present, if the personal value document contains the second digital signature, the document may be verified using a PIN-generating algorithm or other method that generates all permutations of PINs. The first digital signature alone may be used to authenticate selected data within the personal value document even when the PIN is not available. Similarly, in the case of a commercial value documents, authentication of pre-printed data may be based entirely upon only the first digital signature.
REFERENCES:
patent: 5337358 (1994-08-01), Axelrod et al.
patent: 5341428 (1994-08-01), Schatz
patent: 5509692 (1996-04-01), Oz
patent: 5737886 (1998-04-01), Kruckemeyer
patent: 5742685 (1998-04-01), Berson et al.
patent: 5793868 (1998-08-01), Micali
patent: 6073121 (2000-06-01), Ramzy
patent: 6170744 (2001-01-01), Lee et al.
patent: 6202157 (2001-03-01), Brownlie et al.
patent: 6289323 (2001-09-01), Gordon et al.
patent: 6324525 (2001-11-01), Kramer et al.
patent: 0 286 378 (1988-10-01), None
patent: 0 600 646 (1994-06-01), None
patent: 0 710 934 (1996-05-01), None
patent: 0 889 448 (1999-01-01), None
Standards For Efficient Cryptography, “SEC 1:Elliptic Curve Cryptography”, Certicom Research, Sep. 20, 2000, Version 1.0.
Standards For Efficient Cryptography, “SEC2: Recommended Elliptic Curve Domain Parameters”, Certicom Research, Sep. 20, 2000, Version 1.0.
International Search Report, Jan. 16, 2003.
Giest Bruce K.
Hayosh Thomas D.
Rode Lisa A.
Starr Mark T.
Unisys Corporation
Zand Kambiz
LandOfFree
Self-authentication of value documents using digital signatures does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Self-authentication of value documents using digital signatures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Self-authentication of value documents using digital signatures will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3636908