Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2006-06-20
2006-06-20
Sneikh, Ayaz (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S168000, C713S176000, C713S180000, C713S181000, C726S003000, C726S004000, C726S005000, C726S027000, C726S028000, C726S029000, C726S030000, C380S030000, C380S044000, C380S045000, C380S279000, C380S282000
Reexamination Certificate
active
07065642
ABSTRACT:
A system for authentication of network users which is operable in multiple modes, includes a plurality of user network stations and at least one sponsor network station representing a sponsor. Each network station represents a user associated with an asymmetric crypto-key having either a first or second number of private portions, the second number being greater than the first number. The one or more sponsor network stations receive authentication requests from the user network stations, determine the identity of a user associated with each of the received authentication requests, select from two or more available modes of operation based upon the determined identity. If operation in one mode is selected, the sponsor network station signs a particular received authentication request using one private portion of an asymmetric crypto-key having a first number of private portions. However, if another mode is selected, the sponsor network station signs that particular authentication request using one private portion of an asymmetric crypto-key having a second number of private portions.
REFERENCES:
patent: 5748735 (1998-05-01), Ganesan
patent: 5825880 (1998-10-01), Sudia et al.
patent: 6026163 (2000-02-01), Micali
patent: 6094575 (2000-07-01), Anderson et al.
patent: 6263447 (2001-07-01), French et al.
Denning, D., “A Taxonomy for Key Escrow Encryption Systems”, ACM Inc., Mar. 1996, vol. 39, No. 3, entire document, www.cosc.georgetown.edu/˜denning/crypto/Taxonomy.html.
Denning, D., “Descriptions of Key Escrow Systems”, ACM Inc., Feb. 26, 1997, entire document, www.cosc.georgetown.edu/˜denning/crypto/Appendix.html.
Abelson, H., et al., “The Risks Of ‘Key Recovery,’ ‘Key Escrow,’ And ‘Trusted Third Party Encryption’”, CDT.org, 1998, entire document, www.cdt.org/crypto/risks98/.
deSa Colin
Ganesan Karuna
Sandhu Ravi
Antonelli Terry Stout & Kraus LLP
Baum Ronald
Sneikh Ayaz
TriCipher Inc.
LandOfFree
System and method for generation and use of asymmetric... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for generation and use of asymmetric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for generation and use of asymmetric... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3646018