System and method for generation and use of asymmetric...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S176000, C713S180000, C713S181000, C726S003000, C726S004000, C726S005000, C726S027000, C726S028000, C726S029000, C726S030000, C380S030000, C380S044000, C380S045000, C380S279000, C380S282000

Reexamination Certificate

active

07065642

ABSTRACT:
A system for authentication of network users which is operable in multiple modes, includes a plurality of user network stations and at least one sponsor network station representing a sponsor. Each network station represents a user associated with an asymmetric crypto-key having either a first or second number of private portions, the second number being greater than the first number. The one or more sponsor network stations receive authentication requests from the user network stations, determine the identity of a user associated with each of the received authentication requests, select from two or more available modes of operation based upon the determined identity. If operation in one mode is selected, the sponsor network station signs a particular received authentication request using one private portion of an asymmetric crypto-key having a first number of private portions. However, if another mode is selected, the sponsor network station signs that particular authentication request using one private portion of an asymmetric crypto-key having a second number of private portions.

REFERENCES:
patent: 5748735 (1998-05-01), Ganesan
patent: 5825880 (1998-10-01), Sudia et al.
patent: 6026163 (2000-02-01), Micali
patent: 6094575 (2000-07-01), Anderson et al.
patent: 6263447 (2001-07-01), French et al.
Denning, D., “A Taxonomy for Key Escrow Encryption Systems”, ACM Inc., Mar. 1996, vol. 39, No. 3, entire document, www.cosc.georgetown.edu/˜denning/crypto/Taxonomy.html.
Denning, D., “Descriptions of Key Escrow Systems”, ACM Inc., Feb. 26, 1997, entire document, www.cosc.georgetown.edu/˜denning/crypto/Appendix.html.
Abelson, H., et al., “The Risks Of ‘Key Recovery,’ ‘Key Escrow,’ And ‘Trusted Third Party Encryption’”, CDT.org, 1998, entire document, www.cdt.org/crypto/risks98/.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for generation and use of asymmetric... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for generation and use of asymmetric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for generation and use of asymmetric... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3646018

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.