Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-05-06
2008-05-06
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
Reexamination Certificate
active
07370199
ABSTRACT:
A method of controlling information exposure in a multiparty transaction includes an originating transaction participant cryptographically encoding all information for each of the transaction participants such that a unique data content and encryption are used for each of the messages destined to the other transaction participants. The cryptographically encoded messages are transmitted to the transaction participants such that each may decrypt their message and respond to a primary transaction participant with status concerning their portion of the transaction. After reception of affirmative status messages from the transaction participants, the primary transaction participant may transmit messages to the responding transaction participants to execute the multiparty transaction. The originating transaction participant may also be provided an indication that the multiparty transaction is executed.
REFERENCES:
patent: 6609200 (2003-08-01), Anderson et al.
patent: 6904418 (2005-06-01), Walker et al.
patent: 7003480 (2006-02-01), Fox et al.
patent: 7146500 (2006-12-01), Hawkins et al.
patent: 7167844 (2007-01-01), Leong et al.
Canetti, R. et al., “Adaptively Secure Multi-party Computation”,Annual ACM Symposium Theory of Computing, Proceedings of the 28thannual Symposium on Theory of Computing, 1996, 639-648.
Friedman, B. et al., “Trust Online”,Communications of the ACM, Dec. 2000, 43(12), 34-40.
Canetti, R. et al., “Universally Composable Two-Party and Multi-party Secure Computation”,Annual ACM Symposium on Theory of Computing, Proceedings of the 34thannual ACM Symposium on Theory of Computing, 2002, 494-503.
Lindell, Y. et al., “On the Composition of Authenticated Byzantine Agreement”,Annual ACM Symposium on Theory of Computing, Proceedings of the 34thAnnual ACM Symposium on Theory of Computing, 2002, 514-523.
Rabin, T. et al., Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract),Annual ACM Symposium on Theory of Computing, Proceedings of the 21stAnnual ACM Symposium on Theory of Computing, 1989, 73-85.
Siau, K. et al., “Building Customer Trust in Mobil Commerce”,Communications of the ACM, 2003, 46(4), 91-94.
Zadeh, J, Ph.D., “Cryptography on the Internet”,Proceedings of the 37thAnnual Southeast Regional Conference, 1999, 6 pages.
Aday Michael A.
Geller Alan S.
Peinado Marcus
Willman Bryan M.
Microsoft Corporation
Nalven Andrew L
Woodcock & Washburn LLP
Zand Kambiz
LandOfFree
System and method for n-way authentication in a network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for n-way authentication in a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for n-way authentication in a network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2797100