Methods and systems for group authentication using the...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S171000, C713S175000

Reexamination Certificate

active

10426256

ABSTRACT:
A method for group authentication using a public key cryptosystem that includes a public key and a private key, comprising the steps of providing a Private Key Share to a Tool of each Entity of each Group encompassed by a Boolean Expression of a prescribed Rule based upon the private key, encrypting a random number using the public key of the public key cryptosystem to generate a ciphertext challenge at a Verification Device, conveying the ciphertext challenge to the Tool of each Entity in communication with the Verification Device, generating a response to the ciphertext challenge using the Private Key Share of the Tool of each Entity in communication with the Verification Device, transmitting the response generated by each Entity in communication with the Verification Device to the Verification Device, combining the responses received from the Entities in communication with the Verification Device, determining whether any combination of the responses equals the random number wherein any combination that equals the random number identifies an Authenticated Group and any combination that does not equal the random number identifies a non-authenticated Group, and effecting an apposite course of action with respect to an Operation governed by the prescribed Rule based upon the outcome of the determining step.

REFERENCES:
patent: 5910989 (1999-06-01), Naccache
patent: 5946397 (1999-08-01), M'Raihi et al.
An Improved Anonymous ID-Based Key Issuing Protocol Yongquan Cai; Xiang Yan; Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on vol. 1, 30-01 Aug. 2006 pp. 472-475.
Research directions for automated software verification: using trusted hardware Devanbu, P.; Stubblebine, S.; Automated Software Engineering, 1997. Proceedings., 12th IEEE International Conference Nov. 1-5, 1997 pp. 274-279.
Cryptographically secure identity certificates Kirovski, D.; Jojic, N.; Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on vol. 5, May 17-21, 2004 pp. V-413-V-416 vol. 5.
Benaloh et al., Generalized Secret Sharing and Monotone Functions, Advances in Cryptology, Spring-Verlag, 1990, pp. 27-35.
Guthery, Group Authentication Using the Naccache Stern Public-Key Cryptosystem, 2003.
Naccache et al., A New Public-Key Cryptosystem, Advances in Cryptology—EUROCRYPT '97, Lecture Notes in Computer Science, 1997, Berlin, Germany.
Shamir, How to Share a Secret, Communications for the ACM, Nov. 1979, pp. 612-613.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for group authentication using the... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for group authentication using the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for group authentication using the... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3774093

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.