Cryptographic method and apparatus

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S161000, C713S169000

Reexamination Certificate

active

07574596

ABSTRACT:
First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.

REFERENCES:
patent: 4926480 (1990-05-01), Chaum
patent: 5436972 (1995-07-01), Fischer
patent: 6446205 (2002-09-01), Lenstra
patent: 7103911 (2006-09-01), Spies et al.
patent: 7113594 (2006-09-01), Boneh et al.
patent: 2002/0164026 (2002-11-01), Huima
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2004/0019779 (2004-01-01), Harrison et al.
patent: 0 891 053 (1999-01-01), None
patent: 1 392 018 (2004-02-01), None
patent: 2 370 471 (2002-06-01), None
patent: 2 391 139 (2004-01-01), None
patent: 2 395 872 (2004-06-01), None
patent: WO 03/017559 (2003-02-01), None
patent: WO 2004/047352 (2004-09-01), None
U.S. Appl. No. 10/831,350, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,548, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,776, filed Apr. 22, 2004, Chen et al.
Levy, I., “An Overview of Identifier-Based Public Key Cryptography,”Internet and Wireless Security, pp. 121-131 (2002).
The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time, Hewlett-Packard Company, accessed via Internet at http://www.hpl.hp.com/research/tsl/external%20publications/tech%20reports/HPL-2002-243.pdf (2002).
Shamir, A., “Identity-Based Cryptosystems and Signature Schemes,”Advances in Crypotology—CRYPTO ′84, Lecture Notes in Computer Science, vol. 196, pp. 47-53 (1985).
Boneh, D. and M. Franklin, “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology—CRYPTO2001, LNCS 2139, pp. 213-229, Springer-Verlag (2001).
Boneh, D., et al., “Identity-Based Mediated RSA,”3rd Workshop on Information Security Application, Jeju Island, Korea, 12 pages (Aug. 2002).
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp. 360-363, Springer-Verlag (2001).
http:www.hpl.hp.com/techreports/2003/HPL-2003-18.pdf (2003).
Microsoft ComputerDictionary, Fifth Edition Excerpt http://proquest.safaribooksonline.com/0735614954/ch04 (May 1, 2002).
CGI Programming with Perl, 2nd Edition Excerpt, http://proquest.safaribooksonline.com/1565924193/ch08-49507#snippet.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4067684

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.