Method and system for the supply of data, transactions and electronic voting
First Claim
1. A method comprising:
- receiving encrypted data by a second entity, the received encrypted data being digitally signed with a digital signature by a first entity using a private key from a public/private key pair of the first entity and including an attribute identifying a first digital certificate to be generated after the generation of the digital signature;
receiving by the second entity the first digital certificate generated after the generation of the digital signature, the first digital certificate being digitally signed by the first entity using the private key and including a symmetrical session key encrypted with a public key from a public/private key pair of the second entity;
sending by the second entity the first digital certificate to a signing entity;
receiving by the second entity a second digital certificate signed with an electronic signature of the signing entity, the second digital certificate including;
one or more attributes of the first entity which are sufficient to obtain a public key from the public/private key pair of the first entity, andan identification of the signing entity;
accessing by the second entity personal data of the first entity stored in an electronic database utilizing the one or more attributes of the first entity of the first digital certificate; and
accessing by the second entity the received encrypted data utilizing the symmetrical session key in the first digital certificate;
wherein;
the receiving and the sending by the second entity are performed by a computing device using a secure messaging system across a network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity'"'"'s electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity'"'"'s electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.
-
Citations
12 Claims
-
1. A method comprising:
-
receiving encrypted data by a second entity, the received encrypted data being digitally signed with a digital signature by a first entity using a private key from a public/private key pair of the first entity and including an attribute identifying a first digital certificate to be generated after the generation of the digital signature; receiving by the second entity the first digital certificate generated after the generation of the digital signature, the first digital certificate being digitally signed by the first entity using the private key and including a symmetrical session key encrypted with a public key from a public/private key pair of the second entity; sending by the second entity the first digital certificate to a signing entity; receiving by the second entity a second digital certificate signed with an electronic signature of the signing entity, the second digital certificate including; one or more attributes of the first entity which are sufficient to obtain a public key from the public/private key pair of the first entity, and an identification of the signing entity; accessing by the second entity personal data of the first entity stored in an electronic database utilizing the one or more attributes of the first entity of the first digital certificate; and accessing by the second entity the received encrypted data utilizing the symmetrical session key in the first digital certificate; wherein; the receiving and the sending by the second entity are performed by a computing device using a secure messaging system across a network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification