Modifying message data and generating random number digital signature within computer chip
First Claim
1. A method of generating a digital signature within a computer chip, comprising receiving data representing a message and generating a digital signature for the message by:
- (a) modifying the message data with additional data, and (b) then encrypting said modified message data using a private key of a public-private key pair stored within the computer chip.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of generating a digital signature within a computer chip includes receiving data representing a message, and generating a digital signature for the message by modifying the message data with additional data, calculating a hash value of the modified message, and encrypting the hash value using a private key of a public-private key pair. The additional data includes data prestored within content searchable memory of the computer chip and a verification status of the computer chip. The verification status is identified out of a plurality of predefined verification statuses as a function of verification data input into the computer chip and data prestored within the computer chip. An identified verification status is used by one entity in determining risk regarding an electronic communication from another entity, especially where the electronic communication comprises a request and a digital signature generated by the computer chip.
251 Citations
20 Claims
-
1. A method of generating a digital signature within a computer chip, comprising receiving data representing a message and generating a digital signature for the message by:
-
(a) modifying the message data with additional data, and (b) then encrypting said modified message data using a private key of a public-private key pair stored within the computer chip.
-
-
2. A method of generating a digital signature within a computer chip, comprising receiving data representing a message and generating a digital signature for the message by:
-
(a) modifying the message data by appending additional data thereto, (b) calculating a hash value of said modified message data, and (c) then encrypting said calculated hash value using a private key of a public-private key pair. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
- 10. A method for extracting user information from a computer chip, the computer chip including content searchable memory in which different fields of data are prestored, comprising transmitting an identifier of a particular field of data prestored within the computer chip together with a null value therefor.
-
12. A method of obtaining a random number for utilization in an application requiring a random number, comprising generating a digital signature using a digital signature algorithm, and then using said generated digital signature as the random number in the application.
Specification