Public key encryption for groups
First Claim
1. A system for public key encryption for groups, the system comprising:
- a user, and a group comprised of a group leader and at least one group member, wherein the group has a single public key for the group and an individual private key for each group member.
3 Assignments
0 Petitions
Accused Products
Abstract
A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.
64 Citations
28 Claims
-
1. A system for public key encryption for groups, the system comprising:
-
a user, and a group comprised of a group leader and at least one group member, wherein the group has a single public key for the group and an individual private key for each group member. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for public key encryption for groups, the method comprising:
-
generating a group public key and a group leader private key by a group leader of a group having at least one group member, creating an individual private key for each group member by the group leader, and distributing the individual private key to each group member by the group leader. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of generating an authentication token in a system comprised of a group having a group leader and at least one group member wherein the group has a single public key and each group member has an individual private key, the method comprising:
-
obtaining a token, signing the token, and encrypting the signed token using the single public key for the group. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method of validating an authentication token, the method comprising:
-
obtaining an encrypted signed token having been encrypted using a single public key, decrypting the encrypted signed token using an individual private key, and verifying the decrypted token to confirm the authenticity of the token. - View Dependent Claims (26, 27, 28)
-
Specification