GENERATING DIGITAL SIGNATURES USING EPHEMERAL CRYPTOGRAPHIC KEY
First Claim
1. An invention comprising a method of generating a digital signature utilizing a cryptographic key, the method comprising the steps of:
- (a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received input of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key;
(d) generating within the computer system a digital signature as a function of said generated cryptographic key of said step (b); and
(e) following said step (d) of generating the digital signature, clearing said generated cryptographic key of said step (b) from the computer system so that said generated cryptographic key is no longer available for generating a digital signature within the computer system.
8 Assignments
0 Petitions
Accused Products
Abstract
Generating a digital signature utilizing a cryptograph key includes: receiving into a computer system input data from a user (UID); generating within the computer system a cryptographic key as a deterministic function of the UID; clearing from the computer system the UID; generating within the computer system a digital signature as a function of the generated cryptographic key; and clearing the generated cryptographic key from the computer system following generation of the digital signature. The digital signature further may be generated as a function of whether a digital signature has yet been generated using the generated cryptographic key following receipt of the UID. Neither the received UID nor the generated cryptographic key is exported from the computer system.
-
Citations
32 Claims
-
1. An invention comprising a method of generating a digital signature utilizing a cryptographic key, the method comprising the steps of:
-
(a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received input of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key;
(d) generating within the computer system a digital signature as a function of said generated cryptographic key of said step (b); and
(e) following said step (d) of generating the digital signature, clearing said generated cryptographic key of said step (b) from the computer system so that said generated cryptographic key is no longer available for generating a digital signature within the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An invention comprising a method of generating digital signatures utilizing a cryptographic key, the method comprising the steps of:
-
(a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received data of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key within the computer system;
(d) maintaining an indicator to indicate whether a digital signature has yet been generated using said generated cryptographic key of said step (b);
(e) generating within the computer system a digital signature as a function of said generated cryptographic key of said step (b) and said maintained indicator of said step (d); and
(f) following said step (e) of generating the digital signature, clearing from the computer system said generated cryptographic key of said step (b) so that said generated cryptographic key is no longer available within the computer system for generating a digital signature. - View Dependent Claims (28, 29, 30, 31, 32)
-
Specification