DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM
First Claim
1. An invention comprising a method for facilitating communication by a first party using a digital signature, the method comprising the steps of:
- (a) communicating software to the first party, the software including computer-executable instructions for (i) generating an asymmetric public-private key pair by, (A) receiving input data into a computer system from a user, (B) generating a first key as a deterministic function of said received input data of said step (i)(A), (C) following said step (i)(B) of generating the first key, clearing from the computer system said received data of said step (i)(A) so that said received data is no longer available for generating the first key, (D) generating within the computer system a second key as a deterministic function of said generated first key of said step (i)(B), said generated first key comprising a private key of the asymmetric public-private key pair and said generated second key comprising a public key of the asymmetric public-private key pair, (E) following said step (i)(D) of generating the second key, clearing said generated first key of said step (i)(B) from the computer system so that said generated first key is no longer available within the computer system, and (F) exporting said generated second key of said step (i)(D) from the computer system, (b) receiving from the first party a public key of an asymmetric public-private key pair generated using the software communicated to the first party in step (a); and
(c) recording in a database said received public key of the first party in association with information pertaining to said communicated software of said step (a).
3 Assignments
0 Petitions
Accused Products
Abstract
Facilitating communication using a digital signature includes: communicating software to a first party; receiving from the first party a public key of a public-private key pair generated using the software; and recording in a database the public key in association with information pertaining to the software. The key pair is generated by: receiving input data from a user (UID); generating the private key as a deterministic function of the UID; clearing the UID from the computer system; generating the public key as a deterministic function of the private key; clearing the private key from the computer system; and exporting the public key. The software generates a digital signature by again receiving the UID and regenerating the private key using the deterministic function and UID, after which, the private key and UID again are cleared.
-
Citations
30 Claims
-
1. An invention comprising a method for facilitating communication by a first party using a digital signature, the method comprising the steps of:
(a) communicating software to the first party, the software including computer-executable instructions for (i) generating an asymmetric public-private key pair by, (A) receiving input data into a computer system from a user, (B) generating a first key as a deterministic function of said received input data of said step (i)(A), (C) following said step (i)(B) of generating the first key, clearing from the computer system said received data of said step (i)(A) so that said received data is no longer available for generating the first key, (D) generating within the computer system a second key as a deterministic function of said generated first key of said step (i)(B), said generated first key comprising a private key of the asymmetric public-private key pair and said generated second key comprising a public key of the asymmetric public-private key pair, (E) following said step (i)(D) of generating the second key, clearing said generated first key of said step (i)(B) from the computer system so that said generated first key is no longer available within the computer system, and (F) exporting said generated second key of said step (i)(D) from the computer system, (b) receiving from the first party a public key of an asymmetric public-private key pair generated using the software communicated to the first party in step (a); and
(c) recording in a database said received public key of the first party in association with information pertaining to said communicated software of said step (a). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
Specification