Electronic voting system
First Claim
1. A method comprising:
- creating a private key and a public key cryptographic key pair;
generating a unique and random identifier for a voter'"'"'s vote;
accepting an election vote from said voter;
electronically signing said vote and said identifier with said private key to create a digital signature;
providing said vote and said identifier in a human readable format to said voter and providing said digital signature to said voter;
generating a second unique and random identifier for a second voter'"'"'s vote;
accepting a second election vote from said second voter;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is described that involves creating a private key and a public key cryptographic key pair, generating a unique and random identifier for a voter'"'"'s vote and accepting an election vote from said voter. The vote and identifier are electronically signed with the private key to create a digital signature. The vote and identifier are provided in a human readable format to the voter. The digital signature is provided to the voter. The method further involves generating a second unique and random identifier for a second voter'"'"'s vote and accepting a second election vote from the second voter. The second vote and identifier are electronically signed with the private key to create a second digital signature. The second vote and second identifier are provided in a human readable format to the second voter. The second digital signature is provided to the second voter. The public key is published on an internet. Information is publicly provided on the internet that associates together: (i) the voter'"'"'s vote in a human readable format, (ii) the identifier in a human readable format, and (iii) the digital signature. The voter'"'"'s vote is verifiable with the digital signature and the public key. Information is publicly provided on the internet that associates together: (iv) the second voter'"'"'s vote in a human readable format, (v) the second identifier in a human readable format, and (vi) the second digital signature. The second voter'"'"'s vote is verifiable with the second digital signature and the public key. The method includes, in response to receiving a request from the internet containing the identifier, providing (i), (ii) and (iii) above through an internet communication. The method also includes in response to receiving a second request from the internet containing the second identifier, providing (iv), (v) and (vi) above through a second internet communication.
-
Citations
25 Claims
-
1. A method comprising:
-
creating a private key and a public key cryptographic key pair;
generating a unique and random identifier for a voter'"'"'s vote;
accepting an election vote from said voter;
electronically signing said vote and said identifier with said private key to create a digital signature;
providing said vote and said identifier in a human readable format to said voter and providing said digital signature to said voter;
generating a second unique and random identifier for a second voter'"'"'s vote;
accepting a second election vote from said second voter;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product including program code stored on one or more computer readable media, said program code to perform a method, said method comprising:
-
recognizing creation of a private key and a public key cryptographic key pair;
causing a unique and random identifier to be generated for a voter'"'"'s vote;
accepting an election vote from said voter through an electronically rendered user interface;
electronically signing said vote and said identifier with said private key to create a digital signature;
causing said vote and said identifier to be provided in a human readable format to said voter and causing said digital signature to be provided to said voter;
causing a second unique and random identifier to be generated for a second voter'"'"'s vote;
accepting a second election vote from said second voter through said interface;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
causing said second vote and said second identifier to be provided to said second voter in a human readable format and causing said second digital signature to be provided to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A voting machine system, comprising:
-
a) a computer program product including program code stored on one or more computer readable media, said program code to perform a method, said method comprising;
recognizing creation of a private key and a public key cryptographic key pair;
causing a unique and random identifier to be generated for a voter'"'"'s vote;
accepting an election vote from said voter through an electronically rendered user interface;
electronically signing said vote and said identifier with said private key to create a digital signature;
causing said vote and said identifier to be provided in a human readable format to said voter and causing said digital signature to be provided to said voter;
causing a second unique and random identifier to be generated for a second voter'"'"'s vote;
accepting a second election vote from said second voter through said interface;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
causing said second vote and said second identifier to be provided to said second voter in a human readable format and causing said second digital signature to be provided to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication;
b) processor circuitry implemented on one or more semiconductor chips to process said program code;
c) one or more volatile memory resources coupled to said processor circuitry, said private key stored only in said one or more volatile memory resources;
d) write once read many (WORM) storage resources coupled to said processor circuitry;
said first voter'"'"'s vote, said first identifier and said first digital signature to be stored in a first randomly assigned portion of said WORM storage resources;
said second voter'"'"'s vote, said second identifier and said second digital signature to be stored in a second randomly assigned portion of said WORM storage resources. - View Dependent Claims (23)
-
-
24. A voting machine system, comprising:
-
a) one or more semiconductor chips to perform the following method;
creating a private key and a public key cryptographic key pair;
generating a unique and random identifier for a voter'"'"'s vote;
accepting an election vote from said voter;
electronically signing said vote and said identifier with said private key to create a digital signature;
providing said vote and said identifier in a human readable format to said voter and providing said digital signature to said voter;
generating a second unique and random identifier for a second voter'"'"'s vote;
accepting a second election vote from said second voter;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a request from said internet for an electoral jurisdiction'"'"'s election data, providing through a second internet communication a complete set of votes, identifiers, digital signatures and public keys for said electoral jurisdiction;
b) one or more volatile memory resources coupled to said processor circuitry, said private key stored only in said one or more volatile memory resources;
c) write once read many (WORM) storage resources coupled to said processor circuitry;
said first voter'"'"'s vote, said first identifier and said first digital signature to be stored in a first randomly assigned portion of said WORM storage resources;
said second voter'"'"'s vote, said second identifier and said second digital signature to be stored in a second randomly assigned portion of said WORM storage resources. - View Dependent Claims (25)
-
Specification