Public Key Cryptographic Method And System, Certification Server And Memories Adapted For Said System
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a public key cryptographic method and system, a certification server and memories adapted for said system. In said public key cryptographic system, there is insufficient information contained in an electronic public key certificate alone to retrieve the public key. The inventive system comprises at least a second memory (52, 72) in which complementary information is stored, which can be used to retrieve the public key when used together with the information contained in the certificate. According to the invention, access to said complementary information is reserved to a limited number of authorised terminals among the group of terminals that can verify the certificate signature.
-
Citations
22 Claims
-
1-10. -10. (canceled)
-
11. A public key cryptographic system comprising:
-
a computing entity (4) suitable for decrypting a message and/or signing with the aid of a private key corresponding to the public key, at least one first memory (12) in which an electronic certificate of the public key signed by a certification authority is recorded, said certificate comprising information for retrieving the public key, and at least one terminal (6) capable of verifying the signature of the certificate and for retrieving the public key from the information contained in the certificate before encrypting a message and/or verifying a signature with the aid of this public key, wherein ; the information contained in the certificate is insufficient in itself to retrieve the public key to be used, and comprises at least one identifier and/or at least one address for retrieving the public key to be used, and the system comprises at least one second memory (52, 72) in which the complementary information enabling retrieval of the public key is recorded when it is used in combination with the information contained in the certificate, access to this complementary information being restricted to a limited number of authorized terminals among all of the terminals capable of verifying the signature of the certificate. - View Dependent Claims (12, 13, 14, 15, 20, 21, 22)
-
-
16. A memory comprising an electronic certificate adapted for use in a public key cryptographic system, wherein the electronic certificate comprises information for retrieving the public key, and this information is insufficient in itself to retrieve the public key, the information comprising at least one identifier and/or at least one address for retrieving the public key to be used.
-
17. A memory adapted for use in a cryptographic system, wherein it comprises complementary information enabling identification of a public key when said information is used in combination with information contained in an electronic certificate.
-
18. A public key cryptographic method adapted for implementation in a public key cryptographic system, wherein it comprises a step of using complementary information taken in combination with information contained in an electronic certificate in order to retrieve a public key, said information contained in the electronic certificate being insufficient in itself to retrieve the public key to be used, and said information comprising at least one identifier and/or at least one address for retrieving the public key to be used.
-
19. An electronic certificate adapted for use in a public key cryptographic system, wherein the electronic certificate comprises information for retrieving the public key, said information being insufficient in itself to retrieve the public key to be used, and said information comprising at least one identifier and/or at least one address for retrieving the public key to be used.
Specification