PREVENTION OF UNAUTHORIZED FORWARDING AND AUTHENTICATION OF SIGNATURES
First Claim
Patent Images
1. An authentication method comprising:
- receiving a message and a modified signature, wherein;
the modified signature is indicative of a signed message, the signed message being signed utilizing a predetermined parameter; and
the signed message is indicative of the message, the message being signed utilizing a private key of a public/private key pair;
operating on the modified signature to generate a first value, wherein the modified signature is operated on utilizing a public key of the public/private key pair;
operating on the message to generate a second value, wherein the message is operated on utilizing the predetermined parameter;
comparing the first value and the second value; and
authenticating the message in accordance with a result of comparing the first value and the second value.
2 Assignments
0 Petitions
Accused Products
Abstract
A forwarding signature comprises a modified digital signature, modified using a predetermined parameter between a sender and an intended recipient. An intended recipient of the forwarding signature can verify that the forwarding signature corresponds to the message, but, can neither derive the original digital signature nor generate a new forwarding signature for a different parameter. Generation and verification of the forwarding signature is accomplished with access to the public key of a public/private cryptographic key pair, the original signed message, and the predetermined parameter. Access to the private key is not needed.
16 Citations
20 Claims
-
1. An authentication method comprising:
-
receiving a message and a modified signature, wherein; the modified signature is indicative of a signed message, the signed message being signed utilizing a predetermined parameter; and the signed message is indicative of the message, the message being signed utilizing a private key of a public/private key pair; operating on the modified signature to generate a first value, wherein the modified signature is operated on utilizing a public key of the public/private key pair; operating on the message to generate a second value, wherein the message is operated on utilizing the predetermined parameter; comparing the first value and the second value; and authenticating the message in accordance with a result of comparing the first value and the second value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A authentication system comprising:
-
an input/output portion configured to receive a message and a modified signature, wherein; the modified signature is indicative of a signed message, the signed message being signed utilizing a predetermined parameter; and the signed message is indicative of the message, the message being signed utilizing a private key of a public/private key pair; a processing portion configured to; operate on the modified signature to generate a first value, wherein the modified signature is operated on utilizing a public key of the public/private key pair; operate on the message to generate a second value, wherein the message is operated on utilizing the predetermined parameter; compare the first value and the second value; and authenticate the message in accordance with a result of comparing the first value and the second value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium having stored thereon computer-executable instructions for performing authentication by performing the steps of:
-
receiving a message and a modified signature, wherein; the modified signature is indicative of a signed message, the signed message being signed utilizing a predetermined parameter; and the signed message is indicative of the message, the message being signed utilizing a private key of a public/private key pair; operating on the modified signature to generate a first value, wherein the signature is operated on utilizing a public key of the public/private key pair; operating on the message to generate a second value, wherein the message is operated on utilizing the predetermined parameter; comparing the first value and the second value; and authenticating the message in accordance with a result of comparing the first value and the second value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification