MANUFACTURING UNIQUE DEVICES THAT GENERATE DIGITAL SIGNATURES
7 Assignments
0 Petitions
Accused Products
Abstract
A method of manufacturing devices that generate digital signatures such that each device may be reliably and uniquely identified includes creating a public-private key pair within each device during manufacture; exporting only the public key from the device; retaining the private key within the device against the possibility of divulgement thereof by the device; and securely linking said exported public key with other information within the environment of the manufacture of the device, whereby each device is securely bound with its respective public key. A database of PuK-linked account information of users is maintained. The PuK-linked account information for each user includes a public key of such a device; information securely linked with the public key during manufacture; and third-party account identifiers, each of which identifies an account to a third-party of the user maintained with the third-party that has been associated with the user'"'"'s public key by the third-party.
-
Citations
31 Claims
-
1-15. -15. (canceled)
-
16. A method of maintaining a Central Key Authority (CKA) database in a secure environment, comprising:
-
storing, in the CKA database, a public key of a public key-private key pair, wherein the public key is associated with a user device of a user, wherein the user device is configured to generate digital signatures using a private key of the public-private key pair, wherein the private key is maintained securely within the user device; securely linking, in the CKA database, the public key associated with the user device with other information during manufacturing of the user device in the secure environment; and associating, in the CKA database, one or more third-party account identifiers with the public key, wherein each third-party account identifier identifies to a third-party an account of a respective user that is maintained with the third-party, wherein the third-party uses the public key and other information to authenticate a message. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification