DATA CARD VERIFICATION SYSTEM
First Claim
1. A method of generating a certificate for a correspondent comprising:
- obtaining identification data and public information associated with said correspondent, said public information related to a private key associated with a first signature scheme; and
signing a second set of data related to said identification data and said public information according to a second signature scheme that is different than said first signature scheme to obtain a signature for said certificate.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.
30 Citations
14 Claims
-
1. A method of generating a certificate for a correspondent comprising:
-
obtaining identification data and public information associated with said correspondent, said public information related to a private key associated with a first signature scheme; and signing a second set of data related to said identification data and said public information according to a second signature scheme that is different than said first signature scheme to obtain a signature for said certificate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A certificate embodied as a data structure in a computer readable medium comprising:
a signature obtained by signing a second set of computer readable data signed according to a second signature scheme, wherein said second set of data is related to identification data and public information associated with a correspondent, said public information related to a private key associated with a first signature scheme that is different than said second signature scheme. - View Dependent Claims (13, 14)
Specification