×

High security system for electronic signature verification

  • US 4,326,098 A
  • Filed: 07/02/1980
  • Issued: 04/20/1982
  • Est. Priority Date: 07/02/1980
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for effecting a high security electronic signature verification operation in a computer based communication system comprising a central data communication network controller which includes a high security verify unit (Vault) therein said system further including at least two remotely located terminals selectively connectable to said Vault over said data communication network and wherein said Vault and each of said terminals includes substantially identical key-controlled block-cipher cryptographic devices included therein and wherein said Vault has available therein means for obtaining the individual keys KX of each terminal (or user X) connected to said system, said method comprising:

  • User A (sender) at a first terminal sending the Vault a first message (A⊕

    C1) including a first segment which comprises an identification code of the user A in clear format and a second segment C1 including at least an identification of the sender, user A, the receiver user B (A/B) and the message to be communicated to user B (Data) at a second terminal, said second portion being encrypted under user A'"'"'s key KA,the Vault upon receipt of said message A⊕

    C1 obtaining the key KA based on the first portion of said message A, and decrypting said message portion C1 using key KA, verifying the identity of user A and upon a successful verification of the user A said Vault forming a second message to be sent to user B (receiver) at said second terminal, said second message including the message segment C1 from the first message and a new message segment comprising the identity A/B of the sender and receiver and Data which message is encrypted as a function of user B'"'"'s key KB,user B upon receipt of said second message from the Vault decoding same and saving the message C1 in a `Legal Store`, and forming a third message B⊕

    C2 to be returned to the Vault said third message including the identity of user B in clear format as a first segment and a second segment C2 comprising at least the previous message segment C1 and the identity A/B of the sender and receiver, enciphering this second message segment under key KB, and sending the message B⊕

    C2 to the Vault,the Vault upon receipt of the message from the user B decrypting the message C2 to obtain segment C1 therefrom, said Vault then forming a fourth message C1⊕

    C2 and encrypting said message as a function of user A'"'"'s key KA and sending said message to user A,user A upon receipt of said fourth message from the Vault decrypting the message to obtain C1 and C2, and storing C2 in a `Legal Store`.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×