Method for allocating useful data to a specific originator
First Claim
Patent Images
1. A method for the unambiguous allocation of useful data transmitted between first and second local communication terminals to a specific originator, comprising the steps of:
- (a) compressing useful data with a hash method to form a hash result at a first local communication terminal;
(b) transmitting a message including the hash result and a header identifying the originator, the receiver and the nature and extent of further processing to a central server;
(c) processing the data for forwarding in the central processor by(c1) biometrically authenticating the user on the basis of the header, and(c2) forming a signature by processing the hash result and a private key code of the user with a first crypto-algorithm;
(d) storing the signature in the central server;
(e) transmitting the signature and the public key code of the user to the user for checking;
(f) checking the signature and the public key code of the user at the first local communication terminal;
(g) in response to a positive result of the check, transmitting the useful data, in clear text, and the signature to the second local communication terminal;
(h) receiving the clear text useful data and the signature at the second local communication terminal;
(i) applying the same hash method to the received clear text data to obtain the same hash result;
(j) applying a second crypto-algorithm which is the inverse of the first crypto-algorithm to the signature;
(k) comparing the results of the steps (i) and (j); and
(l) in response to coincidence in the step (k), indicating a valid allocation of the useful data to the specific user.
1 Assignment
0 Petitions
Accused Products
Abstract
The hash result of useful data is transmitted to a multiply-protected central server in which it is transformed into a signature on the basis of a crypto operations system combination with a private key code of the originator. The signature is deposited in the central server and is available as what is referred to as a "digital signature" for the transmission of the useful data.
-
Citations
7 Claims
-
1. A method for the unambiguous allocation of useful data transmitted between first and second local communication terminals to a specific originator, comprising the steps of:
-
(a) compressing useful data with a hash method to form a hash result at a first local communication terminal; (b) transmitting a message including the hash result and a header identifying the originator, the receiver and the nature and extent of further processing to a central server; (c) processing the data for forwarding in the central processor by (c1) biometrically authenticating the user on the basis of the header, and (c2) forming a signature by processing the hash result and a private key code of the user with a first crypto-algorithm; (d) storing the signature in the central server; (e) transmitting the signature and the public key code of the user to the user for checking; (f) checking the signature and the public key code of the user at the first local communication terminal; (g) in response to a positive result of the check, transmitting the useful data, in clear text, and the signature to the second local communication terminal; (h) receiving the clear text useful data and the signature at the second local communication terminal; (i) applying the same hash method to the received clear text data to obtain the same hash result; (j) applying a second crypto-algorithm which is the inverse of the first crypto-algorithm to the signature; (k) comparing the results of the steps (i) and (j); and (l) in response to coincidence in the step (k), indicating a valid allocation of the useful data to the specific user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for the unambiguous allocation of mutual data transmitted between first and second local communication terminals to a specific originator, comprising the steps of:
-
(a) compressing useful data with a hash method to form a hash result at a first local communication terminal; (b) transmitting a message including the hash result and a header identifying the originator, the receiver and the nature and extent of further processing to a central server; (c) processing the data for forwarding in the central processor by (c1) authenticating the user with a satellite computer connected in front of a crypto algorithm computer; (c2) electronically filtering the message such that only the data of the hash result is permitted to pass to the crypto algorithm computer, and (c3) forming a signature by processing the hash result and a private key code of the user with a first crypto algorithm and the crypto algorithm computer while controlling the crypto algorithm computer over a separate control line with the electronic filter; (d) storing the signature in the central server; (e) transmitting the signature and a public key code of the user for checking; (f) checking the signature and the public key code of the user at the first local communication terminal; (g) in response to a positive result of the check, transmitting the useful data, in clear text, and the signature to the second local communication terminal; (h) receiving the clear text useful data and the signature at the second local communication terminal; (i) applying the same hash method to the received clear text data to obtain the same hash result; (j) applying a second crypto algorithm which is the inverse of the first crypto algorithm to the signature; (k) comparing the results of the steps (i) and (j); and (l) in response to coincidence in the step (k), communicating a valid allocation of the useful data to the specific user.
-
Specification