×

Secure cryptographic methods for electronic transfer of information

  • US 5,668,878 A
  • Filed: 08/31/1995
  • Issued: 09/16/1997
  • Est. Priority Date: 02/28/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for a user-controlled first computing device to reduce the computational burden of a tamper-resistant second computing device, the second computing device having a first and second secret key and having to perform a cryptographic action with respect to a public key corresponding to the first secret key, the method comprising the steps of:

  • computing by a third computing device, at least one number, by applying a one-way function to the second secret key and a first serial number;

    providing by the third computing device to the first computing device, the at least one number;

    computing by the first computing device, information based on the at least one number, the information being synchronized with a second serial number of the tamper-resistant computing device;

    providing by the first computing device to the second computing device, the information;

    computing by the second computing device, at least one output, the output being based on the first secret key, the information, and an application of the one-way function to at least the second secret key and the second serial number; and

    updating by the second computing device, the second serial number by applying an update function.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×