Method of setting up secure communications and associated encryption/decryption system
First Claim
1. A method of establishing secure communication between users by means of a public key encryption/decryption system comprising the following steps:
- a center generates a pair of keys comprising a secret key and a public key,said public key of said center is supplied to a user,said user generates a pair of keys specific to said user comprising a secret key and a public key but said public key of said user is encrypted with said public key of said center,said user transmits to said center said public key specific to said user encrypted with said public key of said center, andsaid center decrypts said public key of said user and if said user is approved by said center, said center retransmits to said user said public key of said user encrypted with itself.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of establishing secure communication between users by means of a public key encryption/decryption system comprises the following steps: a center generates a pair of keys comprising a secret key and a public key, the center'"'"'s public key is supplied to a user, this user generates a pair of keys specific to this user comprising a secret key and a public key but the public key of this user is encrypted with the center'"'"'s public key, this user transmits to the center their own public key encrypted with the public key of the center, and the center decrypts the public key of this user and if this user is approved by the center, the center retransmits to this user the public key of this user encrypted with itself. This method provides centralized control of users'"'"' public keys.
35 Citations
8 Claims
-
1. A method of establishing secure communication between users by means of a public key encryption/decryption system comprising the following steps:
-
a center generates a pair of keys comprising a secret key and a public key, said public key of said center is supplied to a user, said user generates a pair of keys specific to said user comprising a secret key and a public key but said public key of said user is encrypted with said public key of said center, said user transmits to said center said public key specific to said user encrypted with said public key of said center, and said center decrypts said public key of said user and if said user is approved by said center, said center retransmits to said user said public key of said user encrypted with itself. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification