Public key cryptographic system having nested security levels
First Claim
1. A method of generating a public key comprising the steps:
- generating a first key portion by performing a mathematical operation on a first data set;
generating a second key portion by performing a mathematical operation on a second data set;
looking up a public key of a monitoring authority;
generating a third key portion by using the public key of the monitoring authority to encode at least some of the second data set, such that the monitoring authority decrypts messages encoded with the second key portion.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of encrypted communication including creating a message and looking up a public key of a recipient. Then, encoding the message via a first encoding process using a first portion of the public key to generated an intermediate encoded message. The intermediate encoded message is encoded via a second encoding process using a second portion of the public key to generate a final encoded message. Then, the final encoded message is sent to a recipient. The public key may have a first key portion, a second key portion, and a third key portion, with the third key portion containing the encoded identity of a data element needed to decode a message encoded with the second key portion. The third key portion is encoded with the public key of a monitoring authority to enable the monitoring authority to more readily decode transmitted messages.
76 Citations
14 Claims
-
1. A method of generating a public key comprising the steps:
-
generating a first key portion by performing a mathematical operation on a first data set; generating a second key portion by performing a mathematical operation on a second data set; looking up a public key of a monitoring authority; generating a third key portion by using the public key of the monitoring authority to encode at least some of the second data set, such that the monitoring authority decrypts messages encoded with the second key portion. - View Dependent Claims (2, 3, 4)
-
-
5. A method of encrypted communication comprising the steps:
-
creating a message; looking up a public key of a recipient; encoding the message via a first encoding process using a first portion of the public key to generated an intermediate encoded message; encoding the intermediate encoded message via a second encoding process using a second portion of the public key to generate a final encoded message; and sending the final encoded message to a recipient. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A cryptographic communications system comprising:
-
a communications network; a sender terminal connected to the network; a receiver terminal connected to the network; a first monitoring authority terminal connected to the network; a public key repository connected to the network; the repository containing a first data sequence comprising a receiver encoding key and a second data sequence comprising a first monitoring authority encoding key, the receiver encoding key comprising a first key portion, a second key portion, and a third key portion, the first key portion being a functional result of a first data set, the second key portion being a functional result of a second data set, the third key portion comprising a numerically encoded result of a mathematical function of the first monitoring authority encoding key and at least a selected portion of the second data set, such that the first monitoring authority decrypts a message encoded with the second key portion. - View Dependent Claims (11, 12, 13, 14)
-
Specification