Initial secret key establishment including facilities for verification of identity
First Claim
1. A method of establishing a secret cryptographic key shared between an applicant and an issuer comprising the steps of:
- providing said applicant with a registration computer program means, said registration computer program means having a public key of said issuer and public key encryption capability;
generating said secret key using at least some random information at an applicant end;
generating a pass reply message using at least some arbitrary information at said applicant end;
encrypting said secret key and said pass reply using said public key to form at least one encryption message, said message including information allowing said issuer to identify said applicant;
sending said encryption message to said issuer by telecommunications means;
decrypting said encryption message at an issuer end to retrieve said secret key and said pass reply using a private key of said issuer;
receiving a second communication from said applicant at said issuer end separate from said encryption message over a channel that enables said issuer to ascertain said second communication to be genuinely from said applicant, said second communication containing said pass reply;
confirming a validity of said secret key at least with said issuer if said pass reply received during said second communication matches said pass reply decrypted, whereby said secret key may be confirmed for use in future transactions.
1 Assignment
0 Petitions
Accused Products
Abstract
An issuer offers any type of service secured with a secret cryptographic key assigned to an applicant according to the present invention, which includes a secret key registration process. Usually, the secret key will be loaded on a portable memory device or other secret key store of the applicant. As preliminary steps, the issuer sets up its public key for the Probabilistic Encryption Key Exchange (PEKE) cryptosystem, and the applicant obtains a copy of a secret key registration software, a copy of the issuer'"'"'s public key, and an uninitialized portable memory device. Once initiated by the applicant, the registration software generates an internal PEKE secret key. The applicant chooses a registration pass query and pass reply that the registration software MACs and encrypts with a key derived from the PEKE secret key. The registration software derives the key assigned to the applicant from the PEKE secret key, and loads it into the secret key store. A message is sent to the issuer data processing center where the cryptographic processing (PEKE, MAC, encryption) is reversed. Using an alternate channel (e.g. telephone conversation) an issuer agent verifies the identity of the applicano: the agent asks the pass query, the applicant replies with the pass reply, and the issuer verifies the applicant'"'"'s knowledge of some relevant personal data. The issuer agent can approve the applicant'"'"'s registration in the issuer database. There is no need for the issuer to personalize either the software or the secret key store before delivery to the applicant, and there is a single personal contact between the applicant and the issuer agent.
-
Citations
15 Claims
-
1. A method of establishing a secret cryptographic key shared between an applicant and an issuer comprising the steps of:
-
providing said applicant with a registration computer program means, said registration computer program means having a public key of said issuer and public key encryption capability; generating said secret key using at least some random information at an applicant end; generating a pass reply message using at least some arbitrary information at said applicant end; encrypting said secret key and said pass reply using said public key to form at least one encryption message, said message including information allowing said issuer to identify said applicant; sending said encryption message to said issuer by telecommunications means; decrypting said encryption message at an issuer end to retrieve said secret key and said pass reply using a private key of said issuer; receiving a second communication from said applicant at said issuer end separate from said encryption message over a channel that enables said issuer to ascertain said second communication to be genuinely from said applicant, said second communication containing said pass reply; confirming a validity of said secret key at least with said issuer if said pass reply received during said second communication matches said pass reply decrypted, whereby said secret key may be confirmed for use in future transactions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of applying for approval of a secret cryptographic key to be shared between an applicant and an issuer comprising the steps of:
-
obtaining a registration computer program means, said registration computer program means having a public key of said issuer and public key encryption capability; generating said secret key using at least some random information; generating a pass reply message using at least some arbitrary information; encrypting said secret key and said pass reply using said public key to form at least one encryption message, said message including information allowing said issuer to identify said applicant; sending said encryption message to said issuer by telecommunications means; communicating said pass reply to said issuer end separately from said encryption message over a channel that enables said issuer to ascertain said pass reply to be genuinely from said applicant, said communication containing said pass reply. - View Dependent Claims (13)
-
-
14. A method of approving a secret cryptographic key to be shared between an applicant and an issuer comprising the steps of:
-
receiving at least one encryption message from said applicant by telecommunications means, said message including an encryption of a secret key and a pass reply using public key encryption with a public key of said issuer, said message including information allowing said issuer to identify said applicant;
;decrypting said encryption message to retrieve said secret key and said pass reply using a private key of said issuer; receiving a second communication from said applicant separate from said encryption message over a channel that enables said issuer to ascertain said second communication to be genuinely from said applicant, said second communication containing said pass reply; confirming a validity of said secret key at least with said issuer if said pass reply received during said second communication matches said pass reply decrypted, whereby said secret key may be confirmed for use in future transactions.
-
-
15. A system for establishing a secret cryptographic key shared between an applicant and an issuer comprising:
-
applicant registration means having a public key of said issuer and public key encryption capability for generating said secret key using at least some random information at an applicant end, for generating a pass reply message using at least some arbitrary information at said applicant end, and for encrypting said secret key and said pass reply using said public key to form at least one encryption message, said message including information allowing said issuer to identify said applicant; means for sending said encryption message to said issuer by telecommunications means; means for decrypting said encryption message at an issuer end to retrieve said secret key and said pass reply using a private key of said issuer; means for receiving a second communication from said applicant at said issuer end separate from said encryption message over a channel that enables said issuer to ascertain said second communication to be genuinely from said applicant, said second communication containing said pass reply; means for confirming a validity of said secret key at least with said issuer if said pass reply received during said second communication matches said pass reply decrypted, whereby said secret key may be confirmed for use in future transactions.
-
Specification