×

Method for real-time data authentication

  • US 7,194,620 B1
  • Filed: 09/24/1999
  • Issued: 03/20/2007
  • Est. Priority Date: 09/24/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for authenticating transmitted data in real time, said data transmitted as a stream of packets over a publicly available medium, the method comprising:

  • generating a master cryptographic key pair, including a long first public key and a long first private key;

    publishing a first certificate issued by a certificate authority, the first certificate including the first public key and a first digital signature of the first public key based on a private key from the certificate authority;

    generating a disposable cryptographic key pair, including a second public key and second private key;

    generating a second certificate, the second certificate including the second public key and a second digital signature of the second public key based on the first private key;

    publishing the second certificate;

    signing the packets of data to be transmitted with a third digital signature by processing the data to be transmitted through a first one way hashing function to generate a first hash value and encrypting the first hash value utilizing the second private key;

    processing received data through the first one way hashing function to create a second hash value;

    decrypting the received third digital signature utilizing the second public key to obtain a third hash value; and

    verifying authenticity of the received data by comparing the second hash value to the third hash value,wherein the first private key, the second private key, and the private key from the certificate authority have different values.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×