Method and apparatus for data validation
First Claim
Patent Images
1. A computer system comprising:
- a first computer entity arranged to derive a public key using first data and to encrypt second data using as encryption parameters both the public key and third-party public data;
a second computer entity arranged to make the first data available to the first computing entity and to receive the encrypted second data from the first computer entity; and
a third computer entity arranged to receive the public key and on validation of the first data received in the public key, to generate an associated private key, and to provide said associated private key to the second computer entity to allow decryption of the encrypted second data, the third computer entity being arranged to generate the private key in dependence both on private data related to said third-party public data, and on the public key.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for encrypting data comprising deriving a public key using a first data set provided by a second party; encrypting a second data set with the public key; providing the encrypted third data set to the second party; providing the public key to a third party to allow validation of the first data set such that on validation of the first data set the third party provides an associated private key to the second party to allow decryption of the encrypted second data set.
-
Citations
9 Claims
-
1. A computer system comprising:
-
a first computer entity arranged to derive a public key using first data and to encrypt second data using as encryption parameters both the public key and third-party public data; a second computer entity arranged to make the first data available to the first computing entity and to receive the encrypted second data from the first computer entity; and a third computer entity arranged to receive the public key and on validation of the first data received in the public key, to generate an associated private key, and to provide said associated private key to the second computer entity to allow decryption of the encrypted second data, the third computer entity being arranged to generate the private key in dependence both on private data related to said third-party public data, and on the public key.
-
-
2. A data validation method comprising:
-
receiving at a first party first data provided by a second party; encrypting second data supplied by the first party, this encrypting being effected by the first party using as encryption parameters both public data of a third party and a public key comprising said first data; providing the encrypted second data to the second party; providing the public key to the third party which checks the validity of the first data in the public key, and after validating the first data, providing the second party with a private key for decrypting the encrypted second data, the third party generating the private key using the public key and private data related to said public data of the third party; and decrypting the encrypted second data provided to the second party using the private key. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
Specification