Method and system for authenticating messages
First Claim
Patent Images
1. A method of operating a computer, the method being for authenticating messages, the method comprising:
- creating a network address, at least a portion of which matches a result of a cryptographic function, the step of creating the network address comprising calculating a hash of a public key according to the cryptographic function to obtain the result, and using at least a portion of the result as at least a portion of the network address; and
indicating, within the address, how much of the created network address matches the result of the cryptographic function, the indicating step comprising populating at least a portion of the network address with a code representing the number of bits in length of the portion of the network address that is represented by the result.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a message is described, in which the message contains a network address, at least a portion of which is a digital fingerprint. Embedded in the message is data, such as a code, that indicates the size of the digital fingerprint. A device receiving the message uses the size data and, for example, the public key of the sender to attempt to reproduce the digital fingerprint. If successful, the device receiving the message verifies the identity of the sender.
-
Citations
14 Claims
-
1. A method of operating a computer, the method being for authenticating messages, the method comprising:
-
creating a network address, at least a portion of which matches a result of a cryptographic function, the step of creating the network address comprising calculating a hash of a public key according to the cryptographic function to obtain the result, and using at least a portion of the result as at least a portion of the network address; and indicating, within the address, how much of the created network address matches the result of the cryptographic function, the indicating step comprising populating at least a portion of the network address with a code representing the number of bits in length of the portion of the network address that is represented by the result. - View Dependent Claims (2, 3, 4)
-
-
5. A method of operating a computer, the method being for authenticating messages, the method comprising:
-
creating a network address, at least a portion of which matches a result of a cryptographic function; indicating, within the address, how much of the created network address matches a result of the cryptographic function; creating a message; including a public key in the message; calculating a hash of the public key according to the cryptographic function to obtain the result; and including the network address in the message. - View Dependent Claims (6, 7, 8)
-
-
9. A method of operating a computer, the method being for authenticating messages, the method comprising:
-
creating a network address, at least a portion of which matches a result of a cryptographic function; indicating, within the address, how much of the created network address matches the result of the cryptographic function; creating a message; including a public key in the message; calculating a hash of the public key according to the cryptographic function to obtain the result; using at least a portion of the result as a node selectable portion of the network address; and inserting a code in the message, the code representing the number of bits of the address that matches the result. - View Dependent Claims (10)
-
-
11. A method of operating a computer, the method being for authenticating messages, the method comprising:
-
creating a first portion of a network address according to a cryptographic function; creating a second portion of the network address without using the cryptographic function; creating a message comprising the first portion of the network address and the second portion of the network address; indicating, within the message, the size of the first portion of the network address; including a public key in the message; calculating a hash of the public key according to the cryptographic function to obtain a result; and using at least a portion of the result as the first portion of the network address; and inserting a code within the message, the code representing the number of bits in length of the first portion.
-
-
12. A method of operating a computer, the method being for authenticating messages, the method comprising:
-
creating a first portion of a network address according to a cryptographic function, wherein the step of creating the first portion comprises calculating a hash of a public key according to the cryptographic function to obtain a result, and using at least a portion of the result as the first portion of the network address; creating a second portion of the network address without using the cryptographic function; creating a message comprising the first portion of the network address and the second portion of the network address; indicating, within the message, the size of the first portion of the network address, wherein the indicating step comprises creating a third portion of the network address using a code representing the number of bits in length of the first portion, thereby indicating how many bits are to be used by a device to verify the sender of the message. - View Dependent Claims (13)
-
-
14. A method for authenticating messages, the method comprising:
-
a sending device calculating a cryptographic hash of a public key; the sending device creating a network address comprising a digital fingerprint made up of at least some portion of the cryptographic hash and a code indicating the number of bits that are in the digital signature; a receiving device receiving a message from the sending device, the message comprising the digital fingerprint and the code indicating the size of the digital fingerprint; the receiving device calculating a second cryptographic hash using the public key of the sending device and the code; the receiving device comparing at least part of the second cryptographic hash with the digital fingerprint; based on the comparing step, the receiving device complying with or ignoring the message.
-
Specification