Data card verification system
First Claim
1. A method of generating a certificate in a public key cryptosystem comprising the steps of:
- a) obtaining from a correspondent, a first set of data representing public information of said correspondent associated with a first signature scheme, said first signature scheme utilizing an elliptic curve cryptosystem, said public information being related to a private key generated by said correspondent;
b) signing a second set of data according to a second signature scheme that is different than said first signature scheme to obtain a signature; and
c) combining said first set of data and said signature to generate said certificate.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.
34 Citations
16 Claims
-
1. A method of generating a certificate in a public key cryptosystem comprising the steps of:
-
a) obtaining from a correspondent, a first set of data representing public information of said correspondent associated with a first signature scheme, said first signature scheme utilizing an elliptic curve cryptosystem, said public information being related to a private key generated by said correspondent; b) signing a second set of data according to a second signature scheme that is different than said first signature scheme to obtain a signature; and c) combining said first set of data and said signature to generate said certificate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer readable medium comprising computer executable instructions for generating certificate including instructions for:
-
a) obtaining from a correspondent, a first set of data representing public information of said correspondent associated with a first signature scheme, said first signature scheme utilizing an elliptic curve cryptosystem, said public information being related to a private key generated by said correspondent; b) signing a second set of data according to said second signature scheme that is different than said first signature scheme to obtain a signature; and c) combining said first set of data and said signature to generate said certificate. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification