×

Trusted authentication digital signature (tads) system

  • US 7,552,333 B2
  • Filed: 08/06/2001
  • Issued: 06/23/2009
  • Est. Priority Date: 08/04/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of establishing trusted entity authentication associated with an electronic communication (EC), comprising:

  • (a) manufacturing a device within a secure environment, wherein manufacturing the device comprises;

    (i) creating a public-private key pair before release of the device from the secure manufacturing environment,(ii) storing the private key securely within the device before release of the device from the secure manufacturing environment, and(iii) linking within the secure manufacturing environment in a secure manner the public key with other information associated with the device;

    (b) after its manufacture, using the device to generate a digital signature as part of the EC, wherein generating the digital signature comprises;

    (i) receiving into the device input comprising verification data of an entity,(ii) identifying within the device a current verification status out of a plurality of predefined verification statuses as a function of the input verification data and data prestored within the device, each verification status regarding an entity authentication performed by the device,(iii) independent of the verification status identified, generating the digital signature for a message as a function of said identified verification status, including modifying within the device the message as a function of said identified verification status, said generated digital signature comprising an indication of the identified verification status, and(iv) outputting from the device the digital signature for transmission as part of the EC to a recipient; and

    (c) upon receipt of the EC by the recipient,(i) extracting the indication of the identified verification status from the EC and identifying the other information linked with the public key of the device by successfully authenticating the message using the public key of the device, and(ii) acting on the message in the EC based on the indication of the identified verification status included in the EC, based on the contents of the message itself, and based on said identified information linked with the public key.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×