Electronic voting system
First Claim
Patent Images
1. A method comprising:
- creating a private key and a public key cryptographic key pair;
generating a unique and random identifier for a voter'"'"'s vote;
accepting an election vote from said voter;
electronically signing said vote and said identifier with said private key to create a digital signature;
providing, as part of said method'"'"'s standard process, said vote and said identifier in a human readable format to said voter and providing, as part of said method'"'"'s standard process, said digital signature to said voter;
generating a second unique and random identifier for a second voter'"'"'s vote;
accepting a second election vote from said second voter;
electronically signing said second vote and said second identifier with said private key to create a second digital signature;
providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter;
publishing said public key on an internet;
publicly providing information on said internet that associates together;
(i) said voter'"'"'s vote in a human readable format,(ii) said identifier in a human readable format, and(iii) said digital signaturewherein, said voter'"'"'s vote is verifiable with said digital signature and said public key;
publicly providing information on said internet that associates together;
(iv) said second voter'"'"'s vote in a human readable format,(v) said second identifier in a human readable format, and(vi) said second digital signaturewherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key;
in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication;
in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is described that involves creating a private key and a public key cryptographic key pair, generating a unique and random identifier for a voter'"'"'s vote and accepting an election vote from said voter. The vote and identifier are electronically signed with the private key to create a digital signature. The vote and identifier are provided in a human readable format to the voter.
-
Citations
25 Claims
-
1. A method comprising:
-
creating a private key and a public key cryptographic key pair; generating a unique and random identifier for a voter'"'"'s vote; accepting an election vote from said voter; electronically signing said vote and said identifier with said private key to create a digital signature; providing, as part of said method'"'"'s standard process, said vote and said identifier in a human readable format to said voter and providing, as part of said method'"'"'s standard process, said digital signature to said voter; generating a second unique and random identifier for a second voter'"'"'s vote; accepting a second election vote from said second voter; electronically signing said second vote and said second identifier with said private key to create a second digital signature; providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter; publishing said public key on an internet; publicly providing information on said internet that associates together; (i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key; publicly providing information on said internet that associates together; (iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key; in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication; in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product including program code stored on one or more computer readable media, said program code to perform a method, said method comprising:
-
recognizing creation of a private key and a public key cryptographic key pair; causing a unique and random identifier to be generated for a voter'"'"'s vote; accepting an election vote from said voter through an electronically rendered user interface; electronically signing said vote and said identifier with said private key to create a digital signature; as part of said method'"'"'s standard process, causing said vote and said identifier to be provided in a human readable format to said voter and, as part of said method'"'"'s standard process, causing said digital signature to be provided to said voter; causing a second unique and random identifier to be generated for a second voter'"'"'s vote; accepting a second election vote from said second voter through said interface; electronically signing said second vote and said second identifier with said private key to create a second digital signature; causing said second vote and said second identifier to be provided to said second voter in a human readable format and causing said second digital signature to be provided to said second voter; publishing said public key on an internet; publicly providing information on said internet that associates together; (i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key; publicly providing information on said internet that associates together; (iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key; in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication; in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A voting machine system, comprising:
-
a) a computer program product including program code stored on one or more computer readable media, said program code to perform a method, said method comprising; recognizing creation of a private key and a public key cryptographic key pair; causing a unique and random identifier to be generated for a voter'"'"'s vote; accepting an election vote from said voter through an electronically rendered user interface; electronically signing said vote and said identifier with said private key to create a digital signature; as part of said method'"'"'s standard process, causing said vote and said identifier to be provided in a human readable format to said voter and, as part of said method'"'"'s standard process, causing said digital signature to be provided to said voter; causing a second unique and random identifier to be generated for a second voter'"'"'s vote; accepting a second election vote from said second voter through said interface; electronically signing said second vote and said second identifier with said private key to create a second digital signature; causing said second vote and said second identifier to be provided to said second voter in a human readable format and causing said second digital signature to be provided to said second voter; publishing said public key on an internet; publicly providing information on said internet that associates together; (i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key; publicly providing information on said internet that associates together; (iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key; in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication; in response to receiving a second request from said internet containing said second identifier, providing (iv), (v) and (vi) above through a second internet communication; b) processor circuitry implemented on one or more semiconductor chips to process said program code; c) one or more volatile memory resources coupled to said processor circuitry, said private key stored only in said one or more volatile memory resources; d) write once read many (WORM) storage resources coupled to said processor circuitry; said first voter'"'"'s vote, said first identifier and said first digital signature to be stored in a first randomly assigned portion of said WORM storage resources; said second voter'"'"'s vote, said second identifier and said second digital signature to be stored in a second randomly assigned portion of said WORM storage resources. - View Dependent Claims (23)
-
-
24. A voting machine system, comprising:
-
a) one or more semiconductor chips to perform the following method; creating a private key and a public key cryptographic key pair; generating a unique and random identifier for a voter'"'"'s vote; accepting an election vote from said voter; electronically signing said vote and said identifier with said private key to create a digital signature; as part of said method'"'"'s standard process, providing said vote and said identifier in a human readable format to said voter and, as part of said method'"'"'s standard process, providing said digital signature to said voter; generating a second unique and random identifier for a second voter'"'"'s vote; accepting a second election vote from said second voter; electronically signing said second vote and said second identifier with said private key to create a second digital signature; providing said second vote and said second identifier in a human readable format to said second voter and providing said second digital signature to said second voter; publishing said public key on an internet; publicly providing information on said internet that associates together; (i) said voter'"'"'s vote in a human readable format, (ii) said identifier in a human readable format, and (iii) said digital signature wherein, said voter'"'"'s vote is verifiable with said digital signature and said public key; publicly providing information on said internet that associates together; (iv) said second voter'"'"'s vote in a human readable format, (v) said second identifier in a human readable format, and (vi) said second digital signature wherein, said second voter'"'"'s vote is verifiable with said second digital signature and said public key; in response to receiving a request from said internet containing said identifier, providing (i), (ii) and (iii) above through an internet communication; in response to receiving a request from said internet for an electoral jurisdiction'"'"'s election data, providing through a second internet communication a complete set of votes, identifiers, digital signatures and public keys for said electoral jurisdiction; b) one or more volatile memory resources coupled to said processor circuitry, said private key stored only in said one or more volatile memory resources; c) write once read many (WORM) storage resources coupled to said processor circuitry; said first voter'"'"'s vote, said first identifier and said first digital signature to be stored in a first randomly assigned portion of said WORM storage resources; said second voter'"'"'s vote, said second identifier and said second digital signature to be stored in a second randomly assigned portion of said WORM storage resources. - View Dependent Claims (25)
-
Specification