Data card verification system
First Claim
1. A method of generating signature for a certificate of a correspondent, said certificate for use in electronic communicates, said method comprising:
- obtaining a first set of data including identification data and public information, the public information related to a private key by cryptographic operations of an elliptic curve cryptosystem; and
signing a second set of data related to said first set of data by utilizing a cryptographic processor implementing a second cryptosystem that is different to said elliptic curve cryptosystem to obtain said signature.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.
-
Citations
25 Claims
-
1. A method of generating signature for a certificate of a correspondent, said certificate for use in electronic communicates, said method comprising:
-
obtaining a first set of data including identification data and public information, the public information related to a private key by cryptographic operations of an elliptic curve cryptosystem; and signing a second set of data related to said first set of data by utilizing a cryptographic processor implementing a second cryptosystem that is different to said elliptic curve cryptosystem to obtain said signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer readable medium comprising computer executable instructions for generating a signature for a certificate of a correspondent, said certificate for use in electronic communications, the computer executable instructions comprising instructions for:
-
obtaining a first set of data including identification data and public information, the public information related to a private key by cryptographic operations of an elliptic curve cryptosystem; and signing a second set of data related to said first set of data by utilizing a cryptographic processor implementing a second cryptosystem that is different to said elliptic curve cryptosystem to obtain said signature. - View Dependent Claims (13, 14, 15, 16, 18, 19)
-
-
10. An apparatus including a cryptographic processor to perform cryptographic operations and configured to:
-
obtain a first set of data including identification data and public information, the public information related to a private key by cryptographic operations of an elliptic curve cryptosystem; and sign a second set of data related to said first set of data by utilizing a cryptographic processor implementing a second cryptosystem that is different to said elliptic curve cryptosystem to obtain a signature for inclusion in a certificate. - View Dependent Claims (17, 20, 21, 22, 23, 24, 25)
-
-
11. A certificate embodied as a data structure in a non-transitory computer readble medium comprising:
a signature obtained by signing a second set of computer readable data utilizing a signature scheme implemented in a second cryptosystem, wherein said second set of data is related to identification data and public information associated with a correspondent, said public information related to a private key by cryptographic operations of an elliptic curve cryptosystem that is different than said second cryptosystem. - View Dependent Claims (12)
Specification