Systems and methods for delegated cryptography
First Claim
Patent Images
1. An authentication method comprising:
- receiving a request for a digital signature of data from a delegate computer over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link;
displaying information derived from the data;
prompting a user for approval of the request with information derived from the data;
in response to receiving approval from the user, creating the digital signature of the data using one or more private keys stored in a key enclave; and
sending the digital signature to the delegate computer over the secure channel.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link; displaying information derived from the data; prompting a user for approval of the request with information derived from the data; in response to receiving approval from the user, creating the digital signature of the data using one or more private keys stored in a key enclave; and sending the digital signature to the delegate computer over the secure channel.
107 Citations
21 Claims
-
1. An authentication method comprising:
-
receiving a request for a digital signature of data from a delegate computer over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link; displaying information derived from the data; prompting a user for approval of the request with information derived from the data; in response to receiving approval from the user, creating the digital signature of the data using one or more private keys stored in a key enclave; and sending the digital signature to the delegate computer over the secure channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A verification method comprising:
-
receiving a request from a delegate computer for verification of a digital signature over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link; verifying the digital signature using at least one of one or more public keys stored in a key enclave or data derived from the one or more public keys stored in the key enclave; and sending the delegate computer a response to the request for verification of the digital signature, wherein the one or more public keys are stored with an associated level of trust and the response comprises the level of trust. - View Dependent Claims (17, 18, 19)
-
-
20. A verification method comprising:
-
receiving a request from a delegate computer for at least one of one or more public keys or data derived from the one or more public keys over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link and the one or more public keys are stored in a key enclave; sending at least one of one or more public keys or data derived from the one or more public keys to the delegate computer; wherein the one or more public keys are stored with an associated level of trust; and sending the at least one of one or more public keys or data derived from the one or more public keys to the delegate computer comprises sending the level of trust. - View Dependent Claims (21)
-
Specification