Manufacturing unique devices that generate digital signatures
First Claim
1. A method of maintaining a Central Key Authority (CKA) database in a secure environment, comprising:
- storing, in the CKA database, a public key of a public key-private key pair, wherein the public key is associated with a user device of a user, wherein the user device is configured to generate digital signatures using a private key of the public-private key pair, wherein the private key is maintained securely within the user device;
securely linking, in the CKA database, the public key associated with the user device with other information during manufacturing of the user device in the secure environment; and
associating, in the CKA database, one or more third-party account identifiers with the public key, wherein each third-party account identifier identifies to a third-party an account of a respective user that is maintained with the third-party, wherein the third-party uses the public key and other information to authenticate a message.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of manufacturing devices that generate digital signatures such that each device may be reliably and uniquely identified includes creating a public-private key pair within each device during manufacture; exporting only the public key from the device; retaining the private key within the device against the possibility of divulgement thereof by the device; and securely linking said exported public key with other information within the environment of the manufacture of the device, whereby each device is securely bound with its respective public key. A database of PuK-linked account information of users is maintained. The PuK-linked account information for each user includes a public key of such a device; information securely linked with the public key during manufacture; and third-party account identifiers, each of which identifies an account to a third-party of the user maintained with the third-party that has been associated with the user'"'"'s public key by the third-party.
188 Citations
16 Claims
-
1. A method of maintaining a Central Key Authority (CKA) database in a secure environment, comprising:
-
storing, in the CKA database, a public key of a public key-private key pair, wherein the public key is associated with a user device of a user, wherein the user device is configured to generate digital signatures using a private key of the public-private key pair, wherein the private key is maintained securely within the user device; securely linking, in the CKA database, the public key associated with the user device with other information during manufacturing of the user device in the secure environment; and associating, in the CKA database, one or more third-party account identifiers with the public key, wherein each third-party account identifier identifies to a third-party an account of a respective user that is maintained with the third-party, wherein the third-party uses the public key and other information to authenticate a message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification