http://rdf.ncbi.nlm.nih.gov/pubchem/patent/PL-176458-B1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_92e6d97d7361ce224dbe85f63f29f5e7 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-725 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-088 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0844 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0825 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-085 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3829 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3821 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3263 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3247 |
classificationIPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-72 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-08 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-38 |
filingDate | 1995-01-13^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_906cced3f96b0e3f0816c55ed2c601f3 |
publicationDate | 1999-05-31^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | PL-176458-B1 |
titleOfInvention | Encryption method of the communication system |
abstract | The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern public key certificate management, enforced by a chip device that also self-certifies. In a preferred embodiment of this invention, the chip encrypts or decrypts only if certain conditions are met, namely, (1) if a valid "sender certificate" and a valid "recipient certificate" are input, where "valid" means that the particular user's private decryption key is provably escrowed with a specified number of escrow agents and that the master escrow center is registered and certified by the chip manufacturer, and (2) if a valid Message Control Header is generated by the sender and validated by the recipient, thereby giving authorized investigators sufficient information with which to request and obtain the escrowed keys. A further preferred embodiment of this invention provides a method for generating verifiably trusted communications among a plurality of users, comprising the steps of escrowing at a trusted escrow center a plurality of asymmetric cryptographic keys to be used by a plurality of users; verifying each of said plurality of keys at the escrow center; certifying the authorization of each of said plurality of keys upon verification; and initiating a communication from each of said plurality of users using a respective one of said plurality of keys contingent upon said certification. |
priorityDate | 1994-01-13^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID1132 http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419551130 |
Showing number of triples: 1 to 28 of 28.